The Community for Technology Leaders
2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) (2014)
Karlskrona, Sweden
Aug. 25, 2014 to Aug. 25, 2014
ISBN: 978-1-4799-6340-9
TABLE OF CONTENTS

[Front matter] (PDF)

pp. 1-2

Contents (PDF)

pp. 1

Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring (Abstract)

Tom-Michael Hesse , Institute of Computer Science, University of Heidelberg, Germany
Stefan Gartner , Software Engineering Group, Leibniz Universität Hannover, Germany
Tobias Roehm , Institut für Informatik, Technische Universität München, Germany
Barbara Paech , Institute of Computer Science, University of Heidelberg, Germany
Kurt Schneider , Software Engineering Group, Leibniz Universität Hannover, Germany
Bernd Bruegge , Institut für Informatik, Technische Universität München, Germany
pp. 1-6

Argumentation-based security requirements elicitation: The next round (Abstract)

Dan Ionita , Services, Cybersecurity and Safety Research Group, University of Twente, The Netherlands
Jan-Willem Bullee , Services, Cybersecurity and Safety Research Group, University of Twente, The Netherlands
Roel J. Wieringa , Services, Cybersecurity and Safety Research Group, University of Twente, The Netherlands
pp. 7-12

Towards a framework to measure security expertise in requirements analysis (Abstract)

Hanan Hibshi , Institute for Software Research, Carnegie Mellon Univeristy Pittsburgh, Pennsylvania, USA
Travis Breaux , Institute for Software Research, Carnegie Mellon Univeristy Pittsburgh, Pennsylvania, USA
Maria Riaz , Department of Computer Science North Carolina State University Raleigh, North Carolina, USA
Laurie Williams , Department of Computer Science North Carolina State University Raleigh, North Carolina, USA
pp. 13-18

Engineering privacy requirements valuable lessons from another realm (Abstract)

Yod-Samuel Martin , Universidad Politécnica de Madrid Madrid, Spain
Jose M. del Alamo , Universidad Politécnica de Madrid Madrid, Spain
Juan C. Yelmo , Universidad Politécnica de Madrid Madrid, Spain
pp. 19-24

L-SQUARE: Preliminary extension of the SQUARE methodology to address legal compliance (Abstract)

Aaron Alva , Software Engineering Institute, Carnegie Mellon University Pittsburgh, PA, USA
Lisa Young , Software Engineering Institute, Carnegie Mellon University Pittsburgh, PA, USA
pp. 25-30

Supporting evolving security models for an agile security evaluation (Abstract)

Wolfgang Raschke , Institute for Technical Informatics, Graz University of Technology, Graz, Austria
Massimiliano Zilli , Institute for Technical Informatics, Graz University of Technology, Graz, Austria
Philip Baumgartner , NXP Semiconductors Austria GmhH, Gratkorn, Austria
Johannes Loinig , NXP Semiconductors Austria GmhH, Gratkorn, Austria
Christian Steger , Institute for Technical Informatics, Graz University of Technology, Graz, Austria
Christian Kreiner , Institute for Technical Informatics, Graz University of Technology, Graz, Austria
pp. 31-36

Using malware analysis to improve security requirements on future systems (Abstract)

Naney R. Mead , Software Engineering Institute Carnegie Mellon University Pittsburgh, Pennsylvania, U.S.A.
Jose Andre Morales , Software Engineering Institute Carnegie Mellon University Pittsburgh, Pennsylvania, U.S.A.
pp. 37-41

Pattern-based and ISO 27001 compliant risk analysis for cloud systems (Abstract)

Azadeh Alebrahim , Paluno - The Ruhr Institute for Software Technology University of Duisburg-Essen, Germany
Denis Hatebur , Paluno - The Ruhr Institute for Software Technology University of Duisburg-Essen, Germany
Ludger Goeke , ITESYS GmbH Dortmund, Germany
pp. 42-47
92 ms
(Ver 3.3 (11022016))