Works (24)

Updated: July 5th, 2023 15:59

2012 journal article

A legal cross-references taxonomy for reasoning about compliance requirements

REQUIREMENTS ENGINEERING, 17(2), 99–115.

By: J. Maxwell n, A. Anton n, P. Swire, M. Riaz n & C. McCraw n

co-author countries: United States of America 🇺🇸
author keywords: Requirements engineering; Conflicting requirements; Regulatory compliance; Software compliance engineering; Financial systems; Healthcare IT
Source: Web Of Science
Added: August 6, 2018

2011 conference paper

A legal cross-references taxonomy for identifying conflicting software requirements

2011 19th ieee international requirements engineering conference (re), 197–206.

By: J. Maxwell n, A. Anton n & P. Swire

co-author countries: United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018

2011 conference paper

Assessing the accuracy of legal implementation readiness decisions

2011 19th ieee international requirements engineering conference (re), 207–216.

By: A. Massey n, B. Smith n, P. Otto n & A. Anton n

co-author countries: United States of America 🇺🇸
Source: NC State University Libraries
Added: August 6, 2018

2011 article

Digital privacy: theory, policies and technologies

Anton, A. I., Breaux, T. D., Gritzalis, S., & Mylopoulos, J. (2011, March). REQUIREMENTS ENGINEERING, Vol. 16, pp. 1–2.

By: A. Anton n, T. Breaux*, S. Gritzalis* & J. Mylopoulos*

co-author countries: Canada 🇨🇦 Greece 🇬🇷 United States of America 🇺🇸
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Evaluating existing security and privacy requirements for legal compliance

REQUIREMENTS ENGINEERING, 15(1), 119–137.

By: A. Massey n, P. Otto n, L. Hayward n & A. Anton n

co-author countries: United States of America 🇺🇸
author keywords: Security requirements; Privacy requirements; Legal compliance; Refactoring requirements
Source: Web Of Science
Added: August 6, 2018

2010 journal article

How internet users' privacy concerns have evolved since 2002

IEEE Security & Privacy Magazine, 8(1), 21–27.

By: A. Anton n, J. Earp n & J. Young n

co-author countries: United States of America 🇺🇸
Sources: Web Of Science, Crossref
Added: August 6, 2018

2009 journal article

A distributed requirements management framework for legal compliance and accountability

COMPUTERS & SECURITY, 28(1-2), 8–17.

By: T. Breaux n, A. Anton n & E. Spafford*

co-author countries: United States of America 🇺🇸
author keywords: Requirements engineering; Compliance; Accountability; Policy regulation
Source: Web Of Science
Added: August 6, 2018

2009 article

Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts

PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, pp. 101–110.

By: J. Maxwell n & A. Anton n

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Requirements-based Access Control Analysis and Policy Specification (ReCAPS)

INFORMATION AND SOFTWARE TECHNOLOGY, 51(6), 993–1009.

By: Q. He* & A. Anton n

co-author countries: United States of America 🇺🇸
author keywords: Requirements analysis; Security; Access control
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Analyzing regulatory rules for privacy and security requirements

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 34(1), 5–20.

By: T. Breaux n & A. Anton n

co-author countries: United States of America 🇺🇸
author keywords: data security and privacy; laws and regulations; compliance; accountability; requirements engineering
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Scenario support for effective requirements

INFORMATION AND SOFTWARE TECHNOLOGY, 50(3), 198–220.

By: T. Alspaugh* & A. Anton n

co-author countries: United States of America 🇺🇸
author keywords: requirements engineering; scenario analysis; scenario management
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Semantic Parameterization: A Process for Modeling Domain Descriptions

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 18(2).

By: T. Breaux n, A. Anton n & J. Doyle n

co-author countries: United States of America 🇺🇸

Contributors: T. Breaux n, A. Antón n & J. Doyle n

author keywords: Documentation; Standardization; Human Factors; Natural language; domain knowledge; formal specification; description logic
Sources: Web Of Science, ORCID
Added: August 6, 2018

2007 journal article

A roadmap for COMPREHENSIVE online privacy policy management

COMMUNICATIONS OF THE ACM, 50(7), 109–116.

By: A. Anton n, E. Bertino*, N. Li* & T. Yu n

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: August 6, 2018

2007 journal article

HIPAA's effect on web site privacy policies

IEEE SECURITY & PRIVACY, 5(1), 45–52.

By: A. Anton n, J. Earp n, M. Vail n, N. Jain n, C. Gheen n & J. Frink n

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: August 6, 2018

2007 journal article

The ChoicePoint dilemma - How data brokers should handle the privacy of personal information

IEEE SECURITY & PRIVACY, 5(5), 15–23.

By: P. Otto n, A. Anton n & D. Baumer n

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: August 6, 2018

2006 journal article

A semantics based approach to privacy languages

Computer Systems Science and Engineering, 21(5), 339–352.

By: N. Li, T. Yu & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Examining Internet privacy policies within the context of user privacy values

IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 52(2), 227–237.

By: J. Earp n, A. Anton n, L. Aiman-Smith n & W. Stufflebeam n

co-author countries: United States of America 🇺🇸
author keywords: E-commerce; privacy management; privacy policy; software engineering
Source: Web Of Science
Added: August 6, 2018

2004 journal article

A requirements taxonomy for reducing Web site privacy vulnerabilities

REQUIREMENTS ENGINEERING, 9(3), 169–185.

By: A. Anton & J. Earp n

co-author countries: United States of America 🇺🇸
author keywords: privacy requirements; security requirements
Source: Web Of Science
Added: August 6, 2018

2004 journal article

Financial privacy policies and the need for standardization

IEEE SECURITY & PRIVACY, 2(2), 36–45.

By: A. Anton n, J. Earp n, Q. He n, W. Stufflebeam n, D. Bolchini* & C. Jensen*

co-author countries: Switzerland 🇨🇭 United States of America 🇺🇸
Source: Web Of Science
Added: August 6, 2018

2004 journal article

Inside JetBlue's privacy policy violations

IEEE Security & Privacy, 2(6), 18-.

By: A. Anton, Q. He & D. Baumer

Source: NC State University Libraries
Added: August 6, 2018

2004 article

Misuse and abuse cases: Getting past the positive

IEEE SECURITY & PRIVACY, Vol. 2, pp. 90–92.

By: P. Hope*, G. McGraw* & A. Anton n

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: August 6, 2018

2003 article

Functional paleontology: The evolution of user-visible system services

Anton, A. I., & Potts, C. (2003, February). IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, Vol. 29, pp. 151–166.

By: A. Anton n & C. Potts*

co-author countries: United States of America 🇺🇸
author keywords: measurement; metrics; empirical methods; reverse engineering; requirements engineering; software evolution
Source: Web Of Science
Added: August 6, 2018

2003 article

Precluding incongruous behavior by aligning software requirements with security and privacy policies

Anton, A. I., Earp, J. B., & Carter, R. A. (2003, November 1). INFORMATION AND SOFTWARE TECHNOLOGY, Vol. 45, pp. 967–977.

By: A. Anton n, J. Earp n & R. Carter*

co-author countries: United States of America 🇺🇸
author keywords: privacy policy; security policy; requirements alignment
Source: Web Of Science
Added: August 6, 2018

2003 article

Successful software projects need requirements planning

IEEE SOFTWARE, Vol. 20, pp. 44-+.

By: A. Anton n

co-author countries: United States of America 🇺🇸
Source: Web Of Science
Added: August 6, 2018