Ana Anton

Works (24)

2012 journal article

A legal cross-references taxonomy for reasoning about compliance requirements

Requirements Engineering, 17(2), 99–115.

By: J. Maxwell, A. Anton, P. Swire, M. Riaz & C. McCraw

Source: NC State University Libraries
Added: August 6, 2018

2011 conference paper

A legal cross-references taxonomy for identifying conflicting software requirements

2011 19th ieee international requirements engineering conference (re), 197–206.

By: J. Maxwell, A. Anton & P. Swire

Source: NC State University Libraries
Added: August 6, 2018

2011 conference paper

Assessing the accuracy of legal implementation readiness decisions

2011 19th ieee international requirements engineering conference (re), 207–216.

By: A. Massey, B. Smith, P. Otto & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2011 journal article

Digital privacy: theory, policies and technologies

Requirements Engineering, 16(1), 1–2.

By: A. Anton, T. Breaux, S. Gritzalis & J. Mylopoulos

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Evaluating existing security and privacy requirements for legal compliance

Requirements Engineering, 15(1), 119–137.

By: A. Massey, P. Otto, L. Hayward & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

How internet users' privacy concerns have evolved since 2002

IEEE Security & Privacy, 8(1), 21–27.

By: A. Anton, J. Earp & J. Young

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

A distributed requirements management framework for legal compliance and accountability

Computers & Security, 28(1-2), 8–17.

By: T. Breaux, A. Anton & E. Spafford

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Developing production rule models to aid in acquiring requirements from legal texts

Proceedings of the 2009 17th IEEE International Requirements Engineering Conference, 101–110.

By: J. Maxwell & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

Requirements-based access control analysis and policy specification (ReCAPS)

Information and Software Technology, 51(6), 993–1009.

By: Q. He & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Analyzing regulatory rules for privacy and security requirements

IEEE Transactions on Software Engineering, 34(1), 5–20.

By: T. Breaux & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Scenario support for effective requirements

Information and Software Technology, 50(3), 198–220.

By: T. Alspaugh & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Semantic parameterization: A process for modeling domain descriptions

ACM Transactions on Software Engineering and Methodology, 18(2).

By: T. Breaux, A. Anton & J. Doyle

Source: NC State University Libraries
Added: August 6, 2018

2007 journal article

A roadmap for COMPREHENSIVE online privacy policy management

Communications of the ACM, 50(7), 109–116.

By: A. Anton, E. Bertino, N. Li & T. Yu

Source: NC State University Libraries
Added: August 6, 2018

2007 journal article

HIPAA's effect on web site privacy policies

IEEE Security & Privacy, 5(1), 45–52.

By: A. Anton, J. Earp, M. Vail, N. Jain, C. Gheen & J. Frink

Source: NC State University Libraries
Added: August 6, 2018

2007 journal article

The ChoicePoint dilemma - How data brokers should handle the privacy of personal information

IEEE Security & Privacy, 5(5), 15–23.

By: P. Otto, A. Anton & D. Baumer

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

A semantics based approach to privacy languages

Computer Systems Science and Engineering, 21(5), 339–352.

By: N. Li, T. Yu & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Examining Internet privacy policies within the context of user privacy values

IEEE Transactions on Engineering Management, 52(2), 227–237.

Source: NC State University Libraries
Added: August 6, 2018

2004 journal article

A requirements taxonomy for reducing Web site privacy vulnerabilities

Requirements Engineering, 9(3), 169–185.

By: A. Anton & J. Earp

Source: NC State University Libraries
Added: August 6, 2018

2004 journal article

Financial privacy policies and the need for standardization

IEEE Security & Privacy, 2(2), 36–45.

By: A. Anton, J. Earp, Q. He, W. Stufflebeam, D. Bolchini & C. Jensen

Source: NC State University Libraries
Added: August 6, 2018

2004 journal article

Inside JetBlue's privacy policy violations

IEEE Security & Privacy, 2(6), 18-.

By: A. Anton, Q. He & D. Baumer

Source: NC State University Libraries
Added: August 6, 2018

2004 journal article

Misuse and abuse cases: Getting past the positive

IEEE Security & Privacy, 2(3), 90–92.

By: P. Hope, G. McGraw & A. Anton

Source: NC State University Libraries
Added: August 6, 2018

2003 journal article

Functional paleontology: The evolution of user-visible system services

IEEE Transactions on Software Engineering, 29(2), 151–166.

By: A. Anton & C. Potts

Source: NC State University Libraries
Added: August 6, 2018

2003 journal article

Precluding incongruous behavior by aligning software requirements with security and privacy policies

Information and Software Technology, 45(14), 967–977.

By: A. Anton, J. Earp & R. Carter

Source: NC State University Libraries
Added: August 6, 2018

2003 journal article

Successful software projects need requirements planning

IEEE Software, 20(3), 44-.

By: A. Anton

Source: NC State University Libraries
Added: August 6, 2018