2012 journal article
A legal cross-references taxonomy for reasoning about compliance requirements
REQUIREMENTS ENGINEERING, 17(2), 99–115.
2011 conference paper
A legal cross-references taxonomy for identifying conflicting software requirements
2011 19th ieee international requirements engineering conference (re), 197–206.
2011 conference paper
Assessing the accuracy of legal implementation readiness decisions
2011 19th ieee international requirements engineering conference (re), 207–216.
2011 article
Digital privacy: theory, policies and technologies
Anton, A. I., Breaux, T. D., Gritzalis, S., & Mylopoulos, J. (2011, March). REQUIREMENTS ENGINEERING, Vol. 16, pp. 1–2.
2010 journal article
How internet users' privacy concerns have evolved since 2002
IEEE Security & Privacy Magazine, 8(1), 21–27.
2009 article
Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts
PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, pp. 101–110.
2009 journal article
Evaluating existing security and privacy requirements for legal compliance
REQUIREMENTS ENGINEERING, 15(1), 119–137.
2009 journal article
Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
INFORMATION AND SOFTWARE TECHNOLOGY, 51(6), 993–1009.
2008 journal article
A distributed requirements management framework for legal compliance and accountability
COMPUTERS & SECURITY, 28(1-2), 8–17.
2008 journal article
Analyzing regulatory rules for privacy and security requirements
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 34(1), 5–20.
2008 journal article
Semantic Parameterization: A Process for Modeling Domain Descriptions
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 18(2).
2007 journal article
A roadmap for COMPREHENSIVE online privacy policy management
COMMUNICATIONS OF THE ACM, 50(7), 109–116.
2007 journal article
HIPAA's effect on web site privacy policies
IEEE SECURITY & PRIVACY, 5(1), 45–52.
2007 journal article
Scenario support for effective requirements
INFORMATION AND SOFTWARE TECHNOLOGY, 50(3), 198–220.
2007 journal article
The ChoicePoint dilemma - How data brokers should handle the privacy of personal information
IEEE SECURITY & PRIVACY, 5(5), 15–23.
2006 journal article
A semantics based approach to privacy languages
Computer Systems Science and Engineering, 21(5), 339–352.
2005 journal article
Examining Internet privacy policies within the context of user privacy values
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 52(2), 227–237.
2004 journal article
Financial privacy policies and the need for standardization
IEEE SECURITY & PRIVACY, 2(2), 36–45.
2004 journal article
Inside JetBlue's privacy policy violations
IEEE Security & Privacy, 2(6), 18-.
2004 article
Misuse and abuse cases: Getting past the positive
IEEE SECURITY & PRIVACY, Vol. 2, pp. 90–92.
2003 journal article
A requirements taxonomy for reducing Web site privacy vulnerabilities
REQUIREMENTS ENGINEERING, 9(3), 169–185.
2003 article
Functional paleontology: The evolution of user-visible system services
Anton, A. I., & Potts, C. (2003, February). IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, Vol. 29, pp. 151–166.
2003 article
Precluding incongruous behavior by aligning software requirements with security and privacy policies
Anton, A. I., Earp, J. B., & Carter, R. A. (2003, November 1). INFORMATION AND SOFTWARE TECHNOLOGY, Vol. 45, pp. 967–977.
2003 article
Successful software projects need requirements planning
IEEE SOFTWARE, Vol. 20, pp. 44-+.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.