@article{maxwell_anton_swire_riaz_mccraw_2012, title={A legal cross-references taxonomy for reasoning about compliance requirements}, volume={17}, ISSN={["1432-010X"]}, DOI={10.1007/s00766-012-0152-5}, number={2}, journal={REQUIREMENTS ENGINEERING}, author={Maxwell, Jeremy C. and Anton, Annie I. and Swire, Peter and Riaz, Maria and McCraw, Christopher M.}, year={2012}, month={Jun}, pages={99–115} } @inproceedings{maxwell_anton_swire_2011, title={A legal cross-references taxonomy for identifying conflicting software requirements}, DOI={10.1109/re.2011.6051647}, booktitle={2011 19th ieee international requirements engineering conference (re)}, author={Maxwell, J. C. and Anton, A. I. and Swire, P.}, year={2011}, pages={197–206} } @inproceedings{massey_smith_otto_anton_2011, title={Assessing the accuracy of legal implementation readiness decisions}, DOI={10.1109/re.2011.6051661}, booktitle={2011 19th ieee international requirements engineering conference (re)}, author={Massey, A. K. and Smith, B. and Otto, P. N. and Anton, A. I.}, year={2011}, pages={207–216} } @article{anton_breaux_gritzalis_mylopoulos_2011, title={Digital privacy: theory, policies and technologies}, volume={16}, ISSN={["1432-010X"]}, DOI={10.1007/s00766-011-0117-0}, number={1}, journal={REQUIREMENTS ENGINEERING}, author={Anton, Annie I. and Breaux, Travis D. and Gritzalis, Stefanos and Mylopoulos, John}, year={2011}, month={Mar}, pages={1–2} } @article{massey_otto_hayward_anton_2010, title={Evaluating existing security and privacy requirements for legal compliance}, volume={15}, ISSN={["1432-010X"]}, DOI={10.1007/s00766-009-0089-5}, number={1}, journal={REQUIREMENTS ENGINEERING}, author={Massey, Aaron K. and Otto, Paul N. and Hayward, Lauren J. and Anton, Annie I.}, year={2010}, month={Mar}, pages={119–137} } @article{anton_earp_young_2010, title={How internet users' privacy concerns have evolved since 2002}, volume={8}, ISSN={1540-7993}, url={http://dx.doi.org/10.1109/msp.2010.38}, DOI={10.1109/msp.2010.38}, number={1}, journal={IEEE Security & Privacy Magazine}, publisher={Institute of Electrical and Electronics Engineers (IEEE)}, author={Anton, A.I. and Earp, J.B. and Young, J.D.}, year={2010}, month={Jan}, pages={21–27} } @article{breaux_anton_spafford_2009, title={A distributed requirements management framework for legal compliance and accountability}, volume={28}, ISSN={["1872-6208"]}, DOI={10.1016/j.cose.2008.08.001}, number={1-2}, journal={COMPUTERS & SECURITY}, author={Breaux, Travis D. and Anton, Annie I. and Spafford, Eugene H.}, year={2009}, pages={8–17} } @article{maxwell_anton_2009, title={Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts}, ISBN={["978-0-7695-3761-0"]}, DOI={10.1109/re.2009.21}, journal={PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE}, author={Maxwell, Jeremy C. and Anton, Annie I.}, year={2009}, pages={101–110} } @article{he_anton_2009, title={Requirements-based Access Control Analysis and Policy Specification (ReCAPS)}, volume={51}, ISSN={["1873-6025"]}, DOI={10.1016/j.infsof.2008.11.005}, number={6}, journal={INFORMATION AND SOFTWARE TECHNOLOGY}, author={He, Qingfeng and Anton, Annie I.}, year={2009}, month={Jun}, pages={993–1009} } @article{breaux_anton_2008, title={Analyzing regulatory rules for privacy and security requirements}, volume={34}, ISSN={["1939-3520"]}, DOI={10.1109/TSE.2007.70746}, number={1}, journal={IEEE TRANSACTIONS ON SOFTWARE ENGINEERING}, author={Breaux, Travis D. and Anton, Annie I.}, year={2008}, pages={5–20} } @article{alspaugh_anton_2008, title={Scenario support for effective requirements}, volume={50}, ISSN={["1873-6025"]}, DOI={10.1016/j.infsof.2006.12.003}, number={3}, journal={INFORMATION AND SOFTWARE TECHNOLOGY}, author={Alspaugh, Thomas A. and Anton, Annie I.}, year={2008}, month={Feb}, pages={198–220} } @article{breaux_anton_doyle_2008, title={Semantic Parameterization: A Process for Modeling Domain Descriptions}, volume={18}, ISSN={["1557-7392"]}, url={http://www.scopus.com/inward/record.url?eid=2-s2.0-56149121201&partnerID=MN8TOARS}, DOI={10.1145/1416563.1416565}, number={2}, journal={ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY}, publisher={Association for Computing Machinery (ACM)}, author={Breaux, Travis D. and Anton, Annie I. and Doyle, Jon}, year={2008}, month={Nov} } @article{anton_bertino_li_yu_2007, title={A roadmap for COMPREHENSIVE online privacy policy management}, volume={50}, ISSN={["1557-7317"]}, DOI={10.1145/1272516.1272522}, number={7}, journal={COMMUNICATIONS OF THE ACM}, author={Anton, Annie I. and Bertino, Elisa and Li, Ninghui and Yu, Ting}, year={2007}, month={Jul}, pages={109–116} } @article{anton_earp_vail_jain_gheen_frink_2007, title={HIPAA's effect on web site privacy policies}, volume={5}, ISSN={["1540-7993"]}, DOI={10.1109/MSP.2007.7}, number={1}, journal={IEEE SECURITY & PRIVACY}, author={Anton, Annie I. and Earp, Julia B. and Vail, Matthew W. and Jain, Neha and Gheen, Carrie M. and Frink, Jack M.}, year={2007}, pages={45–52} } @article{otto_anton_baumer_2007, title={The ChoicePoint dilemma - How data brokers should handle the privacy of personal information}, volume={5}, ISSN={["1558-4046"]}, DOI={10.1109/MSP.2007.126}, number={5}, journal={IEEE SECURITY & PRIVACY}, author={Otto, Paul N. and Anton, Annie I. and Baumer, David L.}, year={2007}, pages={15–23} } @article{li_yu_anton_2006, title={A semantics based approach to privacy languages}, volume={21}, number={5}, journal={Computer Systems Science and Engineering}, author={Li, N. and Yu, T. and Anton, A.}, year={2006}, pages={339–352} } @article{earp_anton_aiman-smith_stufflebeam_2005, title={Examining Internet privacy policies within the context of user privacy values}, volume={52}, ISSN={["1558-0040"]}, DOI={10.1109/tem.2005.844927}, number={2}, journal={IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT}, author={Earp, JB and Anton, AI and Aiman-Smith, L and Stufflebeam, WH}, year={2005}, month={May}, pages={227–237} } @article{anton_earp_2004, title={A requirements taxonomy for reducing Web site privacy vulnerabilities}, volume={9}, ISSN={["1432-010X"]}, DOI={10.1007/s00766-003-0183-z}, number={3}, journal={REQUIREMENTS ENGINEERING}, author={Anton, AI and Earp, JB}, year={2004}, month={Aug}, pages={169–185} } @article{anton_earp_he_stufflebeam_bolchini_jensen_2004, title={Financial privacy policies and the need for standardization}, volume={2}, ISSN={["1558-4046"]}, DOI={10.1109/MSECP.2004.1281243}, number={2}, journal={IEEE SECURITY & PRIVACY}, author={Anton, AI and Earp, JB and He, QF and Stufflebeam, W and Bolchini, D and Jensen, C}, year={2004}, pages={36–45} } @article{anton_he_baumer_2004, title={Inside JetBlue's privacy policy violations}, volume={2}, number={6}, journal={IEEE Security & Privacy}, author={Anton, A. I. and He, Q. F. and Baumer, D. L.}, year={2004}, pages={18-} } @article{hope_mcgraw_anton_2004, title={Misuse and abuse cases: Getting past the positive}, volume={2}, ISSN={["1558-4046"]}, DOI={10.1109/MSP.2004.17}, number={3}, journal={IEEE SECURITY & PRIVACY}, author={Hope, P and McGraw, G and Anton, AI}, year={2004}, pages={90–92} } @article{anton_potts_2003, title={Functional paleontology: The evolution of user-visible system services}, volume={29}, ISSN={["1939-3520"]}, DOI={10.1109/TSE.2003.1178053}, number={2}, journal={IEEE TRANSACTIONS ON SOFTWARE ENGINEERING}, author={Anton, AI and Potts, C}, year={2003}, month={Feb}, pages={151–166} } @article{anton_earp_carter_2003, title={Precluding incongruous behavior by aligning software requirements with security and privacy policies}, volume={45}, ISSN={["1873-6025"]}, DOI={10.1016/S0950-5849(03)00095-8}, number={14}, journal={INFORMATION AND SOFTWARE TECHNOLOGY}, author={Anton, AI and Earp, JB and Carter, RA}, year={2003}, month={Nov}, pages={967–977} } @article{anton_2003, title={Successful software projects need requirements planning}, volume={20}, ISSN={["0740-7459"]}, DOI={10.1109/MS.2003.1196319}, number={3}, journal={IEEE SOFTWARE}, author={Anton, AI}, year={2003}, pages={44-+} }