Ana Anton Maxwell, J. C., Anton, A. I., Swire, P., Riaz, M., & McCraw, C. M. (2012). A legal cross-references taxonomy for reasoning about compliance requirements. REQUIREMENTS ENGINEERING, 17(2), 99–115. https://doi.org/10.1007/s00766-012-0152-5 Maxwell, J. C., Anton, A. I., & Swire, P. (2011). A legal cross-references taxonomy for identifying conflicting software requirements. 2011 19th ieee international requirements engineering conference (re), 197–206. https://doi.org/10.1109/re.2011.6051647 Massey, A. K., Smith, B., Otto, P. N., & Anton, A. I. (2011). Assessing the accuracy of legal implementation readiness decisions. 2011 19th ieee international requirements engineering conference (re), 207–216. https://doi.org/10.1109/re.2011.6051661 Anton, A. I., Breaux, T. D., Gritzalis, S., & Mylopoulos, J. (2011, March). Digital privacy: theory, policies and technologies. REQUIREMENTS ENGINEERING, Vol. 16, pp. 1–2. https://doi.org/10.1007/s00766-011-0117-0 Massey, A. K., Otto, P. N., Hayward, L. J., & Anton, A. I. (2010). Evaluating existing security and privacy requirements for legal compliance. REQUIREMENTS ENGINEERING, 15(1), 119–137. https://doi.org/10.1007/s00766-009-0089-5 Anton, A. I., Earp, J. B., & Young, J. D. (2010). How internet users' privacy concerns have evolved since 2002. IEEE Security & Privacy Magazine, 8(1), 21–27. https://doi.org/10.1109/msp.2010.38 Breaux, T. D., Anton, A. I., & Spafford, E. H. (2009). A distributed requirements management framework for legal compliance and accountability. COMPUTERS & SECURITY, 28(1-2), 8–17. https://doi.org/10.1016/j.cose.2008.08.001 Maxwell, J. C., & Anton, A. I. (2009). Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts. PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, pp. 101–110. https://doi.org/10.1109/re.2009.21 He, Q., & Anton, A. I. (2009). Requirements-based Access Control Analysis and Policy Specification (ReCAPS). INFORMATION AND SOFTWARE TECHNOLOGY, 51(6), 993–1009. https://doi.org/10.1016/j.infsof.2008.11.005 Breaux, T. D., & Anton, A. I. (2008). Analyzing regulatory rules for privacy and security requirements. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 34(1), 5–20. https://doi.org/10.1109/TSE.2007.70746 Alspaugh, T. A., & Anton, A. I. (2008). Scenario support for effective requirements. INFORMATION AND SOFTWARE TECHNOLOGY, 50(3), 198–220. https://doi.org/10.1016/j.infsof.2006.12.003 Breaux, T. D., Anton, A. I., & Doyle, J. (2008). Semantic Parameterization: A Process for Modeling Domain Descriptions. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 18(2). https://doi.org/10.1145/1416563.1416565 Anton, A. I., Bertino, E., Li, N., & Yu, T. (2007). A roadmap for COMPREHENSIVE online privacy policy management. COMMUNICATIONS OF THE ACM, 50(7), 109–116. https://doi.org/10.1145/1272516.1272522 Anton, A. I., Earp, J. B., Vail, M. W., Jain, N., Gheen, C. M., & Frink, J. M. (2007). HIPAA's effect on web site privacy policies. IEEE SECURITY & PRIVACY, 5(1), 45–52. https://doi.org/10.1109/MSP.2007.7 Otto, P. N., Anton, A. I., & Baumer, D. L. (2007). The ChoicePoint dilemma - How data brokers should handle the privacy of personal information. IEEE SECURITY & PRIVACY, 5(5), 15–23. https://doi.org/10.1109/MSP.2007.126 Li, N., Yu, T., & Anton, A. (2006). A semantics based approach to privacy languages. Computer Systems Science and Engineering, 21(5), 339–352. Earp, J. B., Anton, A. I., Aiman-Smith, L., & Stufflebeam, W. H. (2005). Examining Internet privacy policies within the context of user privacy values. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 52(2), 227–237. https://doi.org/10.1109/tem.2005.844927 Anton, A. I., & Earp, J. B. (2004). A requirements taxonomy for reducing Web site privacy vulnerabilities. REQUIREMENTS ENGINEERING, 9(3), 169–185. https://doi.org/10.1007/s00766-003-0183-z Anton, A. I., Earp, J. B., He, Q. F., Stufflebeam, W., Bolchini, D., & Jensen, C. (2004). Financial privacy policies and the need for standardization. IEEE SECURITY & PRIVACY, 2(2), 36–45. https://doi.org/10.1109/MSECP.2004.1281243 Anton, A. I., He, Q. F., & Baumer, D. L. (2004). Inside JetBlue's privacy policy violations. IEEE Security & Privacy, 2(6), 18-. Hope, P., McGraw, G., & Anton, A. I. (2004). Misuse and abuse cases: Getting past the positive. IEEE SECURITY & PRIVACY, Vol. 2, pp. 90–92. https://doi.org/10.1109/MSP.2004.17 Anton, A. I., & Potts, C. (2003, February). Functional paleontology: The evolution of user-visible system services. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, Vol. 29, pp. 151–166. https://doi.org/10.1109/TSE.2003.1178053 Anton, A. I., Earp, J. B., & Carter, R. A. (2003, November 1). Precluding incongruous behavior by aligning software requirements with security and privacy policies. INFORMATION AND SOFTWARE TECHNOLOGY, Vol. 45, pp. 967–977. https://doi.org/10.1016/S0950-5849(03)00095-8 Anton, A. I. (2003). Successful software projects need requirements planning. IEEE SOFTWARE, Vol. 20, pp. 44-+. https://doi.org/10.1109/MS.2003.1196319