Proceedings Fifth IEEE International Symposium on Requirements Engineering
Like what you’re reading?
Already a member?Sign In
Related Articles
- Security and Privacy Requirements Engineering Revisited in the Big Data Era
2016 IEEE 24th International Requirements Engineering Conference Workshops (REW) - Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
2014 IEEE 22nd International Requirements Engineering Conference (RE) - Security and Privacy Requirements Analysis within a Social Setting
Proceedings. 11th IEEE International Requirements Engineering Conference, 2003. - Meta-patterns: Revealing Hidden Periodic Patterns
Proceedings 2001 IEEE International Conference on Data Mining - Meta-analysis of big data security and privacy: Scholarly literature gaps
2016 IEEE International Conference on Big Data (Big Data) - Towards privacy-preserving access control with hidden policies, hidden credentials and hidden decisions
2012 Tenth Annual International Conference on Privacy, Security and Trust - Assurance of Security and Privacy Requirements for Cloud Deployment Models
IEEE Transactions on Cloud Computing - Analyzing Regulatory Rules for Privacy and Security Requirements
IEEE Transactions on Software Engineering - Privacy, Security, Soft Requirements, and Flaky Tests
IEEE Software - Towards Detecting and Mitigating Conflicts for Privacy and Security Requirements
2019 13th International Conference on Research Challenges in Information Science (RCIS)