1. Sommerville, I., Sawyer, P., Viller, S.: Viewpoints for requirements elicitation a practical approach. In: IEEE International Symposium on Requirements Engineering, pp. 74–81 (1998)
2. Lindvall, M., Basili, V.R., Boehm, B.W., Costa, P., Dangle, K., Shull, F., Tesoriero, R., Williams, L.A., Zelkowitz, M.V.: Empirical findings in Agile methods. In: XP Universe and Agile Universe Conference on Extreme Programming and Agile Methods, 197–207 (2002)
3. Shreyas, D.: Software engineering for security - towards architecting secure software. In: ICS 221 Seminar in Software Engineering, University of California, Irvine, pp. 1–12 (2001)
4. Rittinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation, Management, and Security. CRC Press, Boca Raton (2010)
5. Goel, R., Govil, M.C., Singh, G.: Imbibing security in software development life cycle: a review paper. In: Afro - Asian International Conference on Science, Engineering and Technology, pp. 593–599 (2015)