1. Antón, A., Earp, J., Reese, A.: Analyzing website privacy requirements using privacy goal taxonomy. In: Proc. of the IEEE Joint International Conference on RE, pp. 23–31 (2002)
2. Siena, J., Mylopoulos, A., Susi, A.: Towards a framework for law-compliant software requirements. In: Proc. of the 31st International Conference on Software Engineering (ICSE 2009), Vancouver, Canada (2009)
3. Bundesdatenschutzgesetz - Federal Data Protection Act (as of November 15, 2006)
4. Mouratidis, H., Giorgini, P.: Secure Tropos: A Security-Oriented Extension of the Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering. © World Scientific Publishing Company
5. Mouratidis, H., Giorgini, P.: Security Attack Testing (SAT) - testing the security of information systems at design time. Inf. Syst. 32(8), 1166–1183 (2007)