1. Lecture Notes in Computer Science;K Beckers,2012
2. Faßbender, S., Heisel, M.: From problems to laws in requirements engineering using model-transformation. In: ICSOFT 2013 - Proceedings of the 8th International Conference on Software Paradigm Trends, INSTICC. pp. 447–458. SciTePress (2013)
3. Federal Trade Commission: Choicepoint settles data security breach charges. Technical report, Federal Trade Commission (2006).
http://www.ftc.gov/opa/2006/01/choicepoint.shtm
4. Biagioli, C., Mariani, P., Tiscornia, D.: Esplex: A rule and conceptual model for representing statutes. In: ICAIL, pp. 240–251. ACM (1987)
5. Otto, P.N., Antón, A.I.: Addressing legal requirements in requirements engineering. In: Proceedings of the International Conference on Requirements Engineering. IEEE (2007)