1. Kazman, R., Klein, M., & Clements, P. (2000). ATAM: Method for architectural
evaluation (CMU SEI-2000-TR-004). Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University.
2. Liu, L., & Yu, E. (2003). Designing information systems in social context: A goal and scenario modelling approach. Information Systems, 29(2), 187–203.
3. Liu, L., & Yu, E. (2004). Intentional modelling to support identity management. In P.
Atzeni et al. (Eds.), Proceedings of the 23rd International Conference on Conceptual Modelling (ER 2004) (pp. 555–566). LNCS 3288. Berlin, Heidelberg: Springer-Verlag.
4. Liu, L., Yu, E., & Mylopoulos, J. (2002, October 16). Analyzing security
requirements as relationships among strategic actors. The 2nd Symposium on
Requirements Engineering for Information Security (SREIS’02). Raleigh, NC.
5. Liu, L., Yu, E., & Mylopoulos, J. (2003, September). Security and privacy requirements analysis within a social setting. Proceedings of International Conference on Requirements Engineering (RE’03) (pp. 151–161). Monterey, CA.
6. Lodderstedt, T., Basin, D.A., J, & Doser, R. (2002). SecureUML: A UML-based
modelling language for model-driven security. Proceedings of UML ‘02: Proceedings
of the 5th International Conference on The Unified Modelling Language, Dresden, Germany (pp. 426–441).