1 Governatori , G. ; Milosevic , Z ., "A formal analysis of a business contract language", 15 , 659 ? 685 ., 2006
2 Sindre G , Opdahl AL, "Eliciting security requirements with misuse cases .", 10 ( 1 ) :34 ? 44, 2005
3 Dwyer , S.J. , III ; Weaver , A.C. ; Hughes , K.K ., "Health insurance portability and accountability act .", 72 , 9 ? 18 ., 2004
4 Zou , W. ; Lo , D. ; Kochhar , P.S . ; Le , X.B . ; Xia , X. ; Feng , Y. ; Chen , Z. ; Xu , B ., "Smart contract development : Challenges and opportunities", 47 , 2084 ? 2106 ., 2019
5 Clack , C.D, "Smart contract templates : Legal semantics and code validations .", 2 , 338 ? 352 ., 2018
6 Tang , J. , Cui , Y. , Li , Q. , Ren , K. , Liu , J. , Buyya , R., "Ensuring security and privacy preservation for cloud data services .", 49 ( 1 ) , 1 ? 39, 2016
7 Rong , C. , Nguyen , S.T. , Jaatun , M.G ., "Beyond lightning : a survey on security challenges in cloud computing .", 39 ( 1 ) , 47 ? 54, 2013
8 Liu L , Eric SK , Mylopoulos J, "Secure-I * : Engineering Secure Software Systems through Social Analysis", 3 ( 1 ) :89 ? 120, 2009
9 Esposito , C. ; De Santis , A. ; Tortora , G. ; Chang , H. ; Choo , K.K ., "Blockchain : A panacea for healthcare cloud-based data security and privacy ?", 5 , 31 ? 37 ., 2018
10 Yu ESK, "Towards modelling and reasoning support for early-phase requirements engineering", 226 ? 235, 1997
1 Governatori , G. ; Milosevic , Z ., "A formal analysis of a business contract language", 15 , 659 ? 685 ., 2006
2 Sindre G , Opdahl AL, "Eliciting security requirements with misuse cases .", 10 ( 1 ) :34 ? 44, 2005
3 Dwyer , S.J. , III ; Weaver , A.C. ; Hughes , K.K ., "Health insurance portability and accountability act .", 72 , 9 ? 18 ., 2004
4 Zou , W. ; Lo , D. ; Kochhar , P.S . ; Le , X.B . ; Xia , X. ; Feng , Y. ; Chen , Z. ; Xu , B ., "Smart contract development : Challenges and opportunities", 47 , 2084 ? 2106 ., 2019
5 Clack , C.D, "Smart contract templates : Legal semantics and code validations .", 2 , 338 ? 352 ., 2018
6 Tang , J. , Cui , Y. , Li , Q. , Ren , K. , Liu , J. , Buyya , R., "Ensuring security and privacy preservation for cloud data services .", 49 ( 1 ) , 1 ? 39, 2016
7 Rong , C. , Nguyen , S.T. , Jaatun , M.G ., "Beyond lightning : a survey on security challenges in cloud computing .", 39 ( 1 ) , 47 ? 54, 2013
8 Liu L , Eric SK , Mylopoulos J, "Secure-I * : Engineering Secure Software Systems through Social Analysis", 3 ( 1 ) :89 ? 120, 2009
9 Esposito , C. ; De Santis , A. ; Tortora , G. ; Chang , H. ; Choo , K.K ., "Blockchain : A panacea for healthcare cloud-based data security and privacy ?", 5 , 31 ? 37 ., 2018
10 Yu ESK, "Towards modelling and reasoning support for early-phase requirements engineering", 226 ? 235, 1997
11 Aceituna , D. ; Walia , G. ; Do , H. ; Lee , S.W, "Model-based requirements verification method : Conclusions from two controlled experiments", 56 , 321 ? 334 ., 2014
12 Ruxton , G.D, "The unequal variance t-test is an underused alternative to Student s ttest and the Mann ? Whitney U test", 17 , 688 ? 690, 2006
13 Van Lamsweerde A , Brohez S , De Landtsheer R , Janssens D, "From system goals to intruder antigoals : attack generation and resolution for security requirements engineering", 3 , 49 ? 56, 2003
14 Kert ? sz , A. , Kecskemeti , G. , Brandic , I. :, "An interoperable and self-adaptive approach for SLA-based service virtualization in heterogeneous cloud environments .", 32 , 54 ? 68, 2014
15 Singh , I. ; Lee , S.W ., "RE_BBC : Requirements Engineering in a Blockchain-Based Cloud System : Its Role in Service-Level Agreement Specification .", 37 , 7 ? 12 ., 2020