Travis D. Breaux
Orcid: 0000-0001-7127-8155Affiliations:
- Carnegie Mellon University, Pittsburgh, Institute of Software Research, Pittsburgh, PA, USA
According to our database1,
Travis D. Breaux
authored at least 88 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Software Eng., January, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the 32nd IEEE International Requirements Engineering Conference, 2024
Proceedings of the 32nd IEEE International Requirements Engineering Conference, 2024
Toward Regulatory Compliance: A few-shot Learning Approach to Extract Processing Activities.
Proceedings of the 32nd IEEE International Requirements Engineering Conference, 2024
2023
ACM Trans. Softw. Eng. Methodol., July, 2023
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2023
2022
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements.
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the 30th IEEE International Requirements Engineering Conference Workshops, 2022
Proceedings of the 30th IEEE International Requirements Engineering Conference, 2022
2021
Analyzing privacy policies through syntax-driven semantic analysis of information types.
Inf. Softw. Technol., 2021
Proceedings of the 29th IEEE International Requirements Engineering Conference, 2021
2020
Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
2019
RSL-IL4Privacy: a domain-specific language for the rigorous specification of privacy policies.
Requir. Eng., 2019
Requir. Eng., 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 27th IEEE International Requirements Engineering Conference, 2019
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
2018
ACM Trans. Comput. Hum. Interact., 2018
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2018
Proceedings of the 26th IEEE International Requirements Engineering Conference, 2018
Proceedings of the 40th International Conference on Software Engineering, 2018
2017
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017
2016
ACM Trans. Softw. Eng. Methodol., 2016
it Inf. Technol., 2016
J. Cybersecur., 2016
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016
Toward a framework for detecting privacy policy violations in android application code.
Proceedings of the 38th International Conference on Software Engineering, 2016
Improving the Specification and Analysis of Privacy Policies - The RSLingo4Privacy Approach.
Proceedings of the ICEIS 2016, 2016
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016
Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security, 2016
Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016
2015
How have we evaluated software pattern application? A systematic mapping study of research design practices.
Inf. Softw. Technol., 2015
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015
Proceedings of the Eighth IEEE International Workshop on Requirements Engineering and Law, 2015
Detecting repurposing and over-collection in multi-party privacy requirements specifications.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015
Proceedings of the Eighth IEEE International Workshop on Requirements Engineering and Law, 2015
2014
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements.
Requir. Eng., 2014
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014
Proceedings of the IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering, 2014
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014
Proceedings of the IEEE 22nd International Requirements Engineering Conference, 2014
Less is more?: investigating the role of examples in security studies using analogical transfer.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the Seconf AAAI Conference on Human Computation and Crowdsourcing, 2014
2013
A cross-domain empirical study and legal evaluation of the requirements water marking method.
Requir. Eng., 2013
IEEE Secur. Priv., 2013
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2013
Proceedings of the Sixth International Workshop on Requirements Engineering and Law, 2013
Proceedings of the 21st IEEE International Requirements Engineering Conference, 2013
Proceedings of the 21st IEEE International Requirements Engineering Conference, 2013
Proceedings of the Sixth International Workshop on Requirements Engineering and Law, 2013
Proceedings of the Sixth International Workshop on Requirements Engineering and Law, 2013
2012
Reconciling multi-jurisdictional legal requirements: A case study in requirements water marking.
Proceedings of the 2012 20th IEEE International Requirements Engineering Conference (RE), 2012
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns.
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012
2011
Comput. Secur., 2011
Proceedings of the Fourth International Workshop on Requirements Engineering and Law, 2011
Proceedings of the Fourth International Workshop on Requirements Engineering and Law, 2011
Managing multi-jurisdictional requirements in the cloud: towards a computational legal landscape.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
2010
Proceedings of the Third International Workshop on Requirements Engineering and Law, 2010
2009
A distributed requirements management framework for legal compliance and accountability.
Comput. Secur., 2009
Identifying vulnerabilities and critical requirements using criminal court proceedings.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Exercising Due Diligence in Legal Requirements Acquisition: A Tool-supported, Frame-Based Approach.
Proceedings of the RE 2009, 17th IEEE International Requirements Engineering Conference, Atlanta, Georgia, USA, August 31, 2009
Early Studies in Acquiring Evidentiary, Reusable Business Process Models for Legal Compliance.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
2008
IEEE Trans. Software Eng., 2008
ACM Trans. Softw. Eng. Methodol., 2008
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008
Proceedings of the Conceptual Modeling, 2008
2007
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007
2006
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations.
Proceedings of the 14th IEEE International Conference on Requirements Engineering (RE 2006), 2006
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006
2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August, 2005
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005