default search action
Travis D. Breaux
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, Institute of Software Research, Pittsburgh, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j23]Yuchen Shen, Travis D. Breaux:
Stakeholder Preference Extraction From Scenarios. IEEE Trans. Software Eng. 50(1): 69-84 (2024) - 2023
- [j22]Marco Robol, Travis D. Breaux, Elda Paja, Paolo Giorgini:
Consent Verification Monitoring. ACM Trans. Softw. Eng. Methodol. 32(1): 2:1-2:33 (2023) - [j21]Xueling Zhang, John Heaps, Rocky Slavin, Jianwei Niu, Travis D. Breaux, Xiaoyin Wang:
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data. ACM Trans. Softw. Eng. Methodol. 32(4): 89:1-89:34 (2023) - 2022
- [j20]Hanan Hibshi, Stephanie T. Jones, Travis D. Breaux:
A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements. IEEE Trans. Dependable Secur. Comput. 19(6): 3579-3591 (2022) - 2021
- [j19]Travis D. Breaux, Jennifer Moritz:
The 2021 software developer shortage is coming. Commun. ACM 64(7): 39-41 (2021) - [j18]Mitra Bokaei Hosseini, Travis D. Breaux, Rocky Slavin, Jianwei Niu, Xiaoyin Wang:
Analyzing privacy policies through syntax-driven semantic analysis of information types. Inf. Softw. Technol. 138: 106608 (2021) - 2019
- [j17]João Caramujo, Alberto Rodrigues da Silva, Shaghayegh Monfared, André Ribeiro, Pável Calado, Travis D. Breaux:
RSL-IL4Privacy: a domain-specific language for the rigorous specification of privacy policies. Requir. Eng. 24(1): 1-26 (2019) - [j16]Jaspreet Bhatia, Morgan C. Evans, Travis D. Breaux:
Identifying incompleteness in privacy policy goals using semantic frames. Requir. Eng. 24(3): 291-313 (2019) - 2018
- [j15]Jaspreet Bhatia, Travis D. Breaux:
Empirical Measurement of Perceived Privacy Risk. ACM Trans. Comput. Hum. Interact. 25(6): 34:1-34:47 (2018) - 2016
- [j14]Hanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie A. Williams:
A grounded analysis of experts' decision-making during security assessments. J. Cybersecur. 2(2): 147-163 (2016) - [j13]Florian Schaub, Travis D. Breaux, Norman M. Sadeh:
Crowdsourcing privacy policy analysis: Potential, challenges and best practices. it Inf. Technol. 58(5): 229-236 (2016) - [j12]Jaspreet Bhatia, Travis D. Breaux, Florian Schaub:
Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition. ACM Trans. Softw. Eng. Methodol. 25(3): 22:1-22:24 (2016) - 2015
- [j11]Maria Riaz, Travis D. Breaux, Laurie A. Williams:
How have we evaluated software pattern application? A systematic mapping study of research design practices. Inf. Softw. Technol. 65: 14-38 (2015) - 2014
- [j10]Travis D. Breaux, Hanan Hibshi, Ashwini Rao:
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements. Requir. Eng. 19(3): 281-307 (2014) - [j9]Travis D. Breaux:
Privacy Requirements in an Age of Increased Sharing. IEEE Softw. 31(5): 24-27 (2014) - 2013
- [j8]Travis D. Breaux, David G. Gordon:
What Engineers Should Know about US Security and Privacy Law. IEEE Secur. Priv. 11(3): 72-76 (2013) - [j7]David G. Gordon, Travis D. Breaux:
A cross-domain empirical study and legal evaluation of the requirements water marking method. Requir. Eng. 18(2): 147-173 (2013) - 2011
- [j6]Travis D. Breaux, David L. Baumer:
Legally "reasonable" security requirements: A 10-year FTC retrospective. Comput. Secur. 30(4): 178-193 (2011) - [j5]Annie I. Antón, Travis D. Breaux, Stefanos Gritzalis, John Mylopoulos:
Digital privacy: theory, policies and technologies. Requir. Eng. 16(1): 1-2 (2011) - 2009
- [j4]Travis D. Breaux, Annie I. Antón, Eugene H. Spafford:
A distributed requirements management framework for legal compliance and accountability. Comput. Secur. 28(1-2): 8-17 (2009) - [j3]Travis D. Breaux, Annie I. Antón, Kent Boucher, Merlin Dorfman:
IT Compliance: Aligning Legal and Product Requirements. IT Prof. 11(5): 54-58 (2009) - 2008
- [j2]Travis D. Breaux, Annie I. Antón, Jon Doyle:
Semantic parameterization: A process for modeling domain descriptions. ACM Trans. Softw. Eng. Methodol. 18(2): 5:1-5:27 (2008) - [j1]Travis D. Breaux, Annie I. Antón:
Analyzing Regulatory Rules for Privacy and Security Requirements. IEEE Trans. Software Eng. 34(1): 5-20 (2008)
Conference and Workshop Papers
- 2024
- [c63]Sarah Santos, Travis D. Breaux, Thomas B. Norton, Sara Haghighi, Sepideh Ghanavati:
Requirements Satisfiability with In-Context Learning. RE 2024: 168-179 - [c62]Pragyan K. C, Rambod Ghandiparsi, Rocky Slavin, Sepideh Ghanavati, Travis D. Breaux, Mitra Bokaei Hosseini:
Toward Regulatory Compliance: A few-shot Learning Approach to Extract Processing Activities. RE Workshops 2024: 241-250 - [c61]Sarah Santos, Sara Haghighi, Sepideh Ghanavati, Travis D. Breaux, Thomas B. Norton:
Patterns of Inquiry in a Community Forum for Legal Compliance with Privacy Law. RE Workshops 2024: 251-259 - 2023
- [c60]Travis D. Breaux, Jennifer Moritz:
A Metric for Measuring Software Engineering Post-Graduate Outcomes. SEET@ICSE 2023: 283-295 - [c59]Tianjian Huang, Vaishnavi Kaulagi, Mitra Bokaei Hosseini, Travis D. Breaux:
Mobile Application Privacy Risk Assessments from User-authored Scenarios. RE 2023: 17-28 - 2022
- [c58]Travis D. Breaux, Thomas B. Norton:
Legal Accountability as Software Quality: A U.S. Data Processing Perspective. RE 2022: 101-113 - [c57]Yuchen Shen, Travis D. Breaux:
Domain Model Extraction from User-authored Scenarios and Word Embeddings. RE Workshops 2022: 143-151 - 2021
- [c56]Mitra Bokaei Hosseini, John Heaps, Rocky Slavin, Jianwei Niu, Travis D. Breaux:
Ambiguity and Generality in Natural Language Privacy Policies. RE 2021: 70-81 - 2020
- [c55]Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis D. Breaux, Jianwei Niu:
How does misconfiguration of analytic services compromise mobile privacy? ICSE 2020: 1572-1583 - [c54]Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Xiaoyin Wang, Jianwei Niu:
Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types. REFSQ 2020: 97-115 - 2019
- [c53]Xue Qin, Robert Neuhaus, Diego Gonzales, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Taming web views in the detection of Android privacy leaks. HotSoS 2019: 23:1-23:2 - [c52]John Heaps, Xueling Zhang, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Toward a reliability measurement framework automated using deep learning. HotSoS 2019: 25:1-25:2 - [c51]Marco Robol, Travis D. Breaux, Elda Paja, Paolo Giorgini:
Consent Verification Under Evolving Privacy Policies. RE 2019: 422-427 - [c50]John Heaps, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Toward Detection of Access Control Models from Source Code via Word Embedding. SACMAT 2019: 103-112 - 2018
- [c49]Xiaoyin Wang, Xue Qin, Mitra Bokaei Hosseini, Rocky Slavin, Travis D. Breaux, Jianwei Niu:
GUILeak: tracing privacy policy claims on user input data for Android applications. ICSE 2018: 37-47 - [c48]Jaspreet Bhatia, Travis D. Breaux:
Semantic Incompleteness in Privacy Policy Goals. RE 2018: 159-169 - [c47]Mitra Bokaei Hosseini, Travis D. Breaux, Jianwei Niu:
Inferring Ontology Fragments from Semantic Role Typing of Lexical Variants. REFSQ 2018: 39-56 - 2017
- [c46]Hanan Hibshi, Travis D. Breaux:
Reinforcing Security Requirements with Multifactor Quality Measurement. RE 2017: 144-153 - [c45]Morgan C. Evans, Jaspreet Bhatia, Sudarshan Wadkar, Travis D. Breaux:
An Evaluation of Constituency-Based Hyponymy Extraction from Privacy Policies. RE 2017: 312-321 - [c44]Jaspreet Bhatia, Travis D. Breaux:
A Data Purpose Case Study of Privacy Policies. RE 2017: 394-399 - 2016
- [c43]Mitra Bokaei Hosseini, Sudarshan Wadkar, Travis D. Breaux, Jianwei Niu:
Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies. AAAI Fall Symposia 2016 - [c42]Jaspreet Bhatia, Travis D. Breaux, Liora Friedberg, Hanan Hibshi, Daniel Smullen:
Privacy Risk in Cybersecurity Data Sharing. WISCS@CCS 2016: 57-64 - [c41]Daniel Smullen, Travis D. Breaux:
Modeling, analyzing, and consistency checking privacy requirements using eddy. HotSoS 2016: 118-120 - [c40]Alberto Rodrigues da Silva, João Caramujo, Shaghayegh Monfared, Pável Calado, Travis D. Breaux:
Improving the Specification and Analysis of Privacy Policies - The RSLingo4Privacy Approach. ICEIS (1) 2016: 336-347 - [c39]Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu:
Toward a framework for detecting privacy policy violations in android application code. ICSE 2016: 25-36 - [c38]Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu:
PVDetector: a detector of privacy-policy violations for Android apps. MOBILESoft 2016: 299-300 - [c37]Jaspreet Bhatia, Morgan C. Evans, Sudarshan Wadkar, Travis D. Breaux:
Automated Extraction of Regulated Information Types Using Hyponymy Relations. RE Workshops 2016: 19-25 - [c36]Jaspreet Bhatia, Travis D. Breaux, Joel R. Reidenberg, Thomas B. Norton:
A Theory of Vagueness and Privacy Risk Perception. RE 2016: 26-35 - [c35]Hanan Hibshi, Travis D. Breaux, Christian Wagner:
Improving security requirements adequacy. SSCI 2016: 1-8 - 2015
- [c34]Jaspreet Bhatia, Travis D. Breaux:
Towards an information type lexicon for privacy policies. RELAW 2015: 19-24 - [c33]Sepideh Ghanavati, Travis D. Breaux:
Comparing and analyzing definitions in multi-jurisdictions. RELAW 2015: 47-56 - [c32]Hanan Hibshi, Travis D. Breaux, Stephen B. Broomell:
Assessment of risk perception in security requirements composition. RE 2015: 146-155 - [c31]Travis D. Breaux, Daniel Smullen, Hanan Hibshi:
Detecting repurposing and over-collection in multi-party privacy requirements specifications. RE 2015: 166-175 - 2014
- [c30]Florian Schaub, Travis D. Breaux, Norman M. Sadeh:
Crowdsourcing the Extraction of Data Practices from Privacy Policies. HCOMP 2014: 56-57 - [c29]Ashwini Rao, Hanan Hibshi, Travis D. Breaux, Jean-Michel Lehker, Jianwei Niu:
Less is more?: investigating the role of examples in security studies using analogical transfer. HotSoS 2014: 7 - [c28]Hanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie A. Williams:
Towards a framework to measure security expertise in requirements analysis. ESPRE 2014: 13-18 - [c27]Travis D. Breaux, Florian Schaub:
Scaling requirements extraction to the crowd: Experiments with privacy policies. RE 2014: 163-172 - [c26]Rocky Slavin, Jean-Michel Lehker, Jianwei Niu, Travis D. Breaux:
Managing security requirements patterns using feature diagram hierarchies. RE 2014: 193-202 - [c25]David G. Gordon, Travis D. Breaux:
The role of legal expertise in interpretation of legal requirements and definitions. RE 2014: 273-282 - 2013
- [c24]Travis D. Breaux, David G. Gordon, Nick Papanikolaou, Siani Pearson:
Mapping legal requirements to IT controls. RELAW 2013: 11-20 - [c23]Travis D. Breaux, Ashwini Rao:
Formal analysis of privacy requirements specifications for multi-tier applications. RE 2013: 14-20 - [c22]Ivan Jureta, Travis D. Breaux, Alberto Siena, David G. Gordon:
Toward benchmarks to assess advancement in legal requirements modeling. RELAW 2013: 25-33 - [c21]Travis D. Breaux, David G. Gordon:
Preserving traceability and encoding meaning in legal requirements extraction. RELAW 2013: 57-60 - [c20]David G. Gordon, Travis D. Breaux:
Assessing regulatory change through legal requirements coverage modeling. RE 2013: 145-154 - [c19]Travis D. Breaux, David G. Gordon:
Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications. REFSQ 2013: 141-157 - 2012
- [c18]Travis D. Breaux, Hanan Hibshi, Ashwini Rao, Jean-Michel Lehker:
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns. RePa 2012: 41-47 - [c17]David G. Gordon, Travis D. Breaux:
Reconciling multi-jurisdictional legal requirements: A case study in requirements water marking. RE 2012: 91-100 - 2011
- [c16]David G. Gordon, Travis D. Breaux:
Managing multi-jurisdictional requirements in the cloud: towards a computational legal landscape. CCSW 2011: 83-94 - [c15]Travis D. Breaux, Thomas A. Alspaugh:
Governance and accountability in the new data ecology. RELAW 2011: 5-14 - [c14]David G. Gordon, Travis D. Breaux:
Comparing requirements from multiple jurisdictions. RELAW 2011: 43-49 - 2010
- [c13]Travis D. Breaux:
A method to acquire compliance monitors from regulations. RELAW 2010: 17-26 - 2009
- [c12]Travis D. Breaux, Calvin Powers:
Early Studies in Acquiring Evidentiary, Reusable Business Process Models for Legal Compliance. ITNG 2009: 272-277 - [c11]Travis D. Breaux:
Exercising Due Diligence in Legal Requirements Acquisition: A Tool-supported, Frame-Based Approach. RE 2009: 225-230 - [c10]Travis D. Breaux, Jonathan D. Lewis, Paul N. Otto, Annie I. Antón:
Identifying vulnerabilities and critical requirements using criminal court proceedings. SAC 2009: 355-359 - 2008
- [c9]Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breaux, Annie I. Antón, James R. Cordy, Luisa Mich, John Mylopoulos:
Automating the Extraction of Rights and Obligations for Regulatory Compliance. ER 2008: 154-168 - [c8]Travis D. Breaux, Annie I. Antón, Kent Boucher, Merlin Dorfman:
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility. RE 2008: 43-52 - 2007
- [c7]Nadzeya Kiyavitskaya, Nicola Zeni, Travis D. Breaux, Annie I. Antón, James R. Cordy, Luisa Mich, John Mylopoulos:
Extracting rights and obligations from regulations: toward a tool-supported process. ASE 2007: 429-432 - 2006
- [c6]Travis D. Breaux, Annie I. Antón, Clare-Marie Karat, John Karat:
Enforceability vs. Accountability in Electronic Policies. POLICY 2006: 227-230 - [c5]Travis D. Breaux, Matthew W. Vail, Annie I. Antón:
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations. RE 2006: 46-55 - 2005
- [c4]Travis D. Breaux, Joel W. Reed:
Using Ontology in Hierarchical Information Clustering. HICSS 2005 - [c3]Travis D. Breaux, Annie I. Antón:
Deriving Semantic Models from Privacy Policies. POLICY 2005: 67-76 - [c2]Travis D. Breaux, Annie I. Antón:
Analyzing Goal Semantics for Rights, Permissions, and Obligations. RE 2005: 177-188 - [c1]Travis D. Breaux, Annie I. Antón:
Mining rule semantics to understand legislative compliance. WPES 2005: 51-54
Editorship
- 2021
- [e4]Fatma Basak Aydemir, Catarina Gralha, Maya Daneva, Eduard C. Groen, Andrea Herrmann, Patrick Mennig, Sallam Abualhaija, Alessio Ferrari, Jin Guo, Renata S. S. Guizzardi, Jennifer Horkoff, Anna Perini, Angelo Susi, Travis D. Breaux, Xavier Franch, Neil A. Ernst, Elda Paja, Norbert Seyff:
Joint Proceedings of REFSQ 2021 Workshops, OpenRE, Poster and Tools Track, and Doctoral Symposium co-located with the 27th International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2021), Essen, Germany, April 12, 2021. CEUR Workshop Proceedings 2857, CEUR-WS.org 2021 [contents] - 2020
- [e3]Travis D. Breaux, Andrea Zisman, Samuel Fricker, Martin Glinz:
28th IEEE International Requirements Engineering Conference, RE 2020, Zurich, Switzerland, August 31 - September 4, 2020. IEEE 2020, ISBN 978-1-7281-7438-9 [contents] - 2014
- [e2]Daniel Amyot, Annie I. Antón, Travis D. Breaux, Aaron K. Massey, Alberto Siena:
IEEE 7th International Workshop on Requirements Engineering and Law, RELAW 2014, 26-26 August, 2014, Karlskrona, Sweden. IEEE Computer Society 2014, ISBN 978-1-4799-6325-6 [contents] - 2013
- [e1]Daniel Amyot, Annie I. Antón, Travis D. Breaux, Aaron K. Massey, Peter P. Swire:
Sixth International Workshop on Requirements Engineering and Law, RELAW 2013, 16 July, 2013, Rio de Janeiro, Brasil. IEEE Computer Society 2013, ISBN 978-1-4799-0950-6 [contents]
Informal and Other Publications
- 2024
- [i5]Sarah Santos, Travis D. Breaux, Thomas B. Norton, Sara Haghighi, Sepideh Ghanavati:
Requirements Satisfiability with In-Context Learning. CoRR abs/2404.12576 (2024) - [i4]Pragyan K. C, Rambod Ghandiparsi, Rocky Slavin, Sepideh Ghanavati, Travis D. Breaux, Mitra Bokaei Hosseini:
Toward Regulatory Compliance: A few-shot Learning Approach to Extract Processing Activities. CoRR abs/2407.09592 (2024) - [i3]Ateeq Sharfuddin, Travis D. Breaux:
Language models are robotic planners: reframing plans as goal refinement graphs. CoRR abs/2407.15677 (2024) - [i2]Pragyan K. C, Rocky Slavin, Sepideh Ghanavati, Travis D. Breaux, Mitra Bokaei Hosseini:
An Analysis of Automated Use Case Component Extraction from Scenarios using ChatGPT. CoRR abs/2408.03395 (2024) - 2022
- [i1]Marco Robol, Travis D. Breaux, Elda Paja, Paolo Giorgini:
Consent verification monitoring. CoRR abs/2206.06406 (2022)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-14 02:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint