{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:53:58Z","timestamp":1725558838383},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201762"},{"type":"electronic","value":"9783540399810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/10958513_29","type":"book-chapter","created":{"date-parts":[[2006,7,6]],"date-time":"2006-07-06T11:00:21Z","timestamp":1152183621000},"page":"381-395","source":"Crossref","is-referenced-by-count":11,"title":["Towards a Business Process-Driven Framework for Security Engineering with the UML"],"prefix":"10.1007","author":[{"given":"Jos\u00e9 L.","family":"Vivas","sequence":"first","affiliation":[]},{"given":"Jos\u00e9 A.","family":"Montenegro","sequence":"additional","affiliation":[]},{"given":"Javier","family":"L\u00f3pez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"http:\/\/www.casenet-eu.org"},{"key":"29_CR2","first-page":"228","volume-title":"Fifth IEEE International Symposium on Requirements Engineering (RE 2001)","author":"K. Allenby","year":"2001","unstructured":"Allenby, K., Kelly, T.: Deriving safety requirements using scenarios. In: Fifth IEEE International Symposium on Requirements Engineering (RE 2001), pp. 228\u2013235. IEEE Computer Society Press, Los Alamitos (2001)"},{"issue":"11","key":"29_CR3","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/188280.188291","volume":"37","author":"R.J. Anderson","year":"1994","unstructured":"Anderson, R.J.: Why cryptosystems fail. Communications of the Association for Computing Machinery\u00a037(11), 32\u201340 (1994)","journal-title":"Communications of the Association for Computing Machinery"},{"key":"29_CR4","unstructured":"Brose, G., Koch, M., L\u00f6hr, K.-P.: Integrating security policy design into the software development process. Technical Report B-01-06, Institut f\u00fcr Informatik,Freie Universit\u00e4t Berlin (November 2001)"},{"key":"29_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/3-540-44895-0_7","volume-title":"Business Process Management","author":"M. Chaudron","year":"2003","unstructured":"Chaudron, M., van Hee, K., Somers, L.: Use cases as workflows. In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol.\u00a02678, pp. 88\u2013103. Springer, Heidelberg (2003)"},{"key":"29_CR6","series-title":"Lecture Notes in Computer Science","first-page":"234","volume-title":"Advanced Information Systems Engineering","author":"L. Chung","year":"1993","unstructured":"Chung, L.: Dealing with security requirements during the development of information systems. In: Rolland, C., Cauvet, C., Bodart, F. (eds.) CAiSE 1993. LNCS, vol.\u00a0685, p. 234. Springer, Heidelberg (1993)"},{"issue":"9","key":"29_CR7","first-page":"153","volume":"35","author":"P. Coad","year":"1993","unstructured":"Coad, P.: Object-oriented patterns. Communications of the ACM\u00a035(9), 153\u2013159 (1993)","journal-title":"Communications of the ACM"},{"key":"29_CR8","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/336512.336559","volume-title":"Proceedings of the 22th International Conference on Software Engineering (ICSE 2000)","author":"P.T. Devanbu","year":"2000","unstructured":"Devanbu, P.T., Stubblebine, S.G.: Software engineering for security. In: Proceedings of the 22th International Conference on Software Engineering (ICSE 2000), June 4-11, pp. 227\u2013240. ACM Press, New York (2000)"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Dhillon, G.: Managing Information System Security. Macmillan education, Limited (1997)","DOI":"10.1007\/978-1-349-14454-9"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"OMG Document. OMG XML Metadata Interchange (XMI)Specification, v1.2 (2002)","DOI":"10.1016\/S1351-4180(02)00809-7"},{"key":"29_CR11","unstructured":"OMG Document. Initial Response to UML 2.0 OCL RFP ad\/ 00-09-03 (UML 2.0 OCL) (2003)"},{"key":"29_CR12","volume-title":"Business Modelling with UML: Business Patterns at Work","author":"H.-E. Eriksson","year":"2000","unstructured":"Eriksson, H.-E., Penker, M.: Business Modelling with UML: Business Patterns at Work. John Wiley & Sons, Chichester (2000)"},{"key":"29_CR13","unstructured":"Fallside, D.C.: XML Schema, W3C Recommendation (2001)"},{"key":"29_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/3-540-47910-4_21","volume-title":"ECOOP \u201993 - Object-Oriented Programming","author":"E. Gamma","year":"1993","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design patterns: Abstraction and reuse of object-oriented design. In: Nierstrasz, O. (ed.) ECOOP 1993. LNCS, vol.\u00a0707, pp. 406\u2013431. Springer, Heidelberg (1993)"},{"key":"29_CR15","volume-title":"Design Patterns","author":"E. Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns. Addison Wesley, Reading (1995)"},{"issue":"1-2","key":"29_CR16","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/S0004-3702(00)00031-X","volume":"121","author":"G. Giacomo De","year":"2000","unstructured":"De Giacomo, G., L\u00e9sperance, Y., Levesque, H.J.: ConGolog, A concurrent programming language based on situation calculus. Artificial Intelligence\u00a0121(1-2), 109\u2013169 (2000)","journal-title":"Artificial Intelligence"},{"key":"29_CR17","first-page":"57","volume":"143","author":"J. Hern\u00e1ndez","year":"2000","unstructured":"Hern\u00e1ndez, J., Pinto, J.: Especificaci\u00f3n formal de protocolos criptogr\u00e1ficos en c\u00e1lculo de situaciones. Novatica\u00a0143, 57\u201363 (2000)","journal-title":"Novatica"},{"key":"29_CR18","series-title":"Object Technology Series","volume-title":"The Unified Software Development Process","author":"I. Jacobson","year":"1999","unstructured":"Jacobson, I., Rumbaugh, J., Booch, G.: The Unified Software Development Process. Object Technology Series. Addison-Wesley, Reading (1999)"},{"key":"29_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-45314-8_14","volume-title":"Fundamental Approaches to Software Engineering","author":"J. J\u00fcrjens","year":"2001","unstructured":"J\u00fcrjens, J.: Towards development of secure systems using UMLsec. In: Hussmann, H. (ed.) FASE 2001. LNCS, vol.\u00a02029, p. 187. Springer, Heidelberg (2001)"},{"issue":"5","key":"29_CR20","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/S0306-4379(01)00055-2","volume":"27","author":"M. Koubarakis","year":"2002","unstructured":"Koubarakis, M., Plexousakis, D.: A formal framework for business process modeling and design. Information Systems\u00a027(5), 299\u2013319 (2002)","journal-title":"Information Systems"},{"key":"29_CR21","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/978-94-015-9204-8_12","volume-title":"Foundations of Rational Agency","author":"Y. Lesp\u00e9rance","year":"1999","unstructured":"Lesp\u00e9rance, Y., Levesque, H.J., Reiter, R.: A situation calculus approach to modeling and programming agents. In: Wooldridge, M.J., Rao, A. (eds.) Foundations of Rational Agency, pp. 275\u2013299. Kluwer Academic Publishers, Dordrecht (1999)"},{"key":"29_CR22","first-page":"463","volume":"4","author":"J. McCarthy","year":"1969","unstructured":"McCarthy, J., Hayes, P.J.: Some philosophical problems from the standpoint of artificial intelligence. Machine Intelligence\u00a04, 463\u2013502 (1969)","journal-title":"Machine Intelligence"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: 15th Annual Computer Security Applications Conference, ACSAC 1999 (1999)","DOI":"10.1109\/CSAC.1999.816013"},{"issue":"6","key":"29_CR24","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/32.142871","volume":"18","author":"J. Mylopoulos","year":"1992","unstructured":"Mylopoulos, J., Chung, L., Nixon, B.: Representing and using nonfunctional requirements: A process-oriented approach. IEEE Transactions on Software Engineering\u00a018(6), 483\u2013497 (1992); Special Issue on Knowledge Representation and Reasoning in Software Engineering","journal-title":"IEEE Transactions on Software Engineering"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"R\u00f6hm, A.W., Herrmann, G., Pernul, G.: A language for modelling secure business transactions. In: IEEE Annual Computer Security Application Conference (ACSAC 1999), Phoenix, USA (December 1999)","DOI":"10.1109\/CSAC.1999.816010"},{"key":"29_CR26","unstructured":"Rushby, J.: Security requirements specifications: How and what. In: Symposium on Requirements Engineering for Information Security (SREIS), Indianapolis, IN (March 2001)"},{"key":"29_CR27","unstructured":"Scherl, R., Levesque, H., Lesprance, Y.: The situation calculus with sensing and indexical knowledge. In: Koppel, M., Shamir, E. (eds.) Proceedings of BISFAI 1995: The Fourth Bar-Ilan Symposium on Foundations of Artificial Intelligence, Israel, Ramat Gan and Jerusalem, pp. 86\u201395 (1995)"},{"key":"29_CR28","series-title":"American Association for Artificial Intelligence","first-page":"695","volume-title":"Proceedings of the Eleventh National Conference on Artificial Intelligence","author":"R.B. Scherl","year":"1993","unstructured":"Scherl, R.B., Levesque, H.J.: The frame problem and knowledgeproducing actions. In: Fikes, R., Lehnert, W. (eds.) Proceedings of the Eleventh National Conference on Artificial Intelligence. American Association for Artificial Intelligence, pp. 695\u2013698. AAAI Press, Menlo Park (1993)"},{"key":"29_CR29","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"B. Schneier","year":"2000","unstructured":"Schneier, B.: Secrets and Lies: Digital Security in a Networked World. John Wiley and Sons, Inc., New York (2000)"},{"key":"29_CR30","unstructured":"Scumacher, M., Roedig, U.: Security engineering with patterns. In: Pattern Languages of Programs 2001, Monticello, IL (2001)"},{"key":"29_CR31","doi-asserted-by":"crossref","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements by misuse cases. In: Proc. TOOLS Pacific 2000, November 2000, pp. 174\u2013183 (2000)","DOI":"10.1109\/TOOLS.2000.891363"},{"key":"29_CR32","unstructured":"Siponen, M.: Designing secure information systems and software. Academic dissertation, University of Oulo (2002)"},{"key":"29_CR33","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/0-306-47007-1_8","volume-title":"Advances in Information Security Management & Small Systems Security","author":"M. Siponen","year":"2001","unstructured":"Siponen, M., Baskerville, R.: A new paradigm for adding security into is development methods. In: Eloff, J.H.P., Labuschagne, L., vom Solms, R., Dhillon, G. (eds.) Advances in Information Security Management & Small Systems Security, pp. 99\u2013111. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"29_CR34","unstructured":"Vaugh, R., Henning, R., Fox, K.: An empiricakl study of industrial security engineering practices. Journal of Systems and Software (November 2001)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10958513_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,19]],"date-time":"2019-04-19T21:14:29Z","timestamp":1555708469000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10958513_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201762","9783540399810"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/10958513_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}