{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:30:54Z","timestamp":1725471054087},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540377504"},{"type":"electronic","value":"9783540377528"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11824633_7","type":"book-chapter","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T15:23:09Z","timestamp":1158592989000},"page":"62-70","source":"Crossref","is-referenced-by-count":1,"title":["A Framework for Exploiting Security Expertise in Application Development"],"prefix":"10.1007","author":[{"given":"Theodoros","family":"Balopoulos","sequence":"first","affiliation":[]},{"given":"Lazaros","family":"Gymnopoulos","sequence":"additional","affiliation":[]},{"given":"Maria","family":"Karyda","sequence":"additional","affiliation":[]},{"given":"Spyros","family":"Kokolakis","sequence":"additional","affiliation":[]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[]},{"given":"Sokratis","family":"Katsikas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","volume-title":"Proceedings of the 4th European Conference On Information Warfare And Security (ECIW 2005)","author":"T. Balopoulos","year":"2005","unstructured":"Balopoulos, T., Dritsas, S., Gymnopoulos, L., Karyda, M., Kokolakis, S., Gritzalis, S.: Incorporating Security Requirements into the Software Development Process. In: Proceedings of the 4th European Conference On Information Warfare And Security (ECIW 2005), University of Glamorgan, UK (July 2005)"},{"key":"7_CR2","volume-title":"Proceedings of the IFIP I3E International Conference on eBusiness, eCommerce, and eGovernement","author":"S. Dritsas","year":"2005","unstructured":"Dritsas, S., Gymnopoulos, L., Karyda, M., Balopoulos, T., Kokolakis, S., Lambrinoudakis, C., Gritzalis, S.: Employing Ontologies for the Development of Security Critical Applications: The Secure e-Poll Paradigm. In: Proceedings of the IFIP I3E International Conference on eBusiness, eCommerce, and eGovernement, Poznan, Poland, October 2005. Springer, Heidelberg (2005)"},{"key":"7_CR3","volume-title":"Proceedings of the DeSeGov 2006 Workshop on Dependability and Security in eGovernment (in conjunction with the 1st International Conference on Availability, Reliability, and Security)","author":"M. Karyda","year":"2006","unstructured":"Karyda, M., Balopoulos, T., Dritsas, S., Gymnopoulos, L., Kokolakis, S., Lambrinoudakis, C., Gritzalis, S.: Using Security Ontologies for the development of secure e-Government applications. In: Tjoa, A., Schweighofer, E. (eds.) Proceedings of the DeSeGov 2006 Workshop on Dependability and Security in eGovernment (in conjunction with the 1st International Conference on Availability, Reliability, and Security), Vienna, Austria. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"7_CR4","unstructured":"Gymnopoulos, L., Karyda, M., Balopoulos, T., Dritsas, S., Kokolakis, S., Lambrinoudakis, C., Gritzalis, S.: Developing a Security Patterns Repository for Secure Applications De-sign. In: Proceedings of the 5th European Conference on Information Warfare and Security (ECIW 2006), Helsinki, Finland (2006)"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-45314-8_14","volume-title":"Fundamental Approaches to Software Engineering","author":"J. J\u00fcrjens","year":"2001","unstructured":"J\u00fcrjens, J.: Towards Development of Secure Systems Using UMLsec. In: Hussmann, H. (ed.) FASE 2001. LNCS, vol.\u00a02029, p. 187. Springer, Heidelberg (2001)"},{"key":"7_CR6","volume-title":"Using UML","author":"P. Stevens","year":"2000","unstructured":"Stevens, P., et al.: Using UML. Addison-Wesley, Reading (2000)"},{"key":"7_CR7","volume-title":"Proceedings of the New Security Paradigms Workshop","author":"V. Raskin","year":"2001","unstructured":"Raskin, V., Hempelmann, C., Triezenberg, K., Nirenburg, S.: Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool. In: Raskin, V., Hempelmann, C.F. (eds.) Proceedings of the New Security Paradigms Workshop. ACM Press, New York (2001)"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"H. Mouratidis","year":"2003","unstructured":"Mouratidis, H., Giorgini, P., Manson, G.: An Ontology for Modelling Security: The Tropos Project. In: Palade, V., Howlett, R.J., Jain, L. (eds.) KES 2003. LNCS, vol.\u00a02774. Springer, Heidelberg (2003)"},{"key":"7_CR9","unstructured":"Gruber, T.R.: Toward principles for the design of ontologies used for knowledge sharing. Padua workshop on Formal Ontology (March 1993)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Filman, R., Linden, T.: Communicating Security Agents. In: Proceedings of the 5th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, Stanford, CA, USA, pp. 86\u201391 (1996)","DOI":"10.1109\/ENABL.1996.555083"},{"key":"7_CR11","unstructured":"Noy, N.F., Mc Guinness, D.L.: Ontology Development 101: A Guide to Creating Your First Ontology, Stanford Knowledge Systems Laboratory Technical Report KSL-01-05 (2001)"},{"key":"7_CR12","unstructured":"Prot\u00e9g\u00e9, \n                    \n                      http:\/\/protege.stanford.edu\/"},{"key":"7_CR13","unstructured":"Racer Inference Engine, \n                    \n                      http:\/\/www.sts.tu-harburg.de\/~r.f.moeller\/racer\/"},{"key":"7_CR14","unstructured":"The New Racer Query Language, \n                    \n                      http:\/\/www.cs.concordia.ca\/~haarslev\/racer\/racer-queries.pdf"},{"key":"7_CR15","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"M. Schumacher","year":"2006","unstructured":"Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerland, P.: Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons, Chichester (2006)"},{"key":"7_CR16","unstructured":"Yoder, J., Barcalow, J.: Architectural Patterns for Enabling Application Security. In: Proceedings of the 4th Conference on Pattern Languages of Programs (PLoP 1997), Monticello, IL, USA (1997)"},{"key":"7_CR17","volume-title":"Design Patterns \u2013 Elements of Reusable Object-Oriented Software","author":"E. Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns \u2013 Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1995)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Schumacher, M.: Security Engineering with Patterns: Origins, Theoretical Models, and New Applications, Paperback (2003)","DOI":"10.1007\/b11930"},{"issue":"4","key":"7_CR19","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/162124.162127","volume":"25","author":"R. Baskerville","year":"1993","unstructured":"Baskerville, R.: Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Survey\u00a025(4), 375\u2013414 (1993)","journal-title":"ACM Computing Survey"},{"issue":"4","key":"7_CR20","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.infoandorg.2004.11.001","volume":"15","author":"M.T. Siponen","year":"2005","unstructured":"Siponen, M.T.: Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods. Information and Organization\u00a015(4), 339\u2013375 (2005)","journal-title":"Information and Organization"},{"key":"7_CR21","unstructured":"Sindre, G., Firesmith, D.G., Opdahl, A.L.: A Reuse-Based Approach to Determining Security Requirements. In: Proceedings of the 9th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ 2003), Klagenfurt\/Velden, Austria (June 2003)"}],"container-title":["Lecture Notes in Computer Science","Trust and Privacy in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11824633_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:12:31Z","timestamp":1619507551000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11824633_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540377504","9783540377528"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/11824633_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}