{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:53:19Z","timestamp":1774417999281,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540540595","type":"print"},{"value":"9783540473787","type":"electronic"}],"license":[{"start":{"date-parts":[[1991,1,1]],"date-time":"1991-01-01T00:00:00Z","timestamp":662688000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1991]]},"DOI":"10.1007\/3-540-54059-8_78","type":"book-chapter","created":{"date-parts":[[2012,2,25]],"date-time":"2012-02-25T17:26:41Z","timestamp":1330190801000},"page":"5-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Representation and utilization of non-functional requirements for information system design"],"prefix":"10.1007","author":[{"given":"Lawrence","family":"Chung","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,7,29]]},"reference":[{"issue":"11","key":"2_CR1","doi-asserted-by":"crossref","first-page":"922","DOI":"10.1145\/32206.32208","volume":"30","author":"Ulises Ag\u00ebro and Subrata Dasgupta","year":"1987","unstructured":"Ulises Ag\u00ebro and Subrata Dasgupta, A plausibility-Driven Approach to Computer Architecture Design, CACM, Pp. 922\u2013932, Vol. 30, No. 11, Nov. 1987.","journal-title":"CACM"},{"key":"2_CR2","unstructured":"Artificial Intelligence, An International Journal, Vol. 24, No. 1\u20133, Dec., 1984."},{"key":"2_CR3","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/978-3-642-83397-7_18","volume-title":"Foundations of Knowledge Base Management","author":"A. Albano","year":"1989","unstructured":"Antonio Albano, Conceptual Languages: A Comparison of ADAPLEX, Galileo and Taxis. In Joachim W. Schmidt and Constantino Thanos (Editors), Foundations of Knowledge Base Management. Berlin: Springer-Verlag, 1989, pp. 395\u2013408."},{"issue":"11","key":"2_CR4","doi-asserted-by":"crossref","first-page":"832","DOI":"10.1145\/182.358434","volume":"26","author":"J. F. Allen","year":"1983","unstructured":"James F. Allen, Maintaining Knowledge about Temporal Intervals, CACM, Vol. 26, No. 11, pp. 832\u2013843, 1983.","journal-title":"CACM"},{"key":"2_CR5","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/978-3-642-83397-7_19","volume-title":"Foundations of Knowledge Base Management","author":"A. Borgida","year":"1989","unstructured":"A. Borgida, M. Jarke, J. Mylopoulos, J. W. Schmidt and Y. Vassiliou, The Software Development Environment as a Knowledge Base Management System, J. W. Schmidt and C. Thanos (eds.), Foundations of Knowledge Base Management. Berlin: Springer-Verlag, 1989, pp. 411\u2013442."},{"key":"2_CR6","unstructured":"A. Borgida, J. Mylopoulos, J. W. Schmidt and I. Wetzel, Support for Data-Intensive Applications: Conceptual Design and Software Development, R. Hull, R. Morrison, and D. Stemple (eds.), Proc. of the 2nd International Workshop on Database Programming Languages, Morgan Kaufmann Publishers, 1990, pp. 258\u2013280."},{"issue":"1","key":"2_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/320434.320440","volume":"1","author":"P. P. Chen","year":"1976","unstructured":"Peter Pin-Shan Chen, The Entity-Relationship Model \u2014 Toward a Unified View of Data. ACM TODS, Vol. 1, No. 1, March 1976, pp. 9\u201336.","journal-title":"ACM TODS"},{"key":"2_CR8","unstructured":"L. Chung, P. Katalagarianos, M. Marakakis, M. Mertikas, J. Mylopoulos, and Y. Vassiliou, From Information System Requirements to Designs: A Mapping Framework, FORTH\/CSI\/TR\/1989\/020, Technical Report Series, Institute of Computer Science \u2014 FORTH, Heraklion, Nov. 1989. Also Technical Note CSRI-53, Dept. of Computer Science, Univ. of Toronto, Nov. 1989."},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"L. Chung, P. Katalagarianos, M. Marakakis, M. Mertikas, J. Mylopoulos, and Y. Vassiliou, From Information System Requirements to Designs: A Mapping Framework, Information Systems, Vol. 16, No. 3. Also Technical Report CSRI-245, Univ. of Toronto, Sept. 1990.","DOI":"10.1016\/0306-4379(91)90033-6"},{"key":"2_CR10","unstructured":"L. Chung, Goal-Oriented Processing of Requirements Models into Information System Designs, Ph.D. thesis, Dept. of Computer Science, Univ. of Toronto, forthcoming, 1991."},{"issue":"3","key":"2_CR11","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/356778.356782","volume":"11","author":"D. E. Denning","year":"1979","unstructured":"D. E. Denning and P. J. Denning, Data Security, ACM Computing Surveys, Vol. 11, No. 3, Sept., Pp. 227\u2013249, 1979.","journal-title":"ACM Computing Surveys"},{"key":"2_CR12","unstructured":"Chrysanne DiMarco, Computational Stylistics for Natural Language Translation, Ph. D. Thesis, Dept. of Computer Science, Univ. of Toronto, 1990."},{"key":"2_CR13","unstructured":"Oren Etzioni, Tractable Decision-Analytic control, Proc. 1st International Conf. on Principles of Knowledge Representation and Reasoning, Pp. 114\u2013125, Toronto, Ontario, Canada, May 15\u201318, 1989."},{"key":"2_CR14","unstructured":"S. Greenspan, Requirements Modelling: The Use of Knowledge Representation Techniques for Requirements Specification, Ph. D. thesis, Dept. of Computer Science, Univ. of Toronto, 1984."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"H. Rex Hartson and David K. Hsiao, Full Protection Specification in the Semantic Model for Database Protection Languages, Proc. ACM Annual Conf., Oct., 1976.","DOI":"10.1145\/800191.805538"},{"key":"2_CR16","first-page":"105","volume-title":"Artificial Intelligence at MIT: Expanding Frontiers, Volume 1","author":"J. Lee","year":"1990","unstructured":"Jintae Lee, SIBYL: A Qualitative Decision Management System, P. H. Winston and S. A. Shellard (eds.), Artificial Intelligence at MIT: Expanding Frontiers, Volume 1, Pp. 105\u2013133, The MIT Press, Cambridge, Mass., 1990."},{"key":"2_CR17","unstructured":"Teresa F. Lunt and Jonathan K. Millen, Secure Knowledge-Based Systems, Technical Report SRI-CSL-90-04, SRI International, Aug. 1989."},{"key":"2_CR18","volume-title":"Security, Accuracy, and Privacy in Computer Systems","author":"J. Martin","year":"1973","unstructured":"James Martin, Security, Accuracy, and Privacy in Computer Systems. Englewood Cliffs, New Jersey: Prentice-Hall, 1973."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"J. Mylopoulos, A. Borgida, M. Jarke, and M. Koubarakis, Telos: A Language for Representing Knowledge about Information Systems, To appear in ACM Trans. Information Systems, 1990.","DOI":"10.1145\/102675.102676"},{"issue":"3","key":"2_CR20","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1145\/62061.62062","volume":"20","author":"J. Peckham","year":"1988","unstructured":"Joan Peckham and Fred Maryanski, Semantic Data Models. Computing Surveys, Vol. 20, No. 3, Sept. 1988, pp. 153\u2013189.","journal-title":"Computing Surveys"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"J. Nielson and R. Molich, Heuristic Evaluation of User Interfaces, Proc. of CHI '90, Pp. 249\u2013256, April, 1990.","DOI":"10.1145\/97243.97281"},{"key":"2_CR22","volume-title":"Problem-Solving Methods in Artificial Intelligence","author":"N. Nilsson","year":"1971","unstructured":"Nils Nilsson, Problem-Solving Methods in Artificial Intelligence. New York, McGraw-Hill, 1971."},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"F. Rabitti, D. Woeld, and W. Kim, A Model of Authorization for Object-Oriented and Semantic Databases, Proc. EDBT, 1988.","DOI":"10.1007\/3-540-19074-0_56"},{"key":"2_CR24","unstructured":"Howard Reubenstein, Automated Acquisition of Evolving Informal Descriptions, Ph. D. Thesis, Also Tech. Report 1205, MIT Artificial Intelligence Lab., 1990."},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Gruia-Catalin Roman, A Taxonomy of Current Issues in Requirements Engineering, IEEE Computer, pp. 14\u201321, Apr., 1985.","DOI":"10.1109\/MC.1985.1662861"},{"key":"2_CR26","unstructured":"P. A. Samuelson, Economics, McGraw-Hill, 10th ed., 1976."},{"key":"2_CR27","unstructured":"H. A. Simon, The Sciences of the Artificial, Second ed. MIT Press, 1981."},{"key":"2_CR28","unstructured":"D. M. Strong and S. M. Miller, Exception Handling and Quality Control in Office Operations, Working paper No. 89-16, Boston Univ., School of Management, 1989."},{"key":"2_CR29","unstructured":"M. I. Svanks, Integrity Analysis: A Methodology for EDT AUDIT and Data Quality Control, Ph. D. Thesis, Univ. of Toronto, 1981."},{"key":"2_CR30","unstructured":"B. Thomson, E. S. Lee, P. I. P. Boulton, M. Stumm, and D. M. Lewis, A Trusted Network Architecture, Computer Systems Research Institute, Univ. of Toronto, Oct., 1988."},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Y. Vassiliou, M. Marakakis, P. Katalagarianos, L. Chung, M. Mertikas, and J. Mylopoulos, IRIS \u2014 A Mapping Assistant for Generating Designs from Requirements, Proc. The 2nd Nordic Conference on Advanced Information Systems Engineering, CAiSE '90, Stockholm, May 1990, pp. 307\u2013338.","DOI":"10.1007\/BFb0000607"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Error Data Values in the Data-Flow Language VAL, ACM TOPLAS, Vol. 4, No. 2, Pp. 226\u2013238, April 1982.","DOI":"10.1145\/357162.357167"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-54059-8_78","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T10:59:20Z","timestamp":1580295560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-54059-8_78"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991]]},"ISBN":["9783540540595","9783540473787"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/3-540-54059-8_78","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1991]]},"assertion":[{"value":"29 July 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}