{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T04:19:22Z","timestamp":1742617162454,"version":"3.40.2"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319981765"},{"type":"electronic","value":"9783319981772"}],"license":[{"start":{"date-parts":[[1993,1,1]],"date-time":"1993-01-01T00:00:00Z","timestamp":725846400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1993]]},"DOI":"10.1007\/3-540-56777-1_13","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T11:30:37Z","timestamp":1330255837000},"page":"234-251","source":"Crossref","is-referenced-by-count":28,"title":["Dealing with security requirements during the development of information systems"],"prefix":"10.1007","author":[{"given":"Lawrence","family":"Chung","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,30]]},"reference":[{"issue":"no.8","key":"13_CR1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/6.144532","volume":"29","author":"J. A. Adam","year":"1992","unstructured":"J. A. Adam, \u201cThreats and Countermeasures,\u201d IEEE Spectrum, vol. 29, no. 8, Aug. 1992, pp. 21\u201328.","journal-title":"IEEE Spectrum"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"E. Amoroso, T. Nguyen, J. Weiss, J. Watson, P. Lapiska, and T. Starr, \u201cTowards an Approach to Measuring Software Trust,\u201d Proc. IEEE Symp. Security and Privacy, May 1991, pp. 198\u2013218.","DOI":"10.1109\/RISP.1991.130788"},{"key":"13_CR3","unstructured":"BIM Prolog 3.1 Manual. BIM sa\/nv, Belgium, 1992."},{"key":"13_CR4","unstructured":"T. C. Vickers Benzel, \u201cDeveloping Trusted Systems Using DOD-STD-2167A,\u201d 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4\u20138, 1989, pp. 166\u2013176."},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"B. W. Boehm, \u201cA Spiral Model of Software Development and Enhancement\u201d, Vol. 11, No. 4, ACM Software Eng. Notes, Aug. 1986.","DOI":"10.1145\/12944.12948"},{"issue":"no.2","key":"13_CR6","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/0167-4048(87)90085-X","volume":"6","author":"T. Bui","year":"1987","unstructured":"T. Bui and T. R. Sivasankaran, \u201cCost-Effective Modeling for a Decision Support System in Computer Security,\u201d Computers & Security, vol. 6, no. 2, Apr. 1987, pp. 139\u2013151.","journal-title":"Computers & Security"},{"key":"13_CR7","unstructured":"Canadian System Security Centre, The Canadian Trusted Computer Product Evaluation Criteria, Version 2.0. Ottawa, Apr. 1992."},{"key":"13_CR8","unstructured":"Canadian Bankers' Association, MasterCard and Visa Statistics, Toronto, Dec. 1991."},{"key":"13_CR9","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/3-540-54059-8_78","volume-title":"Advanced Information Systems Eng.","author":"L. Chung","year":"1991","unstructured":"L. Chung, \u201cRepresentation and Utilization of Non-Functional Requirements for Information System Design.\u201d In R. Anderson, J. A. Bubenko, Jr., A. Solvberg (Eds.), Advanced Information Systems Eng., Proc., 3rd Int. Conf. CAiSE '91, Trondheim, Norway, May 13\u201315, 1991. Berlin: Springer-Verlag, 1991, pp. 5\u201330."},{"issue":"no.4","key":"13_CR10","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/0306-4379(91)90033-6","volume":"16","author":"K. L. Chung","year":"1991","unstructured":"K. L. Chung, P. Katalagarianos, M. Marakakis, M. Mertikas, J. Mylopoulos and Y. Vassiliou, \u201cFrom Information System Requirements to Designs: A Mapping Framework,\u201d Information Systems, vol. 16, no. 4, 1991, pp. 429\u2013461.","journal-title":"Information Systems"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"D. D. Clark and D. R. Wilson, \u201cA Comparison of Commercial and Military Computer Security Policies,\u201d Proc. IEEE Symp. Security and Privacy, 1987, pp. 184\u2013194.","DOI":"10.1109\/SP.1987.10001"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"S. D. Crocker, \u201cSoftware Methodology for Development of a Trusted BMS: Identification of Critical Problems,\u201d 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4\u20138, 1989, pp. 148\u2013165.","DOI":"10.1109\/CSAC.1989.81047"},{"key":"13_CR13","unstructured":"U. S. Department of Defense, Military Standard: Defense System Software Development, Feb. 29, 1988."},{"key":"13_CR14","unstructured":"A. Dardenne, A. van Lamsweerde and S. Fickas, \u201cGoal-directed Requirements Acquisition,\u201d Science of Computer Programming, to appear; earlier version appeared in 6th Int. Workshop on Software Specification and Design, Como, Italy, 1991."},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"B. Di Vito, C. Garvey, D. Kwong, A. Murray, J. Solomon and A. Wu, \u201cThe Deductive Theory Manager: A Knowledge Based System for Formal Verification,\u201d Proc. IEEE Symp. Security and Privacy, 1990, pp. 306\u2013318.","DOI":"10.1109\/RISP.1990.63860"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"E. B. Fernandez, E. Gudes and H. Song, \u201cA Security Model for Object-Oriented Databases,\u201d Proc. IEEE Symp. Security and Privacy, 1989, pp. 110\u2013115.","DOI":"10.1109\/SECPRI.1989.36285"},{"key":"13_CR17","unstructured":"S. Greenspan, Requirements Modeling: A Knowledge Representation Approach to Software Requirements Definition. Ph.D. Thesis, Dept. of Computer Science, Univ. of Toronto, 1984."},{"issue":"no.5","key":"13_CR18","doi-asserted-by":"crossref","first-page":"467","DOI":"10.1109\/32.90449","volume":"17","author":"U. Hahn","year":"1991","unstructured":"U. Hahn, M. Jarke and T. Rose, \u201cTeamwork Support in a Knowledge-Based Information Systems Environment,\u201d IEEE Trans. Software Eng., vol. 17, no. 5, May 1991, pp. 467\u2013482.","journal-title":"IEEE Trans. Software Eng."},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"H. R. Hartson and D. K. Hsiao, \u201cFull Protection Specification in the Semantic Model for Database Protection Languages,\u201d Proc. ACM Annual Conf., Houston, TX, Oct. 1976, pp. 90\u201395.","DOI":"10.1145\/800191.805538"},{"key":"13_CR20","volume-title":"Criteria for the Evaluation of Trustworthiness of Information Technology (IT) Systems","author":"German Information Security Agency","year":"1989","unstructured":"German Information Security Agency, Criteria for the Evaluation of Trustworthiness of Information Technology (IT) Systems, 1st Version, Bundesanzeiger, K\u00f6ln, Germany, 1989."},{"key":"13_CR21","unstructured":"Office for Official Publications of the European Communities, Information Technology Security Evaluation Criteria, Provisional Harmonised Criteria, Version 1.2, June 1991, Luxembourg."},{"issue":"no.1","key":"13_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/128756.128757","volume":"10","author":"M. Jarke","year":"1992","unstructured":"M. Jarke, J. Mylopoulos, J. W. Schmidt, Y. Vassiliou, \u201cDAIDA: An Environment for Evolving Information Systems,\u201d ACM Trans. Information Systems, vol. 10, no. 1, Jan. 1992, pp. 1\u201350.","journal-title":"ACM Trans. Information Systems"},{"key":"13_CR23","unstructured":"M. Jarke (Ed.), ConceptBase V3.1 User Manual, 1992."},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"M. Jarke, J. Bubenko, C. Rolland, A. Sutcliffe and Y. Vassiliou, \u201cTheories Underlying Requirements Engineering: An Overview of NATURE at Genesis,\u201d IEEE Int. Symp. Requirements Eng., Jan. 1993, pp. 19\u201331.","DOI":"10.1109\/ISRE.1993.324840"},{"key":"13_CR25","unstructured":"E. S. Lee, P. I. P. Boulton, B. W. Thomson, and R. E. Soper, Composable Trusted Systems, Tech. Report CSRI-272, Computer Systems Research Institute, Univ. of Toronto, May 31, 1992."},{"key":"13_CR26","unstructured":"J. Lee, A Decision Rationale Management System: Capturing, Reusing, and Managing the Reasons for Decisions, Ph.D. Thesis, MIT, 1992."},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"A. Marmor-Squires, B. Danner, J. McHugh, L. Nagy, D. Sterne, M. Branstad, and P. Rougeau, \u201cA Risk Driven Process Model for the Development of Trusted Systems,\u201d 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4\u20138, 1989, pp. 184\u2013192.","DOI":"10.1109\/CSAC.1989.81050"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"N. S. Matloff, \u201cAnother Look at the Use of Noise Addition for Database Security,\u201d Proc. IEEE Symp. Security and Privacy, 1986, pp. 173\u2013180.","DOI":"10.1109\/SP.1986.10014"},{"key":"13_CR29","first-page":"178","volume-title":"Handbook of Software Quality Assurance","author":"T. J. McCabe","year":"1987","unstructured":"T. J. McCabe and G. G. Schulmeyer, \u201cThe Pareto Principle Applied to Software Quality Assurance,\u201d In G. Gordon Schulmeyer and James I. McManus (Eds.), Handbook of Software Quality Assurance, New York: Van Nostrand Reinhold, 1987, pp. 178\u2013210."},{"issue":"no.2","key":"13_CR30","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/2.19","volume":"21","author":"J. D. Moffett","year":"1988","unstructured":"J. D. Moffett and M. S. Sloman, \u201cThe Source of Authority for Commercial Access Control,\u201d IEEE Computer, vol. 21, no. 2, Feb. 1988, pp. 59\u201369.","journal-title":"IEEE Computer"},{"key":"13_CR31","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1145\/102675.102676","volume":"8","author":"J. Mylopoulos","year":"1990","unstructured":"J. Mylopoulos, A. Borgida, M. Jarke, and M. Koubarakis, \u201cTelos: Representing Knowledge about Information Systems,\u201d ACM Trans. Information Systems, vol. 8, Oct. 1990, pp. 325\u2013362.","journal-title":"ACM Trans. Information Systems"},{"issue":"no.6","key":"13_CR32","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/32.142871","volume":"18","author":"J. Mylopoulos","year":"1992","unstructured":"J. Mylopoulos, L. Chung and B. Nixon, \u201cRepresenting and Using Non-Functional Requirements: A Process-Oriented Approach,\u201d IEEE Trans. Software Eng., vol. 18, no. 6, June 1992, pp. 483\u2013497.","journal-title":"IEEE Trans. Software Eng."},{"issue":"no.9","key":"13_CR33","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TSE.1986.6313046","volume":"SE-12","author":"P. G. Neumann","year":"1986","unstructured":"P. G. Neumann, \u201cOn Hierarchical Designs of Computer Systems for Critical Applications,\u201d IEEE Trans. Software Eng., SE-12, no. 9, Sept. 1986, pp. 905\u2013920.","journal-title":"IEEE Trans. Software Eng."},{"issue":"no.1","key":"13_CR34","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/382300.382301","volume":"16","author":"P. G. Neumann","year":"1991","unstructured":"P. G. Neumann (compiler), \u201cIllustrative Risks to the Public in the Use of Computer Systems and Related Technology,\u201d ACM Software Eng. Notes, vol. 16, no. 1, Jan. 1991, pp. 2\u20139.","journal-title":"ACM Software Eng. Notes"},{"key":"13_CR35","volume-title":"Problem-Solving Methods in Artificial Intelligence","author":"N. Nilsson","year":"1971","unstructured":"N. Nilsson, Problem-Solving Methods in Artificial Intelligence. New York, McGraw-Hill, 1971."},{"key":"13_CR36","doi-asserted-by":"crossref","unstructured":"B. Nixon, \u201cDealing with Performance Requirements During the Development of Information Systems\u201d, IEEE Int. Symp. Requirements Eng., Jan. 1993, pp. 42\u201349.","DOI":"10.1109\/ISRE.1993.324838"},{"issue":"no.5","key":"13_CR37","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MSPEC.1984.6370266","volume":"21","author":"D. B. Parker","year":"1984","unstructured":"D. B. Parker, \u201cThe Many Faces of Data Vulnerability,\u201d IEEE Spectrum, vol. 21, no. 5, May 1984, pp. 46\u201349.","journal-title":"IEEE Spectrum"},{"key":"13_CR38","doi-asserted-by":"crossref","unstructured":"D. B. Parker, \u201cRestating the Foundation of Information Security,\u201d 2nd Annual North American Information System Security Symp., Toronto, Oct. 21\u201323, 1991.","DOI":"10.1016\/0960-2593(91)90013-Y"},{"issue":"No.5","key":"13_CR39","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MSPEC.1984.6370265","volume":"21","author":"T. S. Perry","year":"1984","unstructured":"T. S. Perry and P. Wallich, \u201cCan Computer Crime be Stopped?\u201d, IEEE Spectrum, Vol. 21, No. 5, May 1984, pp. 34\u201345.","journal-title":"IEEE Spectrum"},{"key":"13_CR40","volume-title":"Security in Computing","author":"C. P. Pfleeger","year":"1989","unstructured":"C. P. Pfleeger, Security in Computing, Englewood Cliffs, NJ: Prentice Hall, 1989."},{"key":"13_CR41","doi-asserted-by":"crossref","unstructured":"C. Potts and G. Bruns, \u201cRecording the Reasons for Design Decisions,\u201d Proc. 10th Int. Conf. Software Eng., 1988, pp. 418\u2013427.","DOI":"10.1109\/ICSE.1988.93722"},{"key":"13_CR42","volume-title":"The Sciences of the Artificial","author":"H. A. Simon","year":"1981","unstructured":"H. A. Simon, The Sciences of the Artificial, 2nd ed., Cambridge, MA: The MIT Press, 1981.","edition":"2nd ed."},{"key":"13_CR43","doi-asserted-by":"crossref","unstructured":"G. W. Smith, \u201cMultilevel Secure Database Design: A Practical Application,\u201d 5th Annual Computer Security Appl. Conf., Tucson, Arizona, Dec. 4\u20138, 1989, pp. 314\u2013321.","DOI":"10.1109\/CSAC.1989.81068"},{"key":"13_CR44","unstructured":"G. Steinke, \u201cDesign Aspects of Access Control in a Knowledge Base System,\u201d SECURICOM '90, Paris, March, 1990."},{"key":"13_CR45","unstructured":"U.S. Department of Defense, Trusted Computer Systems Evaluation Criteria, DOD 5200.28-STD, Dec. 1985."},{"issue":"no.3","key":"13_CR46","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1016\/0167-4048(86)90014-3","volume":"5","author":"F. G. Tompkins","year":"1986","unstructured":"F. G. Tompkins and R. Rice, \u201cIntegrating Security Activities Into the Software Development Life Cycle and the Software Quality Assurance Process,\u201d Computers & Security, vol. 5, no. 3, Sept. 1986, pp. 218\u2013242.","journal-title":"Computers & Security"},{"key":"13_CR47","first-page":"307","volume-title":"IRIS-A Mapping Assistant for Generating Designs from Requirements","author":"Y. Vassiliou","year":"1991","unstructured":"Y. Vassiliou, M. Marakakis, P. Katalagarianos, L. Chung, M. Mertikas and J. Mylopoulos, \u201cIRIS-A Mapping Assistant for Generating Designs from Requirements.\u201d In Proc, CAiSE '90, 2nd Nordic Conf. Advanced Information Systems Eng., Stockholm, May 1991. Berlin: Springer-Verlag, 1991, pp. 307\u2013338."},{"key":"13_CR48","unstructured":"Visa Canada Association, Visa Canada 1990 Regional Report, Toronto, 1990."},{"issue":"no.2","key":"13_CR49","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1147\/sj.192.0229","volume":"19","author":"C. Wood","year":"1980","unstructured":"C. Wood, E. B. Fernandez and R. C. Summers, \u201cData Base Security: Requirements, Policies, and Models,\u201d IBM Syst. J., vol. 19, no. 2, 1980, pp. 229\u2013252.","journal-title":"IBM Syst. J."}],"container-title":["Notes on Numerical Fluid Mechanics and Multidisciplinary Design","Active Flow and Combustion Control 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-56777-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T21:53:27Z","timestamp":1742594007000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-56777-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993]]},"ISBN":["9783319981765","9783319981772"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/3-540-56777-1_13","relation":{},"ISSN":["1612-2909","1860-0824"],"issn-type":[{"type":"print","value":"1612-2909"},{"type":"electronic","value":"1860-0824"}],"subject":[],"published":{"date-parts":[[1993]]}}}