{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:49:55Z","timestamp":1725986995111},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319981765"},{"type":"electronic","value":"9783319981772"}],"license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/3-540-58113-8_165","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T15:15:29Z","timestamp":1330269329000},"page":"105-118","source":"Crossref","is-referenced-by-count":2,"title":["Reaching out for quality: Considering security requirements in the design of information systems"],"prefix":"10.1007","author":[{"given":"Hubert F.","family":"Hofmann","sequence":"first","affiliation":[]},{"given":"Ralph","family":"Holbein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,31]]},"reference":[{"key":"10_CR1","volume-title":"EDS-TR-75-30","author":"D.E. Bell","year":"1976","unstructured":"D.E. Bell, L.J. La Padula, Secure Computer Systems: Unified Exposition and Multics Interpretation. EDS-TR-75-30, The MITRE Corp., Bedford, March 1976."},{"key":"10_CR2","volume-title":"TR-3153","author":"K.J. Biba","year":"1977","unstructured":"K.J. Biba, Integrity Considerations for Secure Computer Systems. TR-3153, The MITRE Corp., Bedford, 1977."},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"W.J. Clancey, Situated Action: A Neuropsychological Interpretation. Cognitive Science, vol. 17, no. 1, 1993.","DOI":"10.1207\/s15516709cog1701_7"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"D. Clark, D. Wilson, A Comparision of Commercial and Military Security Policies. Proceedings of the IEEE Symposium on Security and Privacy, 1987.","DOI":"10.1109\/SP.1987.10001"},{"key":"10_CR5","unstructured":"Department of Defense, TCSEC \u2014 Trusted Computer System Evaluation Criteria. DoD 5200.28-STD, Department of Defense, USA, December 1985."},{"key":"10_CR6","volume-title":"Out of the Crisis","author":"W.E. Deming","year":"1986","unstructured":"W.E. Deming, Out of the Crisis. Cambridge, MIT Center for Advanced Engineering, 1986."},{"key":"10_CR7","unstructured":"ECMA, Security in Open Systems \u2014 A Security Framework. 46, European Computer Manufacturers Association (ECMA), 1988."},{"key":"10_CR8","unstructured":"ECMA, Standard ECMA-138 \u2014 Security in Open Systems \u2014 Data Elements and Service Definitions. Standard ECMA-138, European Computer Manufacturers Association (ECMA), 1989."},{"issue":"no.2","key":"10_CR9","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1142\/S0218194092000038","volume":"1","author":"A. Finkelstein","year":"1992","unstructured":"A. Finkelstein, J. Kramer, B. Nuseibeh et al., Viewpoints: A Framework for Integration Multiple Perspectives in System Development. International Journal of Software Engineering and Knowledge Engineering, vol. 1, no. 2, 1992, pp. 31\u201358.","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"10_CR10","unstructured":"N.E. Fuchs, Software Development Based on Executable Specifications. SNF 21-32746.91, Institute for Informatics, University of Zurich, 1993."},{"key":"10_CR11","unstructured":"R. Grimm, A Model of Security in Open Telecooperation. In: G.Neufeld, B. Plattner (eds.). Proceedings of the IFIP TC6\/WG 6.5 International Conference on Upper Layer Protocols, Architectures and Applications, Vancouver, Canada, 27\u201329 May, 1992."},{"key":"10_CR12","volume-title":"VIS 93: Verl\u00e4ssliche Informationssysteme \u2014 GI-Fachtagung","author":"R. Grimm","year":"1993","unstructured":"R. Grimm, A. Steinacker, Das Kooperations-und das Gleichgewichtsmodell \u2014Theorie und Praxis. VIS 93: Verl\u00e4ssliche Informationssysteme \u2014 GI-Fachtagung, M\u00fcnchen, Springer, 1993."},{"issue":"no.6","key":"10_CR13","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/0305-0483(91)90009-I","volume":"19","author":"R. Hirschheim","year":"1991","unstructured":"R. Hirschheim, H.K. Klein, M. Newman, Information Systems Development as Social Action: Theoretical Perspective and Practice. OMEGA International Journal of Management Science, vol. 19, no. 6, 1991, pp. 587\u2013608.","journal-title":"OMEGA International Journal of Management Science"},{"key":"10_CR14","unstructured":"H.F. Hofmann, Requirements Engineering: A Survey of Methods and Tools. TR 93.05, Institute for Informatics, University of Zurich, 1993."},{"key":"10_CR15","first-page":"622","volume-title":"Situated Software Design","author":"H.F. Hofmann","year":"1993","unstructured":"H.F. Hofmann, R. Pfeifer, E. Vinkhuyzen, Situated Software Design. In: Proceedings of the Fifth International Conference on Software Engineering and Knowledge Engineering San Francisco, Knowledge Systems Institute, 1993, pp. 622\u2013628."},{"key":"10_CR16","unstructured":"R. Holbein, Informationssicherheit \u2014 Ein Blick \u00fcber den Tellerrand der (Informations-) Technologie. European Conference on Computer Science, Communication and Society: A Technical and Cultural Challenge, Neuchatel, Schweiz, 1993, pp. 161\u2013172."},{"key":"10_CR17","unstructured":"R. Holbein, Secure Information Exchange in Organisations. OBS-Report, University of Zurich, 1994."},{"key":"10_CR18","volume-title":"Kaizen: The Key to Japan's Competitive Success","author":"M. Imai","year":"1986","unstructured":"M. Imai, Kaizen: The Key to Japan's Competitive Success. New York, Random House, 1986."},{"key":"10_CR19","unstructured":"ISO, ISO: Security Frameworks Overview. International Organisation for Standardization, 1991."},{"key":"10_CR20","unstructured":"ISO, WD 10746-1: Reference Model for Open Distributed Processing ODP Part 1: Overview. WD 10746-1, International Organisation for Standardization ISO, 1992."},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"J.I. Jones, M. Sergot, Formal Specification of Security Requirements using the Theory of Normative Positions. Computer Security \u2014 ESORICS 92, Toulouse, France, 1992, pp. 103\u2013121.","DOI":"10.1007\/BFb0013894"},{"key":"10_CR22","unstructured":"D. Jonscher, K.R. Dittrich, A Formal Security Model Based on an Object-Oriented Data Model. TR 93.41, University of Zurich, Institute for Informatics, 1993."},{"key":"10_CR23","first-page":"436","volume-title":"Maintenance of Knowledge Bases","author":"F. Lehner","year":"1993","unstructured":"F. Lehner, H.F. Hofmann, R. Setzer et al., Maintenance of Knowledge Bases. Fourth International Conference on Database and Expert Systems Applications, Prag, Springer, 1993, pp. 436\u2013447."},{"issue":"no.2","key":"10_CR24","first-page":"1","volume":"2","author":"A. Newell","year":"1981","unstructured":"A. Newell, The Knowledge Level. AI Magazine, vol. 2, no. 2, 1981, pp. 1\u201320.","journal-title":"AI Magazine"},{"key":"10_CR25","unstructured":"D.B. Parker, Neuformulierung der Grundlagen der Informationssicherheit. Datenschutz und Datensicherung, no. 11, 1991."},{"key":"10_CR26","unstructured":"J.G. Steiner, C. Newman, J.I. Schiller, Kerberos, An Authentication Service for Open Network Systems. Winter USENIX Conference, Dallas, 1988."},{"key":"10_CR27","unstructured":"G. Steinke, M. Jarke, Support for Security Modeling in Information Systems Design. Database Security, VI: Status and Prospects (A-21), Elsevier Science Publisher, 1993, pp. 125\u2013141."},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"R. Strens, J. Dobson, How Responsiblity Modeling Leads To Security Requirements. Department of Computer Science, University of Newcastle, 1993.","DOI":"10.1145\/283751.283828"},{"key":"10_CR29","unstructured":"S. Teufel, Offene B\u00fcrokommunikation \u2014 Sicherheitsmanagement im inner-und zwischenbetrieblichen Informationsaustausch (OBS). NFP\/SPP 5003-34271, Institute for Informatics, University of Zurich, 1993."},{"key":"10_CR30","unstructured":"T.C. Ting, S. Demurjian, M.-Y. Hu, Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. Database Security, vol. 5, 1992."},{"key":"10_CR31","unstructured":"T.C. Ting, S.A. Demurjian, M.-Y. Hu, A Specification Methodology for User-Role Based Security in an Object-Oriented Design Model. Sixth Working Conference on Database Security, Burnaby, IFIP WG 11.3, 1992, pp. 351\u2013378."},{"key":"10_CR32","volume-title":"Understanding Computers and Cognition","author":"T. Winograd","year":"1986","unstructured":"T. Winograd, F. Flores, Understanding Computers and Cognition. New York, Ablex, 1986."},{"volume-title":"Verification and Validation of Complex Systems: Human Factors Issues","year":"1993","key":"10_CR33","unstructured":"John A. Wise, V. David Hopkin, Paul Stager (eds.), Verification and Validation of Complex Systems: Human Factors Issues. Berlin, Springer, 1993."}],"container-title":["Notes on Numerical Fluid Mechanics and Multidisciplinary Design","Active Flow and Combustion Control 2018"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-58113-8_165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,24]],"date-time":"2019-06-24T12:15:20Z","timestamp":1561378520000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-58113-8_165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783319981765","9783319981772"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/3-540-58113-8_165","relation":{},"ISSN":["1612-2909","1860-0824"],"issn-type":[{"type":"print","value":"1612-2909"},{"type":"electronic","value":"1860-0824"}],"subject":[],"published":{"date-parts":[[1994]]}}}