{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,25]],"date-time":"2025-01-25T05:36:01Z","timestamp":1737783361324,"version":"3.33.0"},"publisher-location":"Boston, MA","reference-count":21,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387739465"},{"type":"electronic","value":"9780387739472"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73947-2_20","type":"book-chapter","created":{"date-parts":[[2007,12,29]],"date-time":"2007-12-29T11:54:35Z","timestamp":1198929275000},"page":"252-266","source":"Crossref","is-referenced-by-count":17,"title":["A Look at Misuse Cases for Safety Concerns"],"prefix":"10.1007","author":[{"given":"Guttorm","family":"Sindre","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"20_CR1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.5381\/jot.2004.3.3.c3","volume":"3","author":"D.G. Firesmith","year":"2004","unstructured":"D.G. Firesmith, Engineering Safety Requirements, Safety Constraints, and Safety-Critical Requirements, Journal of Object Technology, 3(3), 27\u201342 (2004).","journal-title":"Journal of Object Technology"},{"key":"20_CR2","volume-title":"Safeware: System Safety and Computers","author":"N.G. Leveson","year":"1995","unstructured":"N.G. Leveson, Safeware: System Safety and Computers (Addison-Wesley, Boston, 1995)."},{"key":"20_CR3","first-page":"213","volume-title":"The Future of Software Engineering","author":"R.R. Lutz","year":"2000","unstructured":"R.R. Lutz, Software Engineering for Safety: A Roadmap, in: The Future of Software Engineering, edited by A. Finkelstein (ACM Press, New York, 2000), pp. 213\u2013226."},{"issue":"1","key":"20_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"G. Sindre and A.L. Opdahl, Eliciting Security Requirements with Misuse Cases, Requirements Engineering, 10(1), 34\u201344 (2005).","journal-title":"Requirements Engineering"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"I.F. Alexander, Initial Industrial Experience of Misuse Cases in Trade-Off Analysis, in: 10th Anniversary IEEE Joint International Requirements Engineering Conference (RE\u201902), Essen, Germany, 9\u201313 Sep, edited by K. Pohl (IEEE, 2002).","DOI":"10.1109\/ICRE.2002.1048506"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2003.1159030","volume":"20","author":"I.F. Alexander","year":"2003","unstructured":"I.F. Alexander, Misuse Cases, Use Cases with Hostile Intent, IEEE Software, 20 58\u201366 (2003).","journal-title":"IEEE Software"},{"key":"20_CR7","volume-title":"Software for Use: A Practical Guide to the Models and Methods of Usage-Centered Design","author":"L.L. Constantine","year":"1999","unstructured":"L.L. Constantine and L.A.D. Lockwood, Software for Use: A Practical Guide to the Models and Methods of Usage-Centered Design (ACM Press, New York, 1999)."},{"key":"20_CR8","unstructured":"J. Zhou and T. St\u00e5lhane, A Framework for Early Robustness Assessment, in: 8th IASTED Conference on Software Engineering and Application, MIT, Cambridge, MA, 8\u201310 Nov, edited by M.H. Hamza (Acta Press, 2004)."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"K. Allenby and T. Kelly, Deriving Safety Requirements Using Scenarios, in: Fifth IEEE International Symposium on Requirements Engineering (RE\u201901), Toronto, Canada, edited by B. Nuseibeh, and S. Easterbrook (IEEE, 2001), pp. 228\u2013235.","DOI":"10.1109\/ISRE.2001.948563"},{"key":"20_CR10","unstructured":"H.-K. Kim and Y.-K. Chung, Automatic Translation from Requirements Model into Use Cases Modeling on UML, in: Computational Science and Its Applications (ICCSA\u201905), Singapore, 9\u201312 May, Lecture Notes in Computer Science Vol. 3482, edited by O. Gervasi, M.L. Gavrilova, V. Kumar, A. Lagan\u00e0, H.P. Lee, Y. Mun, D. Taniar, and C.J.K. Tan (Springer-Verlag, 2005), pp. 769\u2013777."},{"key":"20_CR11","unstructured":"SAE, Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment, Society of Automotive Engineers, Technical report, ARP4761, 1996 (unpublished)."},{"key":"20_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-0823-8","volume-title":"System Safety: HAZOP and Software HAZOP","author":"F. Redmill","year":"1999","unstructured":"F. Redmill, M. Chudleigh, and J. Catmur, System Safety: HAZOP and Software HAZOP (Wiley, Chichester, UK, 1999)."},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"A. Ebnenasir, B.H.C. Cheng, and S. Konrad, Use Case-Based Modeling and Analysis of Failsafe Fault-Tolerance, in: 14th IEEE International Requirements Engineering Conference (RE\u201906), St.Louis, USA, 11\u201315 Sep, edited by M. Glinz (IEEE, 2006), pp. 343\u2013344.","DOI":"10.1109\/RE.2006.70"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"B.A. Gran, R. Fredriksen, and A.P.-J. Thunem, An Approach for Model-Based Risk Assessment, in: Computer Safety, Reliability, and Security, 23rd International Conference, SAFECOMP 2004, Potsdam, Germany, 21\u201324 Sep, Lecture Notes in Computer Science Vol. 3219, edited by M. Heisel, P. Liggesmeyer, and S. Wittmann (Springer, 2004), pp. 311\u2013324.","DOI":"10.1007\/978-3-540-30138-7_26"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"J. J\u00fcrjens, Developing Safety-Critical Systems with UML, in: The Sixth International Conference on The Unified Modeling Language (UML\u201903), San Francisco, USA, 20\u201324 Oct, Lecture Notes on Computer Science Vol. 2863, edited by P. Stevens, J. Whittle, and G. Booch (Springer-Verlag, 2003), pp. 144\u2013159.","DOI":"10.1007\/978-3-540-45221-8_31"},{"key":"20_CR16","unstructured":"K. Berkenk\u00f6tter, U. Hannemann, and J. Peleska, HYBRIS-Efficient Specification and Analysis of Hybrid Systems-Part III: RCSD-A UML 2.0 Profile for the Railway Control System Domain (Draft Version), Univ. Bremen, Germany, 2006 (unpublished)."},{"key":"20_CR17","unstructured":"J. J\u00fcrjens, UMLsec: Extending UML for Secure Systems Development, in: The Unified Modeling Language, 5th International Conference (UML 2002), Dresden, Germany, Sep 30\u2013Oct 4, Lecture Notes in Computer Science Vol. 2460, edited by J. M. Jezequel, H. Haussmann, and S. Cook (Springer, 2002), pp. 412\u2013425."},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"T. Lodderstedt, D. Basin, and J. Doser, SecureUML: A UML-Based Modeling Language for Model-Driven Security, in: The Unified Modeling Language, 5th International Conference (UML 2002), Dresden, Germany, Sep 30\u2013Oct 4, Lecture Notes in Computer Science Vol. 2460, edited by J.M. Jezequel, H. Haussmann, and S. Cook (Springer, 2002), pp. 426\u2013441.","DOI":"10.1007\/3-540-45800-X_33"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"C. Rolland and N. Prakash, A proposal for context-specific method engineering, in: IFIP TC8, WG8.1\/8.2 working conference on Method engineering: principles of method construction and tool support, Atlanta, edited by S. Brinkkemper, K. Lyytinen, and R.J. Welke (Chapman & Hall, 1996), pp. 191\u2013208.","DOI":"10.1007\/978-0-387-35080-6_13"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"S. Brinkkemper, M. Saeki, and F. Harmsen, Assembly techniques for method engineering, in: 10th international conference on advanced information systems engineering (CAiSE\u201998), Pisa, Italy, Lecture Notes in Computer Science Vol. 1413, edited by B. Pernici, and C. Thanos (Springer, 1998).","DOI":"10.1007\/BFb0054236"},{"issue":"1","key":"20_CR21","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/s00766-005-0019-0","volume":"11","author":"I. Mirbel","year":"2006","unstructured":"I. Mirbel and J. Ralyt\u00e9, Situational method engineering: combining assembly-based and roadmap-driven approaches, Requirements Engineering, 11(1), 58\u201378 (2006).","journal-title":"Requirements Engineering"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Situational Method Engineering: Fundamentals and Experiences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73947-2_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T22:37:01Z","timestamp":1737758221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73947-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387739465","9780387739472"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73947-2_20","relation":{},"subject":[]}}