{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:33:23Z","timestamp":1743028403076,"version":"3.40.3"},"publisher-location":"London","reference-count":16,"publisher":"Springer London","isbn-type":[{"type":"print","value":"9781447144250"},{"type":"electronic","value":"9781447144267"}],"license":[{"start":{"date-parts":[[2012,8,10]],"date-time":"2012-08-10T00:00:00Z","timestamp":1344556800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,8,10]],"date-time":"2012-08-10T00:00:00Z","timestamp":1344556800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-1-4471-4426-7_95","type":"book-chapter","created":{"date-parts":[[2012,8,9]],"date-time":"2012-08-09T15:52:35Z","timestamp":1344527555000},"page":"1131-1142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Model Driven Security Engineering Approach to Support Collaborative Tools Deployment Over Clouds"],"prefix":"10.1007","author":[{"given":"W. F.","family":"Ouedraogo","sequence":"first","affiliation":[]},{"given":"F.","family":"Biennier","sequence":"additional","affiliation":[]},{"given":"P.","family":"Ghodous","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,8,10]]},"reference":[{"key":"95_CR1","unstructured":"OMG (Object Management Group), (2011). Business Process Model and Notation (BPMN) Version 2.0, http:\/\/www.omg.org\/spec\/BPMN\/2.0"},{"key":"95_CR2","unstructured":"Backes M, Pfitzmann B, Waider M (2003) Security in Business Process Engineering. In: vander Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678,pp. 168\u2013183. Springer, Heidelberg"},{"issue":"3-4","key":"95_CR3","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1007\/s10660-006-8677-7","volume":"6","author":"P Herrmann","year":"2006","unstructured":"Herrmann P, Herrmann G (2006) Security requirement analysis of business processes. Electronic Commerce Research 6(3-4), 305\u2013335","journal-title":"Electronic Commerce Research"},{"key":"95_CR4","doi-asserted-by":"crossref","unstructured":"Rodriguez A., Fernandez-Medina E., Piattini M., (2007) A BPMN extension for the modelling of security requirements in business processes, the institute of electronics, Information and Communication Engineers (IEICE), Vol.E90-D, NO.4.","DOI":"10.1093\/ietisy\/e90-d.4.745"},{"key":"95_CR5","unstructured":"M\u00fclle J, von Stackelberg S, Klemen A (2011) Security Language for BPMN Process Models, Karlsruhe institute of technology, Germany."},{"key":"95_CR6","unstructured":"ANSI (Agence National de la s\u00e9curit\u00e9 des SI), (2004). Expression des besoins et identification des objectifs de s\u00e9curit\u00e9. La d\u00e9marche\u201d, Version 2."},{"key":"95_CR7","unstructured":"Club de la s\u00e9curit\u00e9 de l\u2019Information Fran\u00e7ais (CLUSIF), (2010). MEHARI 2010. Guide de la d\u00e9marche d\u2019analyse et de traitement des risques."},{"key":"95_CR8","unstructured":"Dorofee A (2002) Managing information security risks across the enterprise, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA 15213."},{"key":"95_CR9","doi-asserted-by":"crossref","unstructured":"Alberts, C., Dorofee, A., Stevens J., Woody C., (2003). Introduction to the OCTAVE Approach, Carnegie Mellon University, Pittsburgh.","DOI":"10.21236\/ADA634134"},{"key":"95_CR10","unstructured":"Moore AP, Ellison R J, (2001) Architectural Refinement for the Design of Survivable Systems, Technical Note (CMU\/SEI-2001-TN-008). Software Engineering Institute, Carnegie Mellon University."},{"key":"95_CR11","doi-asserted-by":"crossref","unstructured":"Mell P, Grance T, J (2011) The NIST Definition of Cloud Computing, Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-145","DOI":"10.6028\/NIST.SP.800-145"},{"key":"95_CR12","unstructured":"Sinclair J, Hudzia B, Lindner M (2011) The first International Conference on Cloud Computing and Services Science, CLOSER 2011 \u201cArchitecture for compliance analysis of distributed service based systems\u201d. Belfast, Northern Ireland, U.K."},{"key":"95_CR13","unstructured":"US Government, (2001).Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act, Title V, s 505."},{"key":"95_CR14","unstructured":"Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration, Jericho Forum, Version 1.0, (April 2009), http:\/\/www.opengroup.org\/jericho\/cloud_cube_model_v1.0.pdf."},{"key":"95_CR15","unstructured":"Organization for the Advancement of Structured Information Standards (OASIS), (2009). OASIS: Reference Architecture Foundation for Service Oriented Architecture, Version 1.0."},{"key":"95_CR16","doi-asserted-by":"crossref","unstructured":"Lima Dutra M,\u00a0Ghodous P,\u00a0Kuhn O,\u00a0Minh T (2010) A Generic and Synchronous Ontology-based Architecture for Collaborative Design.\u00a0Concurrent Engineering, Research and Applications 18(1):65-74,\u00a0Sage,\u00a0ISSN 1063 293X.2010.","DOI":"10.1177\/1063293X10361622"}],"container-title":["Concurrent Engineering Approaches for Sustainable Product Development in a Multi-Disciplinary Environment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4471-4426-7_95","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T09:31:28Z","timestamp":1675935088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4471-4426-7_95"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,10]]},"ISBN":["9781447144250","9781447144267"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-1-4471-4426-7_95","relation":{},"subject":[],"published":{"date-parts":[[2012,8,10]]},"assertion":[{"value":"10 August 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}