{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:33Z","timestamp":1740099273135,"version":"3.37.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030047702"},{"type":"electronic","value":"9783030047719"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04771-9_48","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T17:02:53Z","timestamp":1544029373000},"page":"633-643","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Scenario-Based Security Requirements Engineering for Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Thorsten","family":"Koch","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"key":"48_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15, 39\u201391 (2006)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"48_CR2","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Prakash, A., Shafique, M.: Secure cyber-physical systems: current trends, tools and open research problems. In: Design, Automation Test in Europe Conference Exhibition (DATE), pp. 1104\u20131109, March 2017","DOI":"10.23919\/DATE.2017.7927154"},{"issue":"3","key":"48_CR3","doi-asserted-by":"publisher","first-page":"53","DOI":"10.5381\/jot.2003.2.3.c6","volume":"2","author":"Donald Firesmith","year":"2003","unstructured":"Firesmith, D.: Security use cases. J. Object Technol. 2(3), 53 (2003). http:\/\/www.jot.fm\/issues\/issue_2003_05\/column6.pdf","journal-title":"The Journal of Object Technology"},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Firesmith, D.G.: Engineering safety and security related requirements for software intensive systems. In: 29th International Conference on Software Engineering, p. 169. IEEE Computer Society, Los Alamitos (2007)","DOI":"10.1109\/ICSECOMPANION.2007.35"},{"key":"48_CR5","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-54118-6_14","volume-title":"Collaborative Design for Embedded Systems","author":"J Fitzgerald","year":"2014","unstructured":"Fitzgerald, J., Larsen, P.G., Verhoef, M.: From embedded to cyber-physical systems: challenges and future directions. In: Fitzgerald, J., Larsen, P.G., Verhoef, M. (eds.) Collaborative Design for Embedded Systems, pp. 293\u2013303. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54118-6_14"},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Geismann, J., Gerking, C., Bodden, E.: Towards ensuring security by design in cyber-physical systems engineering processes. In: International Conference on Software and System Processes (ICSSP), 26\u201327 May 2018","DOI":"10.1145\/3202710.3203159"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Mouratidis, H., Zannone, N.: Modelling security and trust with secure tropos. In: Integrating Security and Software Engineering: Advances and Future Vision, pp. 160\u2013189 (2006)","DOI":"10.4018\/978-1-59904-147-6.ch008"},{"key":"48_CR8","unstructured":"Greenyer, J.: Scenario-based Design of Mechatronic Systems. Ph.D. thesis, University of Paderborn (2011). http:\/\/dups.ub.uni-paderborn.de\/hs\/urn\/urn:nbn:de:hbz:466:2--7690"},{"issue":"1","key":"48_CR9","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"CB Haley","year":"2008","unstructured":"Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133\u2013153 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"48_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19029-2","volume-title":"Come, Let\u2019s Play: Scenario-Based Programming Using LSC\u2019s and the Play-Engine","author":"D Harel","year":"2003","unstructured":"Harel, D., Marelly, R.: Come, Let\u2019s Play: Scenario-Based Programming Using LSC\u2019s and the Play-Engine. Springer, New York (2003). https:\/\/doi.org\/10.1007\/978-3-642-19029-2"},{"issue":"9","key":"48_CR11","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1002\/smr.1780","volume":"28","author":"J Holtmann","year":"2016","unstructured":"Holtmann, J., Bernijazov, R., Meyer, M., Schmelter, D., Tschirner, C.: Integrated and iterative systems engineering and software requirements engineering for technical systems. J. Softw. Evol. Process. 28(9), 722\u2013743 (2016)","journal-title":"J. Softw. Evol. Process."},{"key":"48_CR12","unstructured":"Holtmann, J., Fockel, M., Koch, T., Schmelter, D., Brenner, C., Bernijazov, R., Sander, M.: The MechatronicUML requirements engineering method: process and language (2016)"},{"key":"48_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"UML 2002 \u2014 The Unified Modeling Language","author":"J J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412\u2013425. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45800-X_32"},{"key":"48_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/b137706","volume-title":"Secure Systems Development with UML","author":"J J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/b137706"},{"key":"48_CR15","doi-asserted-by":"publisher","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: Proceedings of the 11th IEEE International Requirements Engineering Conference, 2003, pp. 151\u2013161 (2003). https:\/\/doi.org\/10.1109\/ICRE.2003.1232746","DOI":"10.1109\/ICRE.2003.1232746"},{"issue":"4","key":"48_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1082983.1083214","volume":"30","author":"Nancy R. Mead","year":"2005","unstructured":"Mead, N.R., Stehney, T.: Security quality requirements engineering (SQUARE) methodology (2005)","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"48_CR17","doi-asserted-by":"crossref","unstructured":"Pauli, J.J., Xu, D.: Misuse case-based design and analysis of secure software architecture. In: ITCC 2005, vol. 2, pp. 398\u2013403. IEEE Computer Society, Los Alamitos (2003)","DOI":"10.1109\/ITCC.2005.199"},{"issue":"1","key":"48_CR18","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TSMCC.2011.2106495","volume":"42","author":"AL Ramos","year":"2012","unstructured":"Ramos, A.L., Ferreira, J.V., Barcel\u00f3, J.: Model-based systems engineering: an emerging approach for modern systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 42(1), 101\u2013111 (2012)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"issue":"1","key":"48_CR19","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34\u201344 (2005)","journal-title":"Requir. Eng."},{"key":"48_CR20","unstructured":"VDI: Design methodology for mechatronic systems (VDI 2206)"},{"key":"48_CR21","doi-asserted-by":"crossref","unstructured":"Whittle, J., Wijesekera, D., Hartong, M.: Executable misuse cases for modeling security concerns. In: Sch\u00e4fer, W. (ed.) Proceedings of the 30th International Conference on Software Engineering, p. 121. ACM Press, New York (2008)","DOI":"10.1145\/1368088.1368106"},{"issue":"7","key":"48_CR22","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1016\/j.infsof.2008.01.010","volume":"51","author":"BD Win","year":"2009","unstructured":"Win, B.D., Scandariato, R., Buyens, K., Gr\u00e9goire, J., Joosen, W.: On the secure software development process: CLASP, SDL and touchpoints compared. Inf. Softw. Technol. 51(7), 1152\u20131171 (2009). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0950584908000281 . Special Section: Software Engineering for Secure Systems","journal-title":"Inf. Softw. Technol."}],"container-title":["Lecture Notes in Computer Science","Software Technologies: Applications and Foundations"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04771-9_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T15:53:16Z","timestamp":1573055596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04771-9_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030047702","9783030047719"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04771-9_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"STAF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Federation of International Conferences on Software Technologies: Applications and Foundations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"staf2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.staf2018.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}