{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:28:04Z","timestamp":1765888084015},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_37","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"428-442","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Shafiq","family":"Rehman","sequence":"first","affiliation":[]},{"given":"Volker","family":"Gruhn","sequence":"additional","affiliation":[]},{"given":"Saad","family":"Shafiq","sequence":"additional","affiliation":[]},{"given":"Irum","family":"Inayat","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"key":"37_CR1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"RJ Anderson","year":"2010","unstructured":"Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, Hoboken (2010)"},{"issue":"4","key":"37_CR2","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.csi.2010.01.006","volume":"32","author":"D Mellado","year":"2010","unstructured":"Mellado, D., Blanco, C., S\u00e1nchez, L.E., Fern\u00e1ndez-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32(4), 153\u2013165 (2010)","journal-title":"Comput. Stand. Interfaces"},{"key":"37_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-10975-6_6","volume-title":"Availability, Reliability, and Security in Information Systems","author":"D Mu\u00f1ante","year":"2014","unstructured":"Mu\u00f1ante, D., Chiprianov, V., Gallon, L., Aniort\u00e9, P.: A review of security requirements engineering methods with respect to risk analysis and model-driven engineering. In: Teufel, S., Min, T.A., You, I., Weippl, E. (eds.) CD-ARES 2014. LNCS, vol. 8708, pp. 79\u201393. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10975-6_6"},{"doi-asserted-by":"crossref","unstructured":"Yahya, S., Kamalrudin, M., Sidek, S.: A review on tool supports for security requirements engineering. In: IEEE Conference on Open Systems, ICOS 2013, pp. 190\u2013194 (2013)","key":"37_CR4","DOI":"10.1109\/ICOS.2013.6735072"},{"doi-asserted-by":"crossref","unstructured":"Yadav, S.A., Kumar, S.R., Sharma, S., Singh, A.: A review of possibilities and solutions of cyber attacks in smart grids. In: 1st International Conference on Innovation and Challenges in Cyber Security, ICICCS 2016, pp. 60\u201363 (2016)","key":"37_CR5","DOI":"10.1109\/ICICCS.2016.7542359"},{"doi-asserted-by":"crossref","unstructured":"Petersen, K., Feldt, R., Mujtaba, S., Mattsson, M.: Systematic mapping studies in software engineering. In: EASE, vol. 8, pp. 68\u201377 (2008)","key":"37_CR6","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"37_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-41924-9_23","volume-title":"Conceptual Modeling","author":"E Paja","year":"2013","unstructured":"Paja, E., Dalpiaz, F., Giorgini, P.: Managing security requirements conflicts in socio-technical systems. In: Ng, W., Storey, V.C., Trujillo, J.C. (eds.) ER 2013. LNCS, vol. 8217, pp. 270\u2013283. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41924-9_23"},{"key":"37_CR8","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/0-306-46998-7_32","volume-title":"Trusted Information","author":"G Wimmel","year":"2002","unstructured":"Wimmel, G., Wisspeintner, A.: Extended description techniques for security engineering. In: Dupuy, M., Paradinas, P. (eds.) SEC 2001. IIFIP, vol. 65, pp. 469\u2013485. Springer, Boston, MA (2002). https:\/\/doi.org\/10.1007\/0-306-46998-7_32"},{"key":"37_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/10958513_29","volume-title":"Information Security","author":"JL Vivas","year":"2003","unstructured":"Vivas, J.L., Montenegro, J.A., L\u00f3pez, J.: Towards a business process-driven framework for security engineering with the UML. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 381\u2013395. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/10958513_29"},{"key":"37_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-540-30144-8_35","volume-title":"Information Security","author":"T Srivatanakul","year":"2004","unstructured":"Srivatanakul, T., Clark, J.A., Polack, F.: Effective security requirements analysis: HAZOP and use cases. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 416\u2013427. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30144-8_35"},{"key":"37_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/11554578_8","volume-title":"Foundations of Security Analysis and Design III","author":"P Giorgini","year":"2005","unstructured":"Giorgini, P., Massacci, F., Zannone, N.: Security and trust requirements engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2004-2005. LNCS, vol. 3655, pp. 237\u2013272. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11554578_8"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/11863908_13","volume-title":"Computer Security \u2013 ESORICS 2006","author":"D Mellado","year":"2006","unstructured":"Mellado, D., Fern\u00e1ndez-Medina, E., Piattini, M.: Applying a security requirements engineering process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 192\u2013206. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11863908_13"},{"issue":"2","key":"37_CR13","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/s00766-005-0023-4","volume":"11","author":"CB Haley","year":"2006","unstructured":"Haley, C.B., Laney, R.C., Moffett, J.D., Nuseibeh, B.: Using trust assumptions with security requirements. Requir. Eng. 11(2), 138\u2013151 (2006)","journal-title":"Requir. Eng."},{"key":"37_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/11767138_4","volume-title":"Advanced Information Systems Engineering","author":"V Bryl","year":"2006","unstructured":"Bryl, V., Massacci, F., Mylopoulos, J., Zannone, N.: Designing security requirements models through planning. In: Dubois, E., Pohl, K. (eds.) CAiSE 2006. LNCS, vol. 4001, pp. 33\u201347. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11767138_4"},{"issue":"1","key":"37_CR15","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s00766-007-0058-9","volume":"13","author":"A Herrmann","year":"2008","unstructured":"Herrmann, A., Paech, B.: MOQARE: misuse-oriented quality requirements engineering. Requir. Eng. 13(1), 73\u201386 (2008)","journal-title":"Requir. Eng."},{"key":"37_CR16","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-15384-6_11","volume-title":"Knowledge-Based and Intelligent Information and Engineering Systems","author":"E Moradian","year":"2010","unstructured":"Moradian, E., H\u00e5kansson, A.: Controlling security of software development with multi-agent system. In: Setchi, R., Jordanov, I., Howlett, R.J., Jain, L.C. (eds.) KES 2010. LNCS (LNAI), vol. 6279, pp. 98\u2013107. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15384-6_11"},{"key":"37_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-33704-8_15","volume-title":"Computer Network Security","author":"R Rieke","year":"2012","unstructured":"Rieke, R., Coppolino, L., Hutchison, A., Prieto, E., Gaber, C.: Security and reliability requirements for advanced security event management. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 171\u2013180. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33704-8_15"},{"key":"37_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-07881-6_20","volume-title":"Advanced Information Systems Engineering","author":"T Li","year":"2014","unstructured":"Li, T., Horkoff, J.: Dealing with security requirements for socio-technical systems: a holistic approach. In: Jarke, M., et al. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 285\u2013300. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07881-6_20"},{"key":"37_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-319-15618-7_13","volume-title":"Engineering Secure Software and Systems","author":"A Souag","year":"2015","unstructured":"Souag, A., Salinesi, C., Mazo, R., Comyn-Wattiau, I.: A security ontology for security requirements elicitation. In: Piessens, F., Caballero, J., Bielova, N. (eds.) ESSoS 2015. LNCS, vol. 8978, pp. 157\u2013177. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15618-7_13"},{"issue":"1\u20132","key":"37_CR20","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s00450-014-0288-2","volume":"31","author":"C Neureiter","year":"2016","unstructured":"Neureiter, C., Eibl, G., Engel, D., Schlegel, S., Uslar, M.: A concept for engineering smart grid security requirements based on SGAM models. Comput. Sci.-Res. Dev. 31(1\u20132), 65\u201371 (2016)","journal-title":"Comput. Sci.-Res. Dev."},{"doi-asserted-by":"crossref","unstructured":"Rosa, N.S., Justo, G.R.R., Cunha, P.R.F.: A framework for building non-functional software architectures. In: Proceedings of the 2001 ACM Symposium on Applied Computing, pp. 141\u2013147 (2001)","key":"37_CR21","DOI":"10.1145\/372202.372299"},{"doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J.: Using UMLsec and goal trees for secure systems development. In: Proceedings of the 2002 ACM Symposium on Applied Computing, pp. 1026\u20131030 (2002)","key":"37_CR22","DOI":"10.1145\/508791.508990"},{"doi-asserted-by":"crossref","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security for process-oriented systems. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, pp. 100\u2013109 (2003)","key":"37_CR23","DOI":"10.1145\/775412.775425"},{"doi-asserted-by":"crossref","unstructured":"De Landtsheer, R., Van Lamsweerde, A.: Reasoning about confidentiality at requirements engineering time. In: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 41\u201349 (2005)","key":"37_CR24","DOI":"10.1145\/1081706.1081715"},{"doi-asserted-by":"crossref","unstructured":"Romero-Mariona, J.: Secure and usable requirements engineering. In: Proceedings of the 2009 IEEE\/ACM International Conference on Automated Software Engineering, pp. 703\u2013706 (2009)","key":"37_CR25","DOI":"10.1109\/ASE.2009.81"},{"doi-asserted-by":"crossref","unstructured":"Cui, J.-S., Zhang, D.: The research and application of security requirements analysis methodology of information systems. In: 2nd International Conference on Anti-counterfeiting, Security and Identification, ASID, pp. 30\u201336 (2008)","key":"37_CR26","DOI":"10.1109\/IWASID.2008.4688352"},{"doi-asserted-by":"crossref","unstructured":"Howard, G., Butler, M., Colley, J., Sassone, V.: Formal analysis of safety and security requirements of critical systems supported by an extended STPA methodology. In: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 174\u2013180 (2017)","key":"37_CR27","DOI":"10.1109\/EuroSPW.2017.68"},{"doi-asserted-by":"crossref","unstructured":"Gao, Y., et al.: Analysis of security threats and vulnerability for cyber-physical systems. In: 2013 3rd International Conference on Computer Science and Network Technology (ICCSNT), pp. 50\u201355. IEEE (2013)","key":"37_CR28","DOI":"10.1109\/ICCSNT.2013.6967062"},{"unstructured":"Repository link. http:\/\/sysmapsecre.azurewebsites.net","key":"37_CR29"},{"unstructured":"Rehman, S., Gruhn, V.: Security requirements engineering (SRE) framework for cyber-physical systems (CPS): SRE for CPS. In: Proceedings of the 16th International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT_17, vol. 297, p. 153 (2017)","key":"37_CR30"},{"issue":"3","key":"37_CR31","doi-asserted-by":"publisher","first-page":"65","DOI":"10.3390\/technologies6030065","volume":"6","author":"S Rehman","year":"2018","unstructured":"Rehman, S., Gruhn, V.: An effective security requirements engineering framework for cyber-physical systems. Technologies 6(3), 65 (2018)","journal-title":"Technologies"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T20:05:00Z","timestamp":1573070700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}