{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:27:00Z","timestamp":1743118020082,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_7","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"78-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modelling Security Requirements for Software Development with Common Criteria"],"prefix":"10.1007","author":[{"given":"Naseer","family":"Amara","sequence":"first","affiliation":[]},{"given":"Zhiqui","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Awais","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"2","key":"7_CR1","first-page":"243","volume":"29","author":"D Mellado","year":"2017","unstructured":"Mellado, D., Fern\u00e1ndez-Medina, E., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Comput. Stand. Interfaces 29(2), 243\u2013253 (2017)","journal-title":"Comput. Stand. Interfaces"},{"key":"7_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-3945-2","volume-title":"Software Development From A to Z","author":"O Filipova","year":"2018","unstructured":"Filipova, O., Vil\u00e3o, R.: Software Development From A to Z. Apress, Berkeley (2018). \n                    https:\/\/doi.org\/10.1007\/978-1-4842-3945-2"},{"key":"7_CR3","unstructured":"Tarique, M.D., Jama, A., Dhirendra, P., Mamdouh, A.: STORE: security threat oriented requirements engineering methodology. J. King Saud Univ. Comput. Inf. Sci. (2018)"},{"issue":"4","key":"7_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1082983.1083214","volume":"30","author":"Nancy R. Mead","year":"2005","unstructured":"Nancy, R., Ted, S.: Security quality requirements engineering (SQUARE) methodology. In: SESS 2005 Proceedings of the 2015 Workshop on Software Engineering for Secure Systems\u2013Building Trustworthy Applications, pp. 1\u20137. ACM SIGSOFT Software Engineering Notes, New York (2015). \n                    https:\/\/doi.org\/10.1145\/1082983.1083214","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"7_CR5","unstructured":"Cyber Security Standards. \n                    https:\/\/en.wikipedia.org\/wiki\/Cyber-security-standards\n                    \n                  . Accessed 2 Mar 2018"},{"key":"7_CR6","unstructured":"Common Criteria. \n                    https:\/\/www.commoncriteriaportal.org\/\n                    \n                  . Accessed 5 Jan 2018"},{"issue":"4","key":"7_CR7","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1016\/j.jare.2014.03.001","volume":"5","author":"H Hassan","year":"2014","unstructured":"Hassan, H., Sherif, K.: Capturing security requirements for software systems. J. Adv. Res. 5(4), 463\u2013472 (2014)","journal-title":"J. Adv. Res."},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"28611","DOI":"10.1109\/ACCESS.2018.2840322","volume":"6","author":"M Yusuf","year":"2018","unstructured":"Yusuf, M., Mahmood, N., Mohammad, A., Sajjad, M.: A readiness model for security requirements engineering. IEEE Access 6, 28611\u201328631 (2018)","journal-title":"IEEE Access"},{"issue":"18","key":"7_CR9","doi-asserted-by":"publisher","first-page":"5333","DOI":"10.1002\/sec.1700","volume":"9","author":"AK Nor Shahriza","year":"2016","unstructured":"Nor Shahriza, A.K., Arwa, A., Tanzila, S., Amjad, R.: The practice of secure software development in SDLC: an investigation through existing model and a case study. Secur. Commun. Netw. 9(18), 5333\u20135345 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"1","key":"7_CR10","first-page":"1","volume":"7","author":"U Mohammad","year":"2014","unstructured":"Mohammad, U., Shams, T.: TSSR: a proposed tool for secure software requirement management. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 7(1), 1\u201311 (2014)","journal-title":"Int. J. Inf. Technol. Comput. Sci. (IJITCS)"},{"issue":"3","key":"7_CR11","doi-asserted-by":"publisher","first-page":"65","DOI":"10.3390\/technologies6030065","volume":"6","author":"SU Rehman","year":"2018","unstructured":"Rehman, S.U., Gruhn, V.: An effective security requirements engineering framework for cyber-physical systems. Technologies 6(3), 65 (2018)","journal-title":"Technologies"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/11863908_13","volume-title":"Computer Security \u2013 ESORICS 2006","author":"D Mellado","year":"2006","unstructured":"Mellado, D., Fern\u00e1ndez-Medina, E., Piattini, M.: Applying a security requirements engineering process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 192\u2013206. Springer, Heidelberg (2006). \n                    https:\/\/doi.org\/10.1007\/11863908_13"},{"key":"7_CR13","unstructured":"Common Criteria: Common Criteria for Information Technology Security Evaluation - Part 1: Introduction and general model. ISO\/IEC (2017)"},{"key":"7_CR14","volume-title":"The Unified Modeling Language User Guide","author":"B Grady","year":"2005","unstructured":"Grady, B., James, R., Ivar, J.: The Unified Modeling Language User Guide, 2nd edn. Addison Wesley Professional, Boston (2005)","edition":"2"},{"issue":"3","key":"7_CR15","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10270-010-0164-x","volume":"10","author":"G Zoughbi","year":"2011","unstructured":"Zoughbi, G., Briand, L., Labiche, Y.: A UML profile for developing airworthiness-compliant (RTCA DO-178B) information: conceptual model and UML profile. Softw. Syst. Model. 10(3), 337\u2013367 (2011)","journal-title":"Softw. Syst. Model."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Maylawat, D.S., Darmalaksana, W., Ramdhani, M.A.: Systematic design of expert system using unified modelling language. In: IOP Conference Series: Materials Science and Engineering. IOP (2018)","DOI":"10.1088\/1757-899X\/288\/1\/012047"},{"key":"7_CR17","unstructured":"Amara, N.: Figshar. \n                    https:\/\/figshare.com\/articles\/Implementation-of-CC-Model-on-Facebook-Profile-docx\/5432719"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,13]],"date-time":"2019-07-13T15:03:15Z","timestamp":1563030195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}