{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T07:55:39Z","timestamp":1726041339141},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030291563"},{"type":"electronic","value":"9783030291570"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29157-0_7","type":"book-chapter","created":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T11:02:49Z","timestamp":1565607769000},"page":"150-172","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Systematic Refinement of Softgoals Using a Combination of KAOS Goal Models and Problem Diagrams"],"prefix":"10.1007","author":[{"given":"Nelufar","family":"Ulfat-Bunyadi","sequence":"first","affiliation":[]},{"given":"Nazila","family":"Gol Mohammadi","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Wirtz","sequence":"additional","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,13]]},"reference":[{"key":"7_CR1","unstructured":"van Lamsweerde, A.: Goal-oriented requirements engineering: a guided tour. In: Proceedings of RE 2001, pp. 249\u2013263. IEEE Computer Society (2001)"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/291469.293165","volume":"42","author":"J Mylopoulos","year":"1999","unstructured":"Mylopoulos, J., Chung, L., Yu, E.: From object-oriented to goal-oriented requirements analysis. Commun. ACM 42(1), 31\u201337 (1999)","journal-title":"Commun. ACM"},{"key":"7_CR3","volume-title":"Requirements Engineering - From System Goals to UML Models to Software Specifications","author":"A Lamsweerde Van","year":"2009","unstructured":"Van Lamsweerde, A.: Requirements Engineering - From System Goals to UML Models to Software Specifications. Wiley, Hoboken (2009)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Ulfat-Bunyadi, N., Gol Mohammadi, N., Heisel, M.: Supporting the systematic goal refinement in KAOS using the Six-Variable Model. In: Proceedings of ICSOFT 2018, pp. 136\u2013145 (2018)","DOI":"10.5220\/0006850701020111"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Ulfat-Bunyadi, N., Meis, R., Heisel, M.: The six-variable model - context modelling enabling systematic reuse of control software. In: Proceedings of ICSOFT 2016, pp. 15\u201326 (2016)","DOI":"10.5220\/0005944100150026"},{"key":"7_CR6","volume-title":"Problem Frames - Analysing and Structuring Software Development Problems","author":"M Jackson","year":"2001","unstructured":"Jackson, M.: Problem Frames - Analysing and Structuring Software Development Problems. Addison-Wesley, Boston (2001)"},{"issue":"1","key":"7_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/237432.237434","volume":"6","author":"P Zave","year":"1997","unstructured":"Zave, P., Jackson, M.: Four dark corners of requirements engineering. ACM Trans. Softw. Eng. Methodol. 6(1), 1\u201330 (1997)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/0167-6423(95)96871-J","volume":"25","author":"D Parnas","year":"1995","unstructured":"Parnas, D., Madey, J.: Functional documents for computer systems. Sci. Comput. Program. 25(1), 41\u201361 (1995)","journal-title":"Sci. Comput. Program."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Haley, C.B., Laney, R.C., Moffett, J.D., Nuseibeh, B.: The effect of trust assumptions on the elaboration of security requirements. In: Proceedings of RE 2004, pp. 102\u2013111 (2004)","DOI":"10.1007\/978-3-540-24747-0_27"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Wirtz, R., Heisel, M., Meis, R., Omerovic, A., St\u00f8len, K.: Problem-based elicitation of security requirements - the ProCOR method. In: Proceedings of ENASE 2018, pp. 26\u201338. SciTePress (2018)","DOI":"10.5220\/0006669400260038"},{"key":"7_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12323-8","volume-title":"Model-Driven Risk Analysis \u2013 The CORAS Approach","author":"M Lund","year":"2011","unstructured":"Lund, M., Solhaug, B., Stolen, K.: Model-Driven Risk Analysis \u2013 The CORAS Approach. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-12323-8"},{"key":"7_CR12","unstructured":"RestAssured Consortium: Deliverable D8.1: First Validation Plan (2017). \n                    https:\/\/restassuredh2020.eu\/wp-content\/uploads\/2018\/07\/D8.1.pdf"},{"key":"7_CR13","unstructured":"Bleistein, S., Cox, K., Verner, J.: Requirements engineering for e-business systems: integrating Jackson problem diagrams with goal modelling and BPM. In: Proceedings of APSEC 2004, pp. 410\u2013417. IEEE Computer Society (2004)"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-642-40511-2_19","volume-title":"Availability, Reliability, and Security in Information Systems and HCI","author":"NG Mohammadi","year":"2013","unstructured":"Mohammadi, N.G., Alebrahim, A., Weyer, T., Heisel, M., Pohl, K.: A framework for combining problem frames and goal models to support context analysis during requirements engineering. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds.) CD-ARES 2013. LNCS, vol. 8127, pp. 272\u2013288. Springer, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-40511-2_19"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Dao, T., Lee, H., Kang, K.: Problem frames-based approach to achieving quality attributes in software product line engineering. In: Proceedings of SPLC 2011, pp. 175\u2013180. IEEE Computer Society (2011)","DOI":"10.1109\/SPLC.2011.55"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Han, D., Xing, J., Yang, Q., Li, J., Zhang, X., Chen, Y.: Integrating goal models and problem frames for requirements analysis of self-adaptive CPS. In: Proceedings of COMPSAC 2017, pp. 529\u2013535. IEEE Computer Society (2017)","DOI":"10.1109\/COMPSAC.2017.152"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Elahi, G., Yu, E.: Trust trade-off analysis for security requirements engineering. In: Proceedings of RE 2009, pp. 243\u2013248 (2009)","DOI":"10.1109\/RE.2009.12"},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"P Giorgini","year":"2007","unstructured":"Giorgini, P., Mouratidis, H.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285\u2013309 (2007)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"issue":"2","key":"7_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijsse.2014040101","volume":"5","author":"P Meland","year":"2014","unstructured":"Meland, P., Paja, E., Gj\u00e6re, E., Paul, S., Dalpiaz, F., Giorgini, P.: Threat analysis in goal-oriented security requirements modelling. Int. J. Secur. Softw. Eng. 5(2), 1\u201319 (2014)","journal-title":"Int. J. Secur. Softw. Eng."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Fa\u00dfbender, S., Heisel, M., Meis, R.: Functional requirements under security PresSuRE. In: Proceedings of ICSOFT-PT 2014, pp. 5\u201316 (2014)","DOI":"10.5220\/0005098600050016"},{"key":"7_CR21","unstructured":"Lin, L., Nuseibeh, B., Ince, D.C., Jackson, M., Moffett, J.D.: Analysing security threats and vulnerabilities using abuse frames. Technical Report No. 2003\/10, October 2003, The Open University, United Kingdom (2003)"},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"C Haley","year":"2008","unstructured":"Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133\u2013153 (2008)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Communications in Computer and Information Science","Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29157-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T11:06:27Z","timestamp":1565607987000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-29157-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030291563","9783030291570"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29157-0_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"13 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSOFT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Porto","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icsoft2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icsoft.org\/?y=2018","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Primoris","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"117","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}