{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T08:04:35Z","timestamp":1771661075603,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030801281","type":"print"},{"value":"9783030801298","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80129-8_52","type":"book-chapter","created":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T09:04:22Z","timestamp":1625475862000},"page":"761-783","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Security Requirement Engineering Case Study: Challenges and Lessons Learned"],"prefix":"10.1007","author":[{"given":"Souha\u00efl","family":"El Ghazi El Houssa\u00efni","sequence":"first","affiliation":[]},{"given":"Ilham","family":"Maskani","sequence":"additional","affiliation":[]},{"given":"Jaouad","family":"Boutahar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"52_CR1","doi-asserted-by":"publisher","unstructured":"Maskani, I., Boutahar, J., El Ghazi El Houssa\u00efni, S.: Analysis of security requirements engineering: towards a comprehensive approach. (IJACSA) Int. J. Adv. Comput. Sci. Appl. 7(11), 39\u201345 (2016). https:\/\/doi.org\/10.14569\/IJACSA.2016.071106","DOI":"10.14569\/IJACSA.2016.071106"},{"key":"52_CR2","doi-asserted-by":"publisher","unstructured":"Boutahar, J., Maskani, I., El Ghazi El Houssa\u00efni, S.: Experimental evaluation of security requirements engineering benefits. Int. J. Adv. Comput. Sci. Appl. (IJACSA) 9(11), 411\u2013415 (2018). https:\/\/doi.org\/10.14569\/IJACSA.2018.091158","DOI":"10.14569\/IJACSA.2018.091158"},{"key":"52_CR3","doi-asserted-by":"crossref","unstructured":"Mead, N., Hough, E., Stehney, T.: Security quality requirements engineering (SQUARE) methodology (2005). http:\/\/resources.sei.cmu.edu\/asset_files\/technicalreport\/2005_005_001_14594.pdf. Accessed 20 Oct 2016","DOI":"10.21236\/ADA443493"},{"key":"52_CR4","unstructured":"Chung, L., Hung, F., Hough, E., Ojoko-Adams, D.: Security quality requirements engineering (SQUARE): case study phase III. CMU\/SEI-2006-SR-003 (May 2006). https:\/\/resources.sei.cmu.edu\/asset_files\/SpecialReport\/2006_003_001_14642.pdf. Accessed 15 Nov 2018"},{"issue":"1","key":"52_CR5","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1002\/sys.21252","volume":"17","author":"N Zafar","year":"2014","unstructured":"Zafar, N., Arnautovic, E., Diabat, A., Svetinovic, D.: System security requirements analysis: a smart grid case study. Syst. Eng. 17(1), 77\u201388 (2014). https:\/\/doi.org\/10.1002\/sys.21252","journal-title":"Syst. Eng."},{"key":"52_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/11863908_13","volume-title":"Computer Security \u2013 ESORICS 2006","author":"D Mellado","year":"2006","unstructured":"Mellado, D., Fern\u00e1ndez-Medina, E., Piattini, M.: Applying a security requirements engineering process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 192\u2013206. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11863908_13"},{"key":"52_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-540-39648-2_22","volume-title":"Conceptual Modeling - ER 2003","author":"P Giorgini","year":"2003","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J.: Requirement engineering meets security: a case study on modelling secure electronic transactions by VISA and mastercard. In: Song, I.-Y., Liddle, S.W., Ling, T.-W., Scheuermann, P. (eds.) ER 2003. LNCS, vol. 2813, pp. 263\u2013276. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39648-2_22"},{"key":"52_CR8","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.datak.2015.07.007","volume":"98","author":"E Paja","year":"2015","unstructured":"Paja, E., Dalpiaz, F., Giorgini, P.: Modelling and reasoning about security requirements in socio-technical systems. Data Knowl. Eng. 98, 123\u2013143 (2015). https:\/\/doi.org\/10.1016\/j.datak.2015.07.007","journal-title":"Data Knowl. Eng."},{"issue":"3","key":"52_CR9","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.cose.2006.11.003","volume":"26","author":"A Zuccato","year":"2007","unstructured":"Zuccato, A.: Holistic security management framework applied in electronic commerce. Comput. Secur. 26(3), 256\u2013265 (2007). https:\/\/doi.org\/10.1016\/j.cose.2006.11.003","journal-title":"Comput. Secur."},{"issue":"2","key":"52_CR10","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MS.2007.42","volume":"24","author":"M Glinz","year":"2007","unstructured":"Glinz, M., Wieringa, R.J.: Guest editors\u2019 introduction: stakeholders in requirements engineering. IEEE Softw. 24(2), 18\u201320 (2007). https:\/\/doi.org\/10.1109\/MS.2007.42","journal-title":"IEEE Softw."},{"issue":"5","key":"52_CR11","doi-asserted-by":"publisher","first-page":"73","DOI":"10.9790\/0661-1557378","volume":"15","author":"SI Majumdar","year":"2013","unstructured":"Majumdar, S.I., Rahman, M.S., Rahman, M.M.: Thorny issues of stakeholder identification and prioritization in requirement engineering process. IOSR J. Comput. Eng. (IOSR - JCE) 15(5), 73\u201378 (2013)","journal-title":"IOSR J. Comput. Eng. (IOSR - JCE)"},{"key":"52_CR12","doi-asserted-by":"crossref","unstructured":"Wunder, J., Halbardier, A., Waltermire, D.: Specification for asset identification 1.1. US Department of Commerce, National Institute of Standards and Technology (2011). http:\/\/csrc.nist.gov\/publications\/nistir\/ir7693\/NISTIR-7693.pdf. Accessed 07 Jan 2017","DOI":"10.6028\/NIST.IR.7693"},{"key":"52_CR13","unstructured":"ISO: ISO\/IEC 27005:2018\u202f: Information technology -- Security techniques -- Information security risk management. ISO\/IEC 27005 (2018). http:\/\/www.iso.org\/cms\/render\/live\/en\/sites\/isoorg\/contents\/data\/standard\/07\/52\/75281.html. Accessed 15 April 2019"},{"key":"52_CR14","unstructured":"Risk management -- Risk assessment techniques IEC 31010:2009 (2009). http:\/\/www.iso.org\/cms\/render\/live\/en\/sites\/isoorg\/contents\/data\/standard\/05\/10\/51073.html. Accessed 21 Feb 2019"},{"key":"52_CR15","unstructured":"The STRIDE Threat Model | Microsoft Docs (2019). https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20). Accessed 04 April 2019"}],"container-title":["Lecture Notes in Networks and Systems","Intelligent Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80129-8_52","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T07:14:04Z","timestamp":1771658044000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80129-8_52"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030801281","9783030801298"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80129-8_52","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"6 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}