{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:36:33Z","timestamp":1767137793717,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319070759","type":"print"},{"value":"9783319070766","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07076-6_7","type":"book-chapter","created":{"date-parts":[[2014,7,9]],"date-time":"2014-07-09T01:42:43Z","timestamp":1404870163000},"page":"93-108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Systematic Method for Risk-Driven Test Case Design Using Annotated Sequence Diagrams"],"prefix":"10.1007","author":[{"given":"Gencer","family":"Erdogan","sequence":"first","affiliation":[]},{"given":"Atle","family":"Refsdal","sequence":"additional","affiliation":[]},{"given":"Ketil","family":"St\u00f8len","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,10]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Casado, R., Tuya, J., Younas, M.: Testing long-lived web services transactions using a risk-based approach. In: Proceedings of 10th International Conference on Quality Software (QSIC\u201910), pp. 337\u2013340. IEEE Computer Society (2010)","DOI":"10.1109\/QSIC.2010.46"},{"key":"7_CR2","unstructured":"Chen, Y., Probert, R.L., Sims, D.P.: Specification-based regression test selection with risk analysis. In: Proceedings of 2002 Conference of the Centre for Advanced Studies on Collaborative Research (CASCON\u201902), pp. 1\u201314. IBM Press (2002)"},{"key":"7_CR3","unstructured":"Damn Vulnerable Web Application (DVWA). http:\/\/www.dvwa.co.uk\/. Accessed 11 Aug 2013"},{"key":"7_CR4","unstructured":"Erdogan, G., Li, Y., Runde, R.K., Seehusen, F., St\u00f8len, K.: Conceptual framework for the DIAMONDS project. Technical report A22798, SINTEF Information and Communication Technology (2012)"},{"issue":"5","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.1016\/j.jss.2012.12.051","volume":"86","author":"V Garousi","year":"2013","unstructured":"Garousi, V., Zhi, J.: A survey of software testing practices in Canada. J. Syst. Softw. 86(5), 1354\u20131376 (2013)","journal-title":"J. Syst. Softw."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Gleirscher, M.: Hazard-based selection of test cases. In: Proceedings of 6th International Workshop on Automation of Software Test (AST\u201911), pp. 64\u201370. ACM (2011)","DOI":"10.1145\/1982595.1982609"},{"key":"7_CR7","unstructured":"International Organization for Standardization. ISO 31000:2009(E), Risk management - Principles and guidelines (2009)"},{"key":"7_CR8","unstructured":"International Organization for Standardization. ISO\/IEC\/IEEE 29119\u20131:2013(E), Software and system engineering - Software testing - Part 1: Concepts and definitions (2013)"},{"key":"7_CR9","unstructured":"International Organization for Standardization. ISO\/IEC\/IEEE 29119\u20132:2013(E), Software and system engineering - Software testing - Part 2: Test process (2013)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Kloos, J., Hussain, T., Eschbach, R.: Risk-based testing of safety-critical embedded systems driven by fault tree analysis. In: Proceedings of 4th International Conference on Software Testing, Verification and Validation Workshops (ICSTW\u201911), pp. 26\u201333. IEEE Computer Society (2011)","DOI":"10.1109\/ICSTW.2011.90"},{"key":"7_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12323-8","volume-title":"Model-Driven Risk Analysis: The CORAS Approach","author":"MS Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis: The CORAS Approach. Springer, Heidelberg (2011)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Murthy, K.K., Thakkar, K.R., Laxminarayan, S.: Leveraging risk based testing in enterprise systems security validation. In: Proceedings of 1st International Conference on Emerging Network Intelligence (EMERGING\u201909), pp. 111\u2013116. IEEE Computer Society (2009)","DOI":"10.1109\/EMERGING.2009.28"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Dias-Neto, A.C., Subramanyan, R., Vieira, M., Travassos, G.H.: A survey on model-based testing approaches: a systematic review. In: Proceedings of 1st ACM International Workshop on Empirical Assessment of Software Engineering Languages and Technologies (WEASELTech\u201907), pp. 31\u201336. ACM (2007)","DOI":"10.1145\/1353673.1353681"},{"key":"7_CR14","unstructured":"Object Management Group. Unified Modeling Language (UML), superstructure, version 2.4.1, 2011. OMG Document Number: formal\/2011-08-06"},{"key":"7_CR15","unstructured":"Object Management Group. UML Testing Profile (UTP), version 1.2, 2013. OMG Document Number: formal\/2013-04-03"},{"issue":"12","key":"7_CR16","doi-asserted-by":"publisher","first-page":"2238","DOI":"10.1016\/j.comcom.2006.03.004","volume":"29","author":"R Oppliger","year":"2006","unstructured":"Oppliger, R., Hauser, R., Basin, D.: SSL\/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. Comput. Commun. 29(12), 2238\u20132246 (2006)","journal-title":"Comput. Commun."},{"key":"7_CR17","unstructured":"Open Web Application Security Project (OWASP). https:\/\/www.owasp.org\/index.php\/Cross-site_Scripting_(XSS). Accessed 5 Sept 2013"},{"key":"7_CR18","unstructured":"OWASP Top 10 Application Security Risks - 2013. https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project. Accessed 6 Sept 2013"},{"key":"7_CR19","unstructured":"PHP manual. http:\/\/php.net\/manual\/en\/pdo.prepared-statements.php. Accessed 6 Sept 2013"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Stallbaum, H., Metzger, A., Pohl, K.: An automated technique for risk-based test case generation and prioritization. In: Proceedings of 3rd International Workshop on Automation of Software Test (AST\u201908), pp. 67\u201370. ACM (2008)","DOI":"10.1145\/1370042.1370057"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: Risk Management Guide for Information Technology Systems. NIST Special Publication 800\u201330, National Institute of Standards and Technology (2002)","DOI":"10.6028\/NIST.SP.800-30"},{"key":"7_CR22","unstructured":"XAMPP. http:\/\/www.apachefriends.org\/en\/xampp.html. Accessed 11 Aug 2013"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Zech, P., Felderer, M., Breu, R.: Towards a model based security testing approach of cloud computing environments. In: Proceedings of 6th International Conference on Software Security and Reliability Companion (SERE-C\u201912), pp. 47\u201356. IEEE Computer Society (2012)","DOI":"10.1109\/SERE-C.2012.11"}],"container-title":["Lecture Notes in Computer Science","Risk Assessment and Risk-Driven Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07076-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,21]],"date-time":"2023-12-21T22:46:35Z","timestamp":1703198795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07076-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319070759","9783319070766"],"references-count":23,"aliases":["10.1007\/978-3-319-14114-5_7"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07076-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"10 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}