{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:37:28Z","timestamp":1767137848252,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319070759","type":"print"},{"value":"9783319070766","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07076-6_9","type":"book-chapter","created":{"date-parts":[[2014,7,9]],"date-time":"2014-07-09T01:42:43Z","timestamp":1404870163000},"page":"120-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Trace Management Platform for Risk-Based Security Testing"],"prefix":"10.1007","author":[{"given":"J\u00fcrgen","family":"Gro\u00dfmann","sequence":"first","affiliation":[]},{"given":"Michael","family":"Berger","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Viehmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,10]]},"reference":[{"key":"9_CR1","unstructured":"Altheide, F., Schuerr, A., Doerr, H.: Requirements to a Framework for Sustainable Integration of System Development Tools. In: Proceedings of the 3rd European Systems Engineering Conference (EuSEC), pp. S.53\u2013S.57 (2002)"},{"key":"9_CR2","unstructured":"Andreas, B., Jan, J., Yu, Y.: Run-Time Security Traceability for Evolving Systems. Forschungsbericht (2008)"},{"key":"9_CR3","unstructured":"DIAMONDS: Website of the ITEA project DIAMONDS (Development and Industrial Application of Multi-Domain-Security Testing Technologies) (2013). http:\/\/www.itea2-diamonds.org\/"},{"key":"9_CR4","unstructured":"ETSI: Methods for Testing and Specification (MTS). The Testing and Test Control Notation Version 3, Part 1: TTCN-3 Core Language (ETSI Std. ES 201 873\u20131 V4.3.1). Sophia Antipolis, France, Feb 2011"},{"key":"9_CR5","unstructured":"IBM Corporation: IBM Rational Rhapsody Gateway Add on User Manual. 2001\u20132010"},{"key":"9_CR6","unstructured":"ISTQB: ISTQB Glossary of testing terms version 2.3 (2013). http:\/\/www.istqb.org\/downloads\/glossary.html"},{"key":"9_CR7","unstructured":"Katta, V., Stalhane, T.: A Conceptual Model of Traceability for Safety Systems"},{"key":"9_CR8","unstructured":"Lund, M., Solhaug, B., St\u00e3len, K.: The CORAS Approach. 1st edn. Springer (2011) ISBN 978-3-642-12322-1"},{"key":"9_CR9","unstructured":"Nejati, S., Sabetzadeh, M., Falessi, D., Briand, L., Coq, T.: A SysML-Based Approach to Traceability Management and Design Slicing in Support of Safety Certification: Framework, Tool Support, and Case Studies\/Simula Research Lab (2011\u201301). Forschungsbericht (2011)"},{"key":"9_CR10","unstructured":"Organization, International S.: ISO 27000:2009 (E), Information technology - Security techniques - Information security management systems - Overview and vocabulary (2009)"},{"key":"9_CR11","unstructured":"Freude, R., Koenigs, A.: Tool integration with consistency relations and their visualization. Helsinki. In: Proceedings of the ESEC\/FSE 2003 Workshop on Tool Integration in System Development, Helsinki (2003)"},{"key":"9_CR12","unstructured":"RASEN: Website of the FP7 project RASEN (Compositional Risk Assessment and Security Testing of Networked Systems) (2013). http:\/\/www.rasen-project.eu\/"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Smith, B.H., Williams, L.: On the Effective Use of Security Test Patterns. In: SERE, pp. S.108\u2013117. IEEE (2012) ISBN 978-0-7695-4742-8","DOI":"10.1109\/SERE.2012.23"},{"key":"9_CR14","unstructured":"YAKINDU Workbench. https:\/\/svn.codespot.com\/a\/eclipselabs.org\/yakindu\/media\/slides\/MDD_YAKINDU_Workbench.pdf"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/978-3-540-31848-4_12","volume-title":"Formal Approaches to Software Testing","author":"A Vouffo-Feudjio","year":"2005","unstructured":"Vouffo-Feudjio, A., Schieferdecker, I.: Test patterns with TTCN-3. In: Grabowski, J., Nielsen, B. (eds.) FATES 2004. LNCS, vol. 3395, pp. 170\u2013179. Springer, Heidelberg (2005)"}],"container-title":["Lecture Notes in Computer Science","Risk Assessment and Risk-Driven Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07076-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T14:30:25Z","timestamp":1746282625000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07076-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319070759","9783319070766"],"references-count":15,"aliases":["10.1007\/978-3-319-14114-5_9"],"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07076-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"10 July 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}