{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T05:31:03Z","timestamp":1775194263285,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319078687","type":"print"},{"value":"9783319078694","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07869-4_27","type":"book-chapter","created":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T23:16:51Z","timestamp":1401923811000},"page":"286-298","source":"Crossref","is-referenced-by-count":1,"title":["Requirements Refinement and Exploration of Architecture for Security and Other NFRs"],"prefix":"10.1007","author":[{"given":"Takao","family":"Okubo","sequence":"first","affiliation":[]},{"given":"Nobukazu","family":"Yoshioka","sequence":"additional","affiliation":[]},{"given":"Haruhiko","family":"Kaiya","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 2nd edn. Addison-Wesley (2003)"},{"key":"27_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-540-75294-3_18","volume-title":"Dependable Computing","author":"E.B. Fernandez","year":"2007","unstructured":"Fernandez, E.B.: Security patterns and secure systems design. In: Bondavalli, A., Brasileiro, F., Rajsbaum, S. (eds.) LADC 2007. LNCS, vol.\u00a04746, pp. 233\u2013234. Springer, Heidelberg (2007)"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Ferraz, F.S., Assad, R.E., de Lemos Meira, S.R.: Relating security requirements and design patterns: Reducing security requirements implementation impacts with design patterns. In: ICSEA, pp. 9\u201314 (2009)","DOI":"10.1109\/ICSEA.2009.10"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Guo, Z., Zeckzer, D., Liggesmeyer, P., Mackel, O.: Identification of security-safety requirements for the outdoor robot ravon using safety analysis techniques. In: International Conference on Software Engineering Advances, pp. 508\u2013513 (2010)","DOI":"10.1109\/ICSEA.2010.86"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-19125-1_13","volume-title":"Engineering Secure Software and Systems","author":"T. Heyman","year":"2011","unstructured":"Heyman, T., Yskout, K., Scandariato, R., Schmidt, H., Yu, Y.: The security twin peaks. In: Erlingsson, \u00da., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol.\u00a06542, pp. 167\u2013180. Springer, Heidelberg (2011)"},{"issue":"1","key":"27_CR6","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s00766-009-0093-9","volume":"15","author":"S.H. Houmb","year":"2010","unstructured":"Houmb, S.H., Islam, S., Knauss, E., J\u00fcrjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and umlsec. Requir. Eng.\u00a015(1), 63\u201393 (2010)","journal-title":"Requir. Eng."},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Kazman, R., Klein, M.H., Barbacci, M., Longstaff, T.A., Lipson, H.F., Carri\u00e8re, S.J.: The architecture tradeoff analysis method. In: ICECCS, pp. 68\u201378 (1998)","DOI":"10.21236\/ADA350761"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: ICSE, pp. 148\u2013157 (2004)","DOI":"10.1109\/ICSE.2004.1317437"},{"issue":"1","key":"27_CR9","first-page":"89","volume":"3","author":"L. Liu","year":"2009","unstructured":"Liu, L., Yu, E.S.K., Mylopoulos, J.: Secure-i*: Engineering secure software systems through social analysis. Int. J. Software and Informatics\u00a03(1), 89\u2013120 (2009)","journal-title":"Int. J. Software and Informatics"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Mead, N.R., Hough, E., Stehney, T.: Security quality requirements engineering (square) methodology. Tech. Rep. CMU\/SEI-2005-TR-009, Software Engineering Institute, Carnegie Mellon University (2005)","DOI":"10.21236\/ADA443493"},{"issue":"2","key":"27_CR11","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H. Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure tropos: A security-oriented extension of the tropos methodology. International Journal of Software Engineering and Knowledge Engineering\u00a017(2), 285\u2013309 (2007)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"issue":"3","key":"27_CR12","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/2.910904","volume":"34","author":"B. Nuseibeh","year":"2001","unstructured":"Nuseibeh, B.: Weaving together requirements and architectures. IEEE Computer\u00a034(3), 115\u2013117 (2001)","journal-title":"IEEE Computer"},{"issue":"1","key":"27_CR13","first-page":"37","volume":"3","author":"T. Okubo","year":"2012","unstructured":"Okubo, T., Kaiya, H., Yoshioka, N.: Analyzing impacts on software enhancement caused by security design alternatives with patterns. IJSSE\u00a03(1), 37\u201361 (2012)","journal-title":"IJSSE"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Okubo, T., Kaiya, H., Yoshioka, N.: Mutual refinement of security requirements and architecture using twin peaks model. In: COMPSAC Workshops, pp. 367\u2013372 (2012)","DOI":"10.1109\/COMPSACW.2012.72"},{"key":"27_CR15","unstructured":"Okubo, T., Yoshioka, N., Kaiya, H.: Security driven requirements refinement and exploration of architecture with multiple nfr points of view. In: IEEE International Symposium on High Assurance on Software Engineering (HASE) (to be appeared, 2014)"},{"key":"27_CR16","volume-title":"The analytic hierarchy process: planning, priority setting, resource allocation","author":"T.L. Saaty","year":"1990","unstructured":"Saaty, T.L.: The analytic hierarchy process: planning, priority setting, resource allocation, 2nd edn. RWS, Pittsburgh (1990)","edition":"2"},{"key":"27_CR17","doi-asserted-by":"crossref","unstructured":"Saeki, M., Kaiya, H.: Security requirements elicitation using method weaving and common criteria. In: MoDELS Workshops, pp. 185\u2013196 (2008)","DOI":"10.1007\/978-3-642-01648-6_20"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Tanabe, D., Uno, K., Akemine, K., Yoshikawa, T., Kaiya, H., Saeki, M.: Supporting requirements change management in goal oriented analysis. In: RE, pp. 3\u201312 (2008)","DOI":"10.1109\/RE.2008.18"},{"key":"27_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-15114-9_9","volume-title":"Software Architecture","author":"R. Weinreich","year":"2010","unstructured":"Weinreich, R., Buchgeher, G.: Integrating requirements and design decisions in architecture representation. In: Babar, M.A., Gorton, I. (eds.) ECSA 2010. LNCS, vol.\u00a06285, pp. 86\u2013101. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Business Information Processing","Advanced Information Systems Engineering Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07869-4_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T07:04:14Z","timestamp":1746255854000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07869-4_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319078687","9783319078694"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07869-4_27","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}