{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:17:46Z","timestamp":1752549466948},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319091556"},{"type":"electronic","value":"9783319091563"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09156-3_27","type":"book-chapter","created":{"date-parts":[[2014,7,2]],"date-time":"2014-07-02T11:15:22Z","timestamp":1404299722000},"page":"370-386","source":"Crossref","is-referenced-by-count":4,"title":["A Structured Approach for Eliciting, Modeling, and Using Quality-Related Domain Knowledge"],"prefix":"10.1007","author":[{"given":"Azadeh","family":"Alebrahim","sequence":"first","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]},{"given":"Rene","family":"Meis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley (2009)"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/237432.237434","volume":"6","author":"P. Zave","year":"1997","unstructured":"Zave, P., Jackson, M.: Four dark corners of requirements engineering. ACM Trans. Softw. Eng. Methodol.\u00a06, 1\u201330 (1997)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"27_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1007\/978-3-642-02463-4_20","volume-title":"Conceptual Modeling: Foundations and Applications","author":"A. Lamsweerde van","year":"2009","unstructured":"van Lamsweerde, A.: Reasoning about alternative requirements options. In: Borgida, A.T., Chaudhri, V.K., Giorgini, P., Yu, E.S. (eds.) Conceptual Modeling: Foundations and Applications. LNCS, vol.\u00a05600, pp. 380\u2013397. Springer, Heidelberg (2009)"},{"issue":"2","key":"27_CR4","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/382296.382703","volume":"15","author":"R. Prieto-D\u00edaz","year":"1990","unstructured":"Prieto-D\u00edaz, R.: Domain analysis: an introduction. SIGSOFT Softw. Eng. Notes\u00a015(2), 47\u201354 (1990)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"27_CR5","unstructured":"Hooks, I.F., Farry, K.A.: Customer-centered Products: Creating Successful Products Through Smart Requirements Management. AMACOM (2001)"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Modugno, F., Leveson, N., Reese, J., Partridge, K., Sandys, S.: Integrated safety analysis of requirements specifications. In: Requirements Engineering, pp. 65\u201378 (1997)","DOI":"10.1007\/BF02813026"},{"key":"27_CR7","first-page":"7","volume":"15","author":"B. Fabian","year":"2010","unstructured":"Fabian, B., G\u00fcrses, S., Heisel, M., Santen, T., Schmidt, H.: A comparison of security requirements engineering methods. Requirements Engineering \u2013 Special Issue on Security Requirements Engineering\u00a015, 7\u201340 (2010)","journal-title":"Requirements Engineering \u2013 Special Issue on Security Requirements Engineering"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/291469.291476","volume":"42","author":"P.N. Robillard","year":"1999","unstructured":"Robillard, P.N.: The Role of Knowledge in Software Development. Commun. ACM\u00a042, 87\u201392 (1999)","journal-title":"Commun. ACM"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Niknafs, A., Berry, D.M.: The impct of domain knowledge on the effectiveness of requirements idea generation during requirements elicitation. In: Proc. of the 20th IEEE Int. RE Conf., pp. 181\u2013190 (2012)","DOI":"10.1109\/RE.2012.6345802"},{"key":"27_CR10","unstructured":"Jackson, M.: Problem Frames. Analyzing and structuring software development problems. Addison-Wesley (2001)"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Alebrahim, A., Choppy, C., Fa\u00dfbender, S., Heisel, M.: Optimizing functional and quality requirements according to stakeholders\u2019 goals. In: Mistrik, I. (ed.) Relating System Quality and Software Architecture, pp. 75\u2013120. Elsevier (2014)","DOI":"10.1016\/B978-0-12-417009-4.00004-1"},{"key":"27_CR12","unstructured":"Alebrahim, A., Heisel, M.: A problem-oriented method for performance requirements engineering using performance analysis patterns. In: FGCS (submitted, 2014)"},{"key":"27_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-54069-1_1","volume-title":"Privacy Technologies and Policy","author":"K. Beckers","year":"2014","unstructured":"Beckers, K., Fa\u00dfbender, S., Heisel, M., Meis, R.: A problem-based approach for computer-aided privacy threat identification. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol.\u00a08319, pp. 1\u201316. Springer, Heidelberg (2014)"},{"key":"27_CR14","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-55137-6_12","volume-title":"Privacy and Identity Management for Emerging Services and Technologies","author":"R. Meis","year":"2014","unstructured":"Meis, R.: Problem-Based Consideration of Privacy-Relevant Domain Knowledge. In: Hansen, M., Hoepman, J.-H., Leenes, R., Whitehouse, D. (eds.) Privacy and Identity 2013. IFIP AICT, vol.\u00a0421, pp. 150\u2013164. Springer, Heidelberg (2014)"},{"key":"27_CR15","unstructured":"Kreutzmann, H., Vollmer, S., Tekampe, N., Abromeit, A.: Protection profile for the gateway of a smart metering system. Technical report, BSI (2011)"},{"key":"27_CR16","unstructured":"UML Revision Task Force: OMG Unified Modeling Language (UML), Superstructure (2009), http:\/\/www.omg.org\/spec\/UML\/2.3\/Superstructure\/PDF"},{"key":"27_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-15651-9_24","volume-title":"Computer Safety, Reliability, and Security","author":"D. Hatebur","year":"2010","unstructured":"Hatebur, D., Heisel, M.: A UML profile for requirements analysis of dependable software. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol.\u00a06351, pp. 317\u2013331. Springer, Heidelberg (2010)"},{"key":"27_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-23798-0_2","volume-title":"Software Architecture","author":"A. Alebrahim","year":"2011","unstructured":"Alebrahim, A., Hatebur, D., Heisel, M.: Towards systematic integration of quality requirements into software architecture. In: Crnkovic, I., Gruhn, V., Book, M. (eds.) ECSA 2011. LNCS, vol.\u00a06903, pp. 17\u201325. Springer, Heidelberg (2011)"},{"key":"27_CR19","unstructured":"UML Revision Task Force: UML Profile for MARTE: Modeling and Analysis of Real-Time Embedded Systems (2011), http:\/\/www.omg.org\/spec\/MARTE\/1.0\/PDF"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Land, L., Aurum, A., Handzic, M.: Capturing implicit software engineering knowledge. In: Proceedings of the 2001 Australian Software Engineering Conference, pp. 108\u2013114 (2001)","DOI":"10.1109\/ASWEC.2001.948504"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Bass, L., Klein, M., Bachmann, F.: Quality attributes design primitives. Technical report, Software Engineering Institute (2000)","DOI":"10.21236\/ADA387868"},{"key":"27_CR22","unstructured":"Bass, L., Clemens, P., Kazman, R.: Software architecture in practice. Addison-Wesley (2003)"},{"key":"27_CR23","unstructured":"International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC): Common Evaluation Methodology 3.1. ISO\/IEC 15408 (2009)"},{"key":"27_CR24","doi-asserted-by":"crossref","unstructured":"Sharp, H., Finkelstein, A., Galal, G.: Stakeholder Identification in the Requirements Engineering Process. In: DEXA Workshop, pp. 387\u2013391 (1999)","DOI":"10.1109\/DEXA.1999.795198"},{"issue":"1","key":"27_CR25","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MS.2004.1259199","volume":"21","author":"I.F. Alexander","year":"2004","unstructured":"Alexander, I.F., Robertson, S.: Understanding Project Sociology by Modeling Stakeholders. IEEE Software\u00a021(1), 23\u201327 (2004)","journal-title":"IEEE Software"},{"key":"27_CR26","unstructured":"Remero, G., Tarruell, F., Mauri, G., Pajot, A., Alberdi, G., Arzberger, M., Denda, R., Giubbini, P., Rodrguez, C., Miranda, E., Galeote, I., Morgaz, M., Larumbe, I., Navarro, E., Lassche, R., Haas, J., Steen, A., Cornelissen, P., Radtke, G., Martnez, C., Orcajada, K.H., Wiedemann, T.: D1.1 Requ. of AMI. Technical report, OPEN meter proj. (2009)"},{"key":"27_CR27","doi-asserted-by":"crossref","unstructured":"Deconinck, G.: An evaluation of two-way communication means for advanced metering in Flanders (Belgium). In: Instrumentation and Measurement Technology Conference Proceedings (IMTC), pp. 900\u2013905 (2008)","DOI":"10.1109\/IMTC.2008.4547164"},{"key":"27_CR28","unstructured":"Probst, G.J.B.: Practical Knowledge Management: A Model that Works. Prism (1998)"},{"key":"27_CR29","doi-asserted-by":"crossref","unstructured":"Kang, K.C., Cohen, S.G., Hess, J.A., Novak, W.E., Peterson, A.S.: Feature-Oriented Domain Analysis (FODA) Feasibility Study. Technical report, Carnegie-Mellon University Software Engineering Institute (November 1990)","DOI":"10.21236\/ADA235785"},{"issue":"1","key":"27_CR30","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1023\/A:1018972323770","volume":"5","author":"W. Frakes","year":"1998","unstructured":"Frakes, W., Prieto-Diaz, R., Fox, C.: DARE: Domain analysis and reuse environment. Annals of Software Engineering\u00a05(1), 125\u2013141 (1998)","journal-title":"Annals of Software Engineering"},{"key":"27_CR31","doi-asserted-by":"crossref","unstructured":"Peng, X., Lee, S., Zhao, W.: Feature-Oriented Nonfunctional Requirement Analysis for Software Product Line. Journal of Computer Science and Technology\u00a024(2) (2009)","DOI":"10.1007\/s11390-009-9227-2"},{"key":"27_CR32","doi-asserted-by":"crossref","unstructured":"Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-functional Requirements in Software Engineering. Kluwer Academic Publishers (2000)","DOI":"10.1007\/978-1-4615-5269-7"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09156-3_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T10:00:56Z","timestamp":1565604056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09156-3_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319091556","9783319091563"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09156-3_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}