{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:08:08Z","timestamp":1746331688663,"version":"3.40.4"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319100814"},{"type":"electronic","value":"9783319100821"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10082-1_2","type":"book-chapter","created":{"date-parts":[[2014,8,4]],"date-time":"2014-08-04T04:49:05Z","timestamp":1407127745000},"page":"34-53","source":"Crossref","is-referenced-by-count":6,"title":["Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models"],"prefix":"10.1007","author":[{"given":"Jens","family":"B\u00fcrger","sequence":"first","affiliation":[]},{"given":"Jan","family":"J\u00fcrjens","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Ruhroth","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"G\u00e4rtner","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Alam, M., Hafner, M., Breu, R.: Model-Driven Security Engineering for Trust Management in SECTET. Journal of Software\u00a02(1) (February 2007)","DOI":"10.4304\/jsw.2.1.47-59"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"AlHogail, A., Berri, J.: Enhancing it security in organizations through knowledge management. In: 2012 International Conference on Information Technology and e-Services (ICITeS), pp. 1\u20136. IEEE (2012)","DOI":"10.1109\/ICITeS.2012.6216677"},{"key":"2_CR3","unstructured":"Anderson, R.J.: Security engineering - a guide to building dependable distributed systems, 2nd edn. Wiley (2008)"},{"issue":"5","key":"2_CR4","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1016\/j.infsof.2006.07.007","volume":"49","author":"N. Anquetil","year":"2007","unstructured":"Anquetil, N., de Oliveira, K.M., de Sousa, K.D., Batista Dias, M.G.: Software maintenance seen as a knowledge management issue. Information and Software Technology\u00a049(5), 515\u2013529 (2007)","journal-title":"Information and Software Technology"},{"issue":"1","key":"2_CR5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D.A. Basin","year":"2006","unstructured":"Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol.\u00a015(1), 39\u201391 (2006)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"3","key":"2_CR6","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1108\/09685220510602013","volume":"13","author":"P. Belsis","year":"2005","unstructured":"Belsis, P., Kokolakis, S., Kiountouzis, E.: Information systems security from a knowledge management perspective. Information Management & Computer Security\u00a013(3), 189\u2013202 (2005)","journal-title":"Information Management & Computer Security"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Blanco, C., Lasheras, J., Valencia-Garc, R., Fern, E., Toval, A., Piattini, M.: A Systematic Review and Comparison of Security Ontologies. In: 2008 Third International Conference on Availability, Reliability and Security, vol.\u00a01(1), pp. 813\u2013820 (March 2008)","DOI":"10.1109\/ARES.2008.33"},{"key":"2_CR8","unstructured":"Brose, G., Koch, M., L\u00f6hr, K.-P.: Integrating Access Control Design into the Software Development Process. In: Integrated Design and Process Technology, IDPT (2002)"},{"key":"2_CR9","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI). IT-Grundschutz-catalogues (2013), https:\/\/www.bsi.bund.de\/EN\/Topics\/ITGrundschutz\/ITGrundschutzCatalogues\/itgrundschutzcatalogues_node.html"},{"key":"2_CR10","unstructured":"Bundesministerium des Inneren. Bundesdatenschutzgesetz. Bundesgesetzblatt, http:\/\/www.bfdi.bund.de\/DE\/GesetzeUndRechtsprechung\/BDSG\/BDSG_node.html"},{"key":"2_CR11","unstructured":"CARiSMA project homepage, http:\/\/carisma.umlsec.de\/"},{"issue":"3","key":"2_CR12","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1111\/j.1365-2575.2006.00219.x","volume":"16","author":"G. Dhillon","year":"2006","unstructured":"Dhillon, G., Torkzadeh, G.: Value-focused assessment of information system security in organizations. Information Systems Journal\u00a016(3), 293\u2013314 (2006)","journal-title":"Information Systems Journal"},{"issue":"3","key":"2_CR13","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/S0167-4048(00)88613-7","volume":"19","author":"M.M. Eloff","year":"2000","unstructured":"Eloff, M.M., von Solms, S.H.: Information Security Management: A Hierarchical Framework for Various Approaches. Computers & Security\u00a019(3), 243\u2013256 (2000)","journal-title":"Computers & Security"},{"key":"2_CR14","first-page":"183","volume-title":"Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS)","author":"S. Fenz","year":"2009","unstructured":"Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS), p. 183. ACM Press, New York (2009)"},{"issue":"5","key":"2_CR15","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1016\/j.infsof.2008.05.010","volume":"51","author":"E. Fern\u00e1ndez-Medina","year":"2009","unstructured":"Fern\u00e1ndez-Medina, E., J\u00fcrjens, J., Trujillo, J., Jajodia, S.: Model-driven development for secure information systems. Information & Software Technology\u00a051(5), 809\u2013814 (2009)","journal-title":"Information & Software Technology"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"G\u00e4rtner, S., Ruhroth, T., B\u00fcrger, J., Schneider, K., J\u00fcrjens, J.: Maintaining Requirements for Long-Living Software Systems by Incorporating Security Knowledge. In: Proc. of the 22nd International Conference on Requirement Engineering (2014)","DOI":"10.1109\/RE.2014.6912252"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Graham-Cumming, J.: Some laws of non-interference (CSP algebra). In: Computer Security Foundations Workshop, pp. 22\u201333. IEEE Computer Society Press (1992)","DOI":"10.1109\/CSFW.1992.236790"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-85289-6_3","volume-title":"The Common Component Modeling Example","author":"S. Herold","year":"2008","unstructured":"Herold, S., et al.: CoCoME - the common component modeling example. In: Rausch, A., Reussner, R., Mirandola, R., Pl\u00e1\u0161il, F. (eds.) The Common Component Modeling Example. LNCS, vol.\u00a05153, pp. 16\u201353. Springer, Heidelberg (2008)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"H\u00f6hn, S., J\u00fcrjens, J.: Rubacon: Automated support for model-based compliance engineering. In: International Conference on Software Engineering (ICSE), pp. 875\u2013878. ACM (2008)","DOI":"10.1145\/1368088.1368228"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Houmb, S.H., Georg, G., J\u00fcrjens, J., France, R.B.: An integrated approach to security verification and security solution design trade-off analysis. In: Mouratidis, H. (ed.) Integrating Security and Software Engineering: Advances and Future Vision, pp. 190\u2013219. Idea Group (August 2006), Invited chapter","DOI":"10.4018\/978-1-59904-147-6.ch009"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Houmb, S.H., Georg, G., France, R.B., Bieman, J.M., J\u00fcrjens, J.: Cost-benefit trade-off analysis using BBN for aspect-oriented risk-driven development. In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), Shanghai, China, June 16-20, pp. 195\u2013204. IEEE Computer Society (2005)","DOI":"10.1109\/ICECCS.2005.30"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Jayaraman, K., Lewandowski, G.: Enforcing request integrity in web applications. In: Data and Applications Security, vol.\u00a014, pp. 225\u2013240 (2010)","DOI":"10.1007\/978-3-642-13739-6_15"},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/3-540-44618-4_29","volume-title":"CONCUR 2000 - Concurrency Theory","author":"J. J\u00fcrjens","year":"2000","unstructured":"J\u00fcrjens, J.: Secure information flow for concurrent processes. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.\u00a01877, pp. 395\u2013409. Springer, Heidelberg (2000)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J.: Modelling audit security for smart-card payment schemes with UMLsec. In: Dupuy, M., Paradinas, P. (eds.) Trusted Information: The New Decade Challenge. IFIP, vol. 65, pp. 93\u2013108. Kluwer Academic Publishers (2001), Proceedings of the 16th International Conference on Information Security (SEC 2001)","DOI":"10.1007\/0-306-46998-7_7"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/11554578_2","volume-title":"Foundations of Security Analysis and Design III","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Model-based security engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2004\/2005. LNCS, vol.\u00a03655, pp. 42\u201377. Springer, Heidelberg (2005)"},{"key":"2_CR26","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer (2005)"},{"issue":"1","key":"2_CR27","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.entcs.2008.11.008","volume":"220","author":"J. J\u00fcrjens","year":"2008","unstructured":"J\u00fcrjens, J.: Model-based security testing using UMLsec. Electronic Notes in Theoretical Computer Science\u00a0220(1), 93\u2013104 (2008)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J., Wimmel, G.: Formally testing fail-safety of electronic purse protocols. In: 16th International Conference on Automated Software Engineering (ASE 2001), pp. 408\u2013411. IEEE Computer Society (2001)","DOI":"10.1109\/ASE.2001.989840"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J., Wimmel, G.: Security modelling for electronic commerce: The Common Electronic Purse Specifications. In: Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds.) Towards the E-Society: E-Commerce, E-Business, and E-Government. IFIP, vol. 74, pp. 489\u2013506. Kluwer Academic Publishers (2001), First IFIP Conference on E-Commerce, E-Business, and E-Government (I3E 2001)","DOI":"10.1007\/0-306-47009-8_36"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Kesh, S., Ratnasingam, P.: A knowledge architecture for IT security. Communications of the ACM\u00a050(7) (2007)","DOI":"10.1145\/1272516.1272521"},{"issue":"5-6","key":"2_CR31","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.cose.2008.05.006","volume":"27","author":"E. Kritzinger","year":"2008","unstructured":"Kritzinger, E., Smith, E.: Information security management: An information security retrieval and awareness model for industry. Computers & Security\u00a027(5-6), 224\u2013231 (2008)","journal-title":"Computers & Security"},{"issue":"9","key":"2_CR32","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1109\/PROC.1980.11805","volume":"68","author":"M.M. Lehman","year":"1980","unstructured":"Lehman, M.M.: Programs, life cycles, and laws of software evolution. Proceedings of the IEEE\u00a068(9), 1060\u20131076 (1980)","journal-title":"Proceedings of the IEEE"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Mantel, H.: Possibilistic definitions of security \u2013 an assembly kit. In: Proceedings of the IEEE Computer Security Foundations Workshop, Cambridge, UK, July 3-5, pp. 185\u2013199. IEEE Computer Society (2000)","DOI":"10.1109\/CSFW.2000.856936"},{"key":"2_CR34","unstructured":"Mantel, H.: A Uniform Framework for the Formal Specification and Verification of Secure Information Flow. PhD thesis, Saarland University, Saarbr\u00fccken, Germany (2003)"},{"key":"2_CR35","doi-asserted-by":"crossref","unstructured":"McCullough, D.: Noninterference and the composability of security properties. In: IEEE Symposium on Security and Privacy, pp. 177\u2013186 (April 1988)","DOI":"10.1109\/SECPRI.1988.8110"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Miede, A., Nedyalkov, N., Gottron, C., K\u00f6nig, A., Repp, N., Steinmetz, R.: A Generic Metamodel for IT Security Attack Modeling for Distributed Systems. In: 2010 International Conference on Availability, Reliability and Security (ARES), pp. 430\u2013437 (2010)","DOI":"10.1109\/ARES.2010.17"},{"key":"2_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"2_CR38","unstructured":"W3C OWL Working Group. OWL\u00a02 Web Ontology Language: Document Overview. W3C Recommendation (October 27, 2009), http:\/\/www.w3.org\/TR\/owl2-overview\/"},{"key":"2_CR39","unstructured":"Prot\u00e9g\u00e9 project homepage, http:\/\/protege.stanford.edu\/"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Raskin, V., Hempelmann, C.F., Triezenberg, K.E., Nirenburg, S.: Ontology in information security: a useful theoretical foundation and methodological tool. In: Proceedings of the 2001 Workshop on New Security Paradigms, pp. 53\u201359. ACM, New York (2001)","DOI":"10.1145\/508179.508180"},{"issue":"9","key":"2_CR41","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1016\/j.infsof.2003.10.007","volume":"46","author":"I. Ray","year":"2004","unstructured":"Ray, I., France, R.B., Li, N., Georg, G.: An aspect-based approach to modeling access control concerns. Information & Software Technology\u00a046(9), 575\u2013587 (2004)","journal-title":"Information & Software Technology"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Schneider, K., Knauss, E., Houmb, S., Islam, S., J\u00fcrjens, J.: Enhancing Security Requirements Engineering by Organizational Learning. Requirements Engineering Journal (REJ), Special Issue on REFSQ 2012 (2012)","DOI":"10.1007\/s00766-011-0141-0"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Schneider, K., Stapel, K., Knauss, E.: Beyond Documents: Visualizing Informal Communication. In: Proceedings of Third International Workshop on Requirements Engineering Visualization (REV 2008), Barcelona, Spain (November 2008)","DOI":"10.1109\/REV.2008.1"},{"key":"2_CR44","unstructured":"Sowa, J.F.: Knowledge representation: logical, philosophical, and computational foundations, vol.\u00a03(1). MIT Press (2000)"},{"key":"2_CR45","unstructured":"Swiderski, F., Snyder, W.: Threat Modeling. Microsoft Press Corp. (2004)"},{"key":"2_CR46","unstructured":"The MITRE Corporation. Vulnerability Summary for CVE-2000-1001 (2001)"},{"key":"2_CR47","unstructured":"The MITRE Corporation. Common Vulnerabilities and Exposures (2013)"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Tsoumas, B., Gritzalis, D.: Towards an Ontology-based Security Management. In: Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA), vol.\u00a01, pp. 985\u2013992. IEEE (2006)","DOI":"10.1109\/AINA.2006.329"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design VII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10082-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T01:54:26Z","timestamp":1746323666000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10082-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319100814","9783319100821"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10082-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}