{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T13:40:01Z","timestamp":1746366001621,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10975-6_4","type":"book-chapter","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T12:26:14Z","timestamp":1409747174000},"page":"45-62","source":"Crossref","is-referenced-by-count":1,"title":["Towards Developing Secure Software Using Problem-Oriented Security Patterns"],"prefix":"10.1007","author":[{"given":"Azadeh","family":"Alebrahim","sequence":"first","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J.: Non-functional requirements in software engineering. Klewer Academic (2000)","DOI":"10.1007\/978-1-4615-5269-7"},{"issue":"3","key":"4_CR2","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/2.910904","volume":"34","author":"B. Nuseibeh","year":"2001","unstructured":"Nuseibeh, B.: Weaving together requirements and architectures. IEEE Computer\u00a034(3), 115\u2013117 (2001)","journal-title":"IEEE Computer"},{"issue":"2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MS.2012.173","volume":"30","author":"M. Whalen","year":"2013","unstructured":"Whalen, M., Gacek, A., Cofer, D., Murugesan, A., Heimdahl, M., Rayadurgam, S.: Your \u201cWhat\u201d Is My \u201cHow\u201d: Iteration and Hierarchy in System Design. IEEE Software\u00a030(2), 54\u201360 (2013)","journal-title":"IEEE Software"},{"key":"4_CR4","unstructured":"Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security patterns: integrating security and systems engineering. John Wiley & Sons (2005)"},{"key":"4_CR5","unstructured":"Alebrahim, A., Heisel, M.: Problem-oriented Security Patterns for Requirements Engineering. In: Proc. of the 19th European Conf. on Pattern Languages of Programs (EuroPLoP). Universit\u00e4tsverlag Konstanz (accepted, 2014)"},{"key":"4_CR6","unstructured":"Jackson, M.: Problem Frames. Analyzing and structuring software development problems. Addison-Wesley (2001)"},{"key":"4_CR7","unstructured":"UML Revision Task Force, OMG Unified Modeling Language (UML), Superstructure, http:\/\/www.omg.org\/spec\/UML\/2.3\/Superstructure\/PDF"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-16901-4_18","volume-title":"Formal Methods and Software Engineering","author":"D. Hatebur","year":"2010","unstructured":"Hatebur, D., Heisel, M.: Making Pattern- and Model-Based Software Development more Rigorous. In: Dong, J.S., Zhu, H. (eds.) ICFEM 2010. LNCS, vol.\u00a06447, pp. 253\u2013269. Springer, Heidelberg (2010)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Alebrahim, A., Choppy, C., Fa\u00dfbender, S., Heisel, M.: Optimizing functional and quality requirements according to stakeholders\u2019 goals. In: System Quality and Software Architecture (SQSA), pp. 75\u2013120. Elsevier (2014)","DOI":"10.1016\/B978-0-12-417009-4.00004-1"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Alebrahim, A., Hatebur, D., Heisel, M.: A method to derive software architectures from quality requirements. In: Thu, T.D., Leung, K. (eds.) Proc. of the 18th Asia-Pacific Software Engineering Conf (APSEC), pp. 322\u2013330. IEEE Computer Society (2011)","DOI":"10.1109\/APSEC.2011.29"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-15651-9_24","volume-title":"Computer Safety, Reliability, and Security","author":"D. Hatebur","year":"2010","unstructured":"Hatebur, D., Heisel, M.: A UML profile for requirements analysis of dependable software. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol.\u00a06351, pp. 317\u2013331. Springer, Heidelberg (2010)"},{"key":"4_CR12","unstructured":"Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley (2009)"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-23798-0_2","volume-title":"Software Architecture","author":"A. Alebrahim","year":"2011","unstructured":"Alebrahim, A., Hatebur, D., Heisel, M.: Towards systematic integration of quality requirements into software architecture. In: Crnkovic, I., Gruhn, V., Book, M. (eds.) ECSA 2011. LNCS, vol.\u00a06903, pp. 17\u201325. Springer, Heidelberg (2011)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1007\/978-3-319-09156-3_27","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2014","author":"A. Alebrahim","year":"2014","unstructured":"Alebrahim, A., Heisel, M., Meis, R.: A structured approach for eliciting, modeling, and using quality-related domain knowledge. In: Murgante, B., et al. (eds.) ICCSA 2014, Part V. LNCS, vol.\u00a08583, pp. 370\u2013386. Springer, Heidelberg (2014)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"van Lamsweerde, A.: Reasoning about alternative requirements options. In: Borgida, A.T., Chaudhri, V.K., Giorgini, P., Yu, E.S. (eds.) Mylopoulos Festschrift. LNCS, vol.\u00a05600, pp. 380\u2013397. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-02463-4_20"},{"key":"4_CR16","unstructured":"International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), Common Evaluation Methodology 3.1, ISO\/IEC 15408 (2009)"},{"key":"4_CR17","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice. SEI Series in Software Engineering. Addison Wesley (2003)"},{"key":"4_CR18","unstructured":"Kreutzmann, H., Vollmer, S., Tekampe, N., Abromeit, A.: Protection profile for the gateway of a smart metering system. BSI, Tech. Rep. (2011)"},{"key":"4_CR19","unstructured":"Remero, G., Tarruell, F., Mauri, G., Pajot, A., Alberdi, G., Arzberger, M., Denda, R., Giubbini, P., Rodrguez, C., Miranda, E., Galeote, I., Morgaz, M., Larumbe, I., Navarro, E., Lassche, R., Haas, J., Steen, A., Cornelissen, P., Radtke, G., Martnez, C., Orcajada, A., Kneitinger, H., Wiedemann, T.: D1.1 Requirements of AMI. OPEN meter project, Tech. Rep. (2009)"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-19125-1_13","volume-title":"Engineering Secure Software and Systems","author":"T. Heyman","year":"2011","unstructured":"Heyman, T., Yskout, K., Scandariato, R., Schmidt, H., Yu, Y.: The security twin peaks. In: Erlingsson, \u00da., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol.\u00a06542, pp. 167\u2013180. Springer, Heidelberg (2011)"},{"key":"4_CR21","unstructured":"van Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications. John Wiley & Sons (2009)"},{"key":"4_CR22","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1145\/976270.976285","volume-title":"Proc. of the 3rd Int. Conf. on Aspect-oriented Software Development (AOSD)","author":"C.B. Haley","year":"2004","unstructured":"Haley, C.B., Laney, R.C., Nuseibeh, B.: Deriving security requirements from crosscutting threat descriptions. In: Proc. of the 3rd Int. Conf. on Aspect-oriented Software Development (AOSD), pp. 112\u2013121. ACM, USA (2004)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Okubo, T., Kaiya, H., Yoshioka, N.: Effective Security Impact Analysis with Patterns for Software Enhancement. In: Proc. of the 6th Int. Conf. on Availability, Reliability and Security (ARES), pp. 527\u2013534 (2011)","DOI":"10.1109\/ARES.2011.79"},{"key":"4_CR24","unstructured":"Alebrahim, A., Tun, T.T., Yu, Y., Heisel, M., Nuseibeh, B.: An aspect-oriented approach to relating security requirements and access control. In: Proc. of the CAiSE Forum, CEUR Workshop Proceedings, vol.\u00a0855, pp. 15\u201322. CEUR-WS.org. (2012)"},{"key":"4_CR25","unstructured":"Rapanotti, L., Hall, J.G., Jackson, M., Nuseibeh, B.: Architecture-driven problem decomposition. In: Proc. of the 12th IEEE Int. Requirements Engineering Conf. (RE), pp. 80\u201389 (2004)"},{"key":"4_CR26","unstructured":"Shaw, M., Garlan, G.: Software Aechitecture: Perspectives on an emerging discipline. Prentice Hall (1996)"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Hall, J., Jackson, M., Laney, R., Nuseibeh, B., Rapanotti, L.: Relating software requirements and architectures using problem frames. In: Proc. of the IEEE Joint Int. Conf. on Requirements Engineering, pp. 137\u2013144 (2002)","DOI":"10.1109\/ICRE.2002.1048516"},{"key":"4_CR28","unstructured":"Yskout, K., Heyman, T., Scandariato, R., Joosen, W.: A system of security patterns. K.U. Leuven, Department of Computer Science, Report CW 469 (2006)"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10975-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T13:00:02Z","timestamp":1746363602000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10975-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10975-6_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}