{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:26:39Z","timestamp":1725809199130},"publisher-location":"Cham","reference-count":4,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319138343"},{"type":"electronic","value":"9783319138350"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13835-0_28","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T10:26:53Z","timestamp":1415960813000},"page":"306-309","source":"Crossref","is-referenced-by-count":1,"title":["Security and Privacy Behavior Definition for Behavior Driven Development"],"prefix":"10.1007","author":[{"given":"Takao","family":"Okubo","sequence":"first","affiliation":[]},{"given":"Yoshio","family":"Kakizaki","sequence":"additional","affiliation":[]},{"given":"Takanori","family":"Kobashi","sequence":"additional","affiliation":[]},{"given":"Hironori","family":"Washizaki","sequence":"additional","affiliation":[]},{"given":"Shinpei","family":"Ogata","sequence":"additional","affiliation":[]},{"given":"Haruhiko","family":"Kaiya","sequence":"additional","affiliation":[]},{"given":"Nobukazu","family":"Yoshioka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Howard, M., Lipner, S.: The Security Development Lifecycle. Microsoft (2006)"},{"issue":"3","key":"28_CR2","doi-asserted-by":"publisher","first-page":"536","DOI":"10.2197\/ipsjjip.22.536","volume":"22","author":"T. Okubo","year":"2014","unstructured":"Okubo, T., Taguchi, K., Kaiya, H., Yoshioka, N.: Masg: Advanced misuse case analysis model with assets and security goals. IPSJ Journal of Information Processing\u00a022(3), 536\u2013546 (2014)","journal-title":"IPSJ Journal of Information Processing"},{"key":"28_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1007\/978-3-540-73031-6_27","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"G. Sindre","year":"2007","unstructured":"Sindre, G.: Mal-activity diagrams for capturing attacks on business processes. In: Sawyer, P., Heymans, P. (eds.) REFSQ 2007. LNCS, vol.\u00a04542, pp. 355\u2013366. Springer, Heidelberg (2007)"},{"issue":"1","key":"28_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng.\u00a010(1), 34\u201344 (2005)","journal-title":"Requir. Eng."}],"container-title":["Lecture Notes in Computer Science","Product-Focused Software Process Improvement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13835-0_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T18:39:48Z","timestamp":1559068788000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13835-0_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319138343","9783319138350"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13835-0_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}