{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T04:37:46Z","timestamp":1747802266698,"version":"3.41.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319161006"},{"type":"electronic","value":"9783319161013"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16101-3_8","type":"book-chapter","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T06:52:36Z","timestamp":1426229556000},"page":"115-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Analyzing and Enforcing Security Mechanisms on Requirements Specifications"],"prefix":"10.1007","author":[{"given":"Tong","family":"Li","sequence":"first","affiliation":[]},{"given":"Jennifer","family":"Horkoff","sequence":"additional","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,14]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Alrajeh, D., Kramer, J., Russo, A., Uchitel, S.: Learning operational requirements from goal models. In: Proceedings of the 31st International Conference on Software Engineering, pp. 265\u2013275 (2009)","DOI":"10.1109\/ICSE.2009.5070527"},{"key":"8_CR2","unstructured":"Buschmann, F., Henney, K., Schimdt, D.: Pattern-oriented Software Architecture: On Patterns and Pattern Language, vol. 5. John Wiley & Sons (2007)"},{"key":"8_CR3","unstructured":"Dalpiaz, F., Souza, V.E.S., Mylopoulos, J.: The many faces of operationalization in goal-oriented requirements engineering. In: Proceedings of the Tenth Asia-Pacific Conference on Conceptual Modelling, vol. 154, pp. 3\u20137 (2014)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"de Sousa, G.M.C., da Silva, I.G., de Castro, J.B.: Adapting the nfr framework to aspect-oriented requirements engineering. In: Proceeding of XVII Brazilian Symposium on Software Engineering, pp. 83\u201398 (2003)","DOI":"10.5753\/sbes.2003.23860"},{"key":"8_CR5","unstructured":"Fernandez-Buglioni, E.: Security patterns in practice: designing secure architectures using software patterns. John Wiley & Sons (2013)"},{"key":"8_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/978-3-642-10847-1_10","volume-title":"Security Technology","author":"LA Gunawan","year":"2009","unstructured":"Gunawan, L.A., Herrmann, P., Kraemer, F.A.: Towards the integration of security aspects into system development using collaboration-oriented models. In: \u015al\u0119zak, D., Kim, T., Fang, W.-C., Arnett, K.P. (eds.) SecTech 2009. CCIS, vol. 58, pp. 72\u201385. Springer, Heidelberg (2009)"},{"issue":"4","key":"8_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MS.2007.114","volume":"24","author":"M Hafiz","year":"2007","unstructured":"Hafiz, M., Adamczyk, P., Johnson, R.E.: Organizing security patterns. IEEE Software 24(4), 52\u201360 (2007)","journal-title":"IEEE Software"},{"issue":"1","key":"8_CR8","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"CB Haley","year":"2008","unstructured":"Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: A framework for representation and analysis. IEEE Transactions on Software Engineering 34(1), 133\u2013153 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-19125-1_13","volume-title":"Engineering Secure Software and Systems","author":"T Heyman","year":"2011","unstructured":"Heyman, T., Yskout, K., Scandariato, R., Schmidt, H., Yu, Y.: The security twin peaks. In: Erlingsson, U., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 167\u2013180. Springer, Heidelberg (2011)"},{"issue":"3","key":"8_CR10","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s00766-011-0143-y","volume":"18","author":"J Horkoff","year":"2013","unstructured":"Horkoff, J., Yu, E.: Comparison and evaluation of goal-oriented satisfaction analysis techniques. Requirements Engineering 18(3), 199\u2013222 (2013)","journal-title":"Requirements Engineering"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Jureta, I.J., Mylopoulos, J., Faulkner, S.: Revisiting the core ontology and problem in requirements engineering. In: 16th IEEE International Requirements Engineering, RE 2008, pp. 71\u201380. IEEE (2008)","DOI":"10.1109\/RE.2008.13"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Letier, E., van Lamsweerde, A.: Deriving operational software specifications from system goals. In: Proceedings of the 10th ACM SIGSOFT Symposium on Foundations of Software Engineering, pp. 119\u2013128 (2002)","DOI":"10.1145\/587051.587070"},{"key":"8_CR13","unstructured":"Li, J.-B., Li, T., Liu, L.: Chinese requirements analysis based on class diagram semantics. Acta Electronica Sinica, p. S1 (2011)"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-07881-6_20","volume-title":"Advanced Information Systems Engineering","author":"T Li","year":"2014","unstructured":"Li, T., Horkoff, J.: Dealing with security requirements for socio-technical systems: a holistic approach. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 285\u2013300. Springer, Heidelberg (2014)"},{"key":"8_CR15","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-662-45501-2_15","volume-title":"The Practice of Enterprise Modeling","author":"T Li","year":"2014","unstructured":"Li, T., Horkoff, J., Mylopoulos, J.: Integrating security patterns with security requirements analysis using contextual goal models. In: Frank, U., Loucopoulos, P., Pastor, \u00d3., Petrounias, I. (eds.) PoEM 2014. LNBIP, vol. 197, pp. 208\u2013223. Springer, Heidelberg (2014)"},{"key":"8_CR16","unstructured":"Li, T., Horkoff, J., Mylopoulos, J.: A prototype tool for modeling and analyzing security requirements from a holistic viewpoint. In: The CAiSE 2014 Forum at the 26th International Conference on Advanced Information Systems Engineering (2014)"},{"key":"8_CR17","unstructured":"Mouratidis, H., Giorgini, P.: A natural extension of tropos methodology for modelling security. In: Proc. of the Agent Oriented Methodologies Workshop (OOPSLA 2002). Citeseer, Seattle-USA (2002)"},{"issue":"02","key":"8_CR18","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. International Journal of Software Engineering and Knowledge Engineering 17(02), 285\u2013309 (2007)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MS.2007.52","volume":"24","author":"N Niu","year":"2007","unstructured":"Niu, N., Easterbrook, S.: So, you think you know others\u2019 goals? a repertory grid study. IEEE Software 24(2), 53\u201361 (2007)","journal-title":"IEEE Software"},{"issue":"3","key":"8_CR20","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/2.910904","volume":"34","author":"B Nuseibeh","year":"2001","unstructured":"Nuseibeh, B.: Weaving together requirements and architectures. Computer 34(3), 115\u2013119 (2001)","journal-title":"Computer"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Okubo, T., Kaiya, H., Yoshioka, N.: Mutual refinement of security requirements and architecture using twin peaks model. In: Computer Software and Applications Conference Workshops (COMPSACW), pp. 367\u2013372. IEEE (2012)","DOI":"10.1109\/COMPSACW.2012.72"},{"key":"8_CR22","unstructured":"Scandariato, R., Yskout, K., Heyman, T., Joosen, W.: Architecting software with security patterns. Technical report, KU Leuven (2008)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Shah, V., Hill, F.: An aspect-oriented security framework. In: DARPA Information Survivability Conference and Exposition, vol. 2, pp. 143\u2013145. IEEE (2003)","DOI":"10.1109\/DISCEX.2003.1194952"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Shiroma, Y., Washizaki, H., Fukazawa, Y., Kubo, A., Yoshioka, N.: Model-driven security patterns application based on dependences among patterns. In: International Conference on Availability, Reliability, and Security, pp. 555\u2013559 (February 2010)","DOI":"10.1109\/ARES.2010.103"},{"issue":"1","key":"8_CR25","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering 10(1), 34\u201344 (2005)","journal-title":"Requirements Engineering"},{"issue":"10","key":"8_CR26","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/32.879820","volume":"26","author":"A Van Lamsweerde","year":"2000","unstructured":"Van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Transactions on Software Engineering 26(10), 978\u20131005 (2000)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Yu, E.: Towards modelling and reasoning support for early-phase requirements engineering, pp. 226\u2013235. IEEE Computer Soc. Press (1997)","DOI":"10.1109\/ISRE.1997.566873"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Yu, Y., Kaiya, H., Washizaki, H., Xiong, Y., Hu, Z., Yoshioka, N.: Enforcing a security pattern in stakeholder goal models. In: Proceedings of the 4th ACM Workshop on Quality of Protection,pp. 9\u201314 (2008)","DOI":"10.1145\/1456362.1456366"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16101-3_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T23:19:27Z","timestamp":1747783167000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16101-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319161006","9783319161013"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16101-3_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"14 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}