{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:06:32Z","timestamp":1761807992486,"version":"3.40.3"},"publisher-location":"Cham","reference-count":7,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_20","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T16:20:13Z","timestamp":1444062013000},"page":"203-212","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["An Approach for Evaluating Softgoals Using Weight"],"prefix":"10.1007","author":[{"given":"Shuichiro","family":"Yamamoto","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-Functional Requirements in Software Engineering","author":"L Chung","year":"2000","unstructured":"Chung, L., Nixson, B.A., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, Boston (2000)"},{"key":"20_CR2","unstructured":"OCTAVE: Operationally Critical Threat, Asset, and Vulnerability Evaluation, Software Engineering Institute. \n                      http:\/\/www.cert.org\/octave\/"},{"key":"20_CR3","volume-title":"Software Architecture in Practice","author":"L Bass","year":"2003","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 2nd edn. Addison-Wesley, Reading (2003)","edition":"2"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Subramanian, N., Zalewski, J.: Quantitative assessment of safety and security of system architectures for cyberphysical systems using the NFR approach. IEEE Syst. J. (2014)","DOI":"10.1109\/SysCon.2013.6549949"},{"key":"20_CR5","unstructured":"Leveson, N.: Safeware - System Safety and Computers. Addison-Wesley, Reading (1995)"},{"key":"20_CR6","unstructured":"Josely, A., et al.: TOGAF\u00ae Version 9.1 A Pocket Guide (2011)"},{"key":"20_CR7","unstructured":"Josely, A., et al.: ArchiMate\u00ae2.0, A Pocket Guide, The Open Group, Van Haren8 Publishing (2013)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T03:50:15Z","timestamp":1569383415000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}