{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:58:17Z","timestamp":1742947097281,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319249117"},{"type":"electronic","value":"9783319249124"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24912-4_15","type":"book-chapter","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T14:07:30Z","timestamp":1444140450000},"page":"202-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Describing Early Security Requirements Using Use Case Maps"],"prefix":"10.1007","author":[{"given":"Jameleddine","family":"Hassine","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdelwahab","family":"Hamou-Lhadj","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,28]]},"reference":[{"issue":"1","key":"15_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.C., Randell, B., Landwehr, C.: Basic concepts and Taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"15_CR2","volume-title":"Software Architecture in Practice","author":"L Bass","year":"2003","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 2nd edn. Addison-Wesley Longman Publishing Co., Inc, Boston (2003)","edition":"2"},{"key":"15_CR3","volume-title":"Software Architecture in Practice","author":"L Bass","year":"2012","unstructured":"Bass, L., Clements, P., Kazman, R.: Software Architecture in Practice, 3rd edn. Addison-Wesley Professional, Boston (2012)","edition":"3"},{"key":"15_CR4","unstructured":"Clements, P., Northrop, L.: Software architecture: an executive overview. Technical report, CMU\/SEI-96-TR-003, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA (1996). \n                      http:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?AssetID=12509"},{"issue":"1","key":"15_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.5381\/jot.2003.2.1.c6","volume":"2","author":"D Firesmith","year":"2003","unstructured":"Firesmith, D.: Security use cases. J. Object Technol. 2(1), 53\u201364 (2003). \n                      http:\/\/dx.doi.org\/10.5381\/jot.2003.2.3.c6","journal-title":"J. Object Technol."},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Hassine, J.: Early availability requirements modeling using use case maps. In: Eighth International Conference on Information Technology: New Generations (ITNG), Las Vegas, Nevada, USA, pp. 754\u2013759, April 2011","DOI":"10.1109\/ITNG.2011.133"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Hassine, J.: Describing and assessing availability requirements in the early stages of system development. Softw. Syst. Model., 1\u201325 (2013). \n                      http:\/\/dx.doi.org\/10.1007\/s10270-013-0382-0","DOI":"10.1007\/s10270-013-0382-0"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-25264-8_6","volume-title":"SDL 2011: Integrating System and Software Modeling","author":"J Hassine","year":"2011","unstructured":"Hassine, J., Gherbi, A.: Exploring early availability requirements using use case maps. In: Ober, I., Ober, I. (eds.) SDL 2011. LNCS, vol. 7083, pp. 54\u201368. Springer, Heidelberg (2011). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-25264-8_6"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-642-38911-5_3","volume-title":"SDL 2013: Model-Driven Dependability Engineering","author":"J Hassine","year":"2013","unstructured":"Hassine, J., Hamou-Lhadj, A.: Towards the generation of AMF configurations from use case maps based availability requirements. In: Khendek, F., Toeroe, M., Gherbi, A., Reed, R. (eds.) SDL 2013. LNCS, vol. 7916, pp. 36\u201353. Springer, Heidelberg (2013). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-38911-5_3"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-319-11743-0_4","volume-title":"System Analysis and Modeling: Models and Reusability","author":"J Hassine","year":"2014","unstructured":"Hassine, J., Hamou-Lhadj, A.: Toward a UCM-based approach for recovering system availability requirements from execution traces. In: Amyot, D., Fonseca i Casas, P., Mussbacher, G. (eds.) SAM 2014. LNCS, vol. 8769, pp. 48\u201363. Springer, Heidelberg (2014). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-319-11743-0_4"},{"key":"15_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-38911-5_4","volume-title":"SDL 2013: Model-Driven Dependability Engineering","author":"J Hassine","year":"2013","unstructured":"Hassine, J., Mussbacher, G., Braun, E., Alhaj, M.: Modeling early availability requirements using aspect-oriented use case maps. In: Khendek, F., Toeroe, M., Gherbi, A., Reed, R. (eds.) SDL 2013. LNCS, vol. 7916, pp. 54\u201371. Springer, Heidelberg (2013). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-38911-5_4"},{"key":"15_CR12","unstructured":"ITU-T: E.800: Definitions of Terms Related to Quality of Service, September 2008. \n                      https:\/\/www.itu.int\/rec\/dologin_pub.asp?lang=e&id=T-REC-E.800-200809-I!!PDF-E&type=items\n                      \n                    . Accessed 15 June 2015"},{"key":"15_CR13","unstructured":"ITU-T: X.1051: Information Technology - Security Techniques - Information Security Management Guidelines for Telecommunications Organizations Based on ISO\/IEC 27002, February 2008. \n                      https:\/\/www.itu.int\/rec\/dologin_pub.asp?lang=e&id=T-REC-X.1051-200802-I!!PDF-E&type=items\n                      \n                    . Accessed 15 June 2015"},{"key":"15_CR14","unstructured":"ITU-T: Recommendation Z.151 (10\/12), User Requirements Notation (URN) Language Definition, Geneva, Switzerland (2012). \n                      http:\/\/www.itu.int\/rec\/T-REC-Z.151\/en"},{"key":"15_CR15","unstructured":"jUCMNav: jUCMNav Project, v6.0.0 (Tool, Documentation, and Meta-model) (2014). \n                      http:\/\/softwareengineering.ca\/jucmnav"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-642-14192-8_24","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"P Karpati","year":"2010","unstructured":"Karpati, P., Sindre, G., Opdahl, A.L.: Visualizing cyber attacks with misuse case maps. In: Wieringa, R., Persson, A. (eds.) REFSQ 2010. LNCS, vol. 6182, pp. 262\u2013275. Springer, Heidelberg (2010). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-14192-8_24"},{"key":"15_CR17","unstructured":"McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: Proceedings of the 15th Annual Computer Security Applications Conference. pp. 55\u201364. ACSAC \u201999, IEEE Computer Society, Washington, DC, USA (1999). \n                      http:\/\/dl.acm.org\/citation.cfm?id=784590.784691"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Ryoo, J., Laplante, P., Kazman, R.: Revising a security tactics hierarchy through decomposition, reclassification, and derivation. In: Software Security and Reliability Companion (SERE-C), IEEE Sixth International Conference (June 2012), pp. 85\u201391 (2012)","DOI":"10.1109\/SERE-C.2012.18"},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.: Eliciting security requirements with misuse cases. Requirements Eng. 10(1), 34\u201344 (2005). \n                      http:\/\/dx.doi.org\/10.1007\/s00766-004-0194-4","journal-title":"Requirements Eng."},{"key":"15_CR20","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595754","volume-title":"Software Architecture: Foundations, Theory, and Practice","author":"RN Taylor","year":"2009","unstructured":"Taylor, R.N., Medvidovic, N., Dashofy, E.M.: Software Architecture: Foundations, Theory, and Practice. Wiley, New Jersey (2009)"}],"container-title":["Lecture Notes in Computer Science","SDL 2015: Model-Driven Engineering for Smart Cities"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24912-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:22:34Z","timestamp":1558311754000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24912-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319249117","9783319249124"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24912-4_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}