{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:22:13Z","timestamp":1765887733768,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319255781"},{"type":"electronic","value":"9783319255798"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25579-8_18","type":"book-chapter","created":{"date-parts":[[2015,10,19]],"date-time":"2015-10-19T00:49:03Z","timestamp":1445215743000},"page":"311-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Problem-Based Security Requirements Elicitation and Refinement with PresSuRE"],"prefix":"10.1007","author":[{"given":"Stephan","family":"Fa\u00dfbender","sequence":"first","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]},{"given":"Rene","family":"Meis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Fa\u00dfbender, S., Heisel, M., Meis, R.: Functional requirements under security pressure. In: ICSOFT-PT 2014 - Proceedings of the 9th International Conference on Software Paradigm Trends, Vienna, Austria, 29\u201331 August 2014","DOI":"10.5220\/0005098600050016"},{"key":"18_CR2","unstructured":"Bundeskriminalamt (federal criminal police office): Bundeslagebild Cybercrime 2013 (report on cybercrime 2013). Technical report, Germany (2014)"},{"key":"18_CR3","unstructured":"Bundeskriminalamt (federal criminal police office): Bundeslagebild Cybercrime 2012 (report on cybercrime 2012). Technical report, Germany (2013)"},{"key":"18_CR4","unstructured":"Norton: Norton Report 2013. Technical report, Norton (2013)"},{"key":"18_CR5","volume-title":"Hughes Aircraft\u2019s Widespread Deployment of a Continuously Improving Software Process. AD-a358 993","author":"R Willis","year":"1998","unstructured":"Willis, R.: Hughes Aircraft\u2019s Widespread Deployment of a Continuously Improving Software Process. AD-a358 993. Carnegie-mellon university, Pittsburgh (1998)"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1109\/32.6191","volume":"14","author":"BW Boehm","year":"1988","unstructured":"Boehm, B.W., Papaccio, P.N.: Understanding and controlling software costs. IEEE Trans. Softw. Eng. 14, 1462\u20131477 (1988)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"77","DOI":"10.5381\/jot.2003.2.4.c7","volume":"2","author":"D Firesmith","year":"2003","unstructured":"Firesmith, D.: Specifying good requirements. J. Object Technol. 2, 77\u201387 (2003)","journal-title":"J. Object Technol."},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-54069-1_1","volume-title":"Privacy Technologies and Policy","author":"K Beckers","year":"2014","unstructured":"Beckers, K., Fa\u00dfbender, S., Heisel, M., Meis, R.: A problem-based approach for computer-aided privacy threat identification. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol. 8319, pp. 1\u201316. Springer, Heidelberg (2014)"},{"key":"18_CR9","volume-title":"Problem Frames: Analyzing and structuring software development problems","author":"M Jackson","year":"2001","unstructured":"Jackson, M.: Problem Frames: Analyzing and structuring software development problems. Addison-Wesley, Boston (2001)"},{"key":"18_CR10","unstructured":"Kreutzmann, H., Vollmer, S., Tekampe, N., Abromeit, A.: Protection profile for the gateway of a smart metering system. Technical report, BSI (2011)"},{"key":"18_CR11","unstructured":"Requirements of AMI. Technical report, OPEN meter project (2009)"},{"key":"18_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-642-16901-4_18","volume-title":"Formal Methods and Software Engineering","author":"D Hatebur","year":"2010","unstructured":"Hatebur, D., Heisel, M.: Making pattern- and model-based software development more rigorous. In: Dong, J.S., Zhu, H. (eds.) ICFEM 2010. LNCS, vol. 6447, pp. 253\u2013269. Springer, Heidelberg (2010)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Beckers, K., Hatebur, D., Heisel, M.: A problem-based threat analysis in compliance with common criteria. In: ARES 2013, IEEE Computer Society (2013)","DOI":"10.1109\/ARES.2013.21"},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Trans. Inf. Theor. 29, 198\u2013207 (1983)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"18_CR15","unstructured":"ISO\/IEC: Common Criteria for Information Technology Security Evaluation. ISO\/IEC 15408, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), Geneva, Switzerland (2009)"},{"key":"18_CR16","unstructured":"ISO\/IEC: Information technology - Security techniques - Information security management systems - Overview and Vocabulary. ISO\/IEC 27000, International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC), Geneva, Switzerland (2009)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-15651-9_24","volume-title":"Computer Safety, Reliability, and Security","author":"D Hatebur","year":"2010","unstructured":"Hatebur, D., Heisel, M.: A UML profile for requirements analysis of dependable software. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol. 6351, pp. 317\u2013331. Springer, Heidelberg (2010)"},{"key":"18_CR18","unstructured":"Volkamer, M., Vogt, R.: Common Criteria Protection Profile for Basic set of security requirements for Online Voting Products. Bundesamt f\u201dur Sicherheit in der Informationstechnik (2008)"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Fa\u00dfbender, S., Heisel, M.: From problems to laws in requirements engineering using model-transformation. In: ICSOFT 2013, SciTePress. pp. 447\u2013458 (2013)","DOI":"10.5220\/0004490804470458"},{"key":"18_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-642-21640-4_28","volume-title":"Advanced Information Systems Engineering","author":"H Schmidt","year":"2011","unstructured":"Schmidt, H., J\u00fcrjens, J.: Connecting security requirements analysis and secure design using patterns and UMLsec. In: Mouratidis, H., Rolland, C. (eds.) CAiSE 2011. LNCS, vol. 6741, pp. 367\u2013382. Springer, Heidelberg (2011)"},{"key":"18_CR21","volume-title":"Secure Systems Development with UML","author":"J J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"CB Haley","year":"2008","unstructured":"Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34, 133\u2013153 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: RE 2003. pp. 151\u2013161 (2003)","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"18_CR24","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure Tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17, 285\u2013309 (2007)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Salehie, M., Pasquale, L., Omoronyia, I., Ali, R., Nuseibeh, B.: Requirements-driven adaptive security: protecting variable assets at runtime. In: RE 2012. pp. 111\u2013120 (2012)","DOI":"10.1109\/RE.2012.6345794"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: ICSE 2004. pp. 148\u2013157 (2004)","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Alrajeh, D., Kramer, J., Russo, A., Uchitel, S.: Learning operational requirements from goal models. In: ICSE 2009. pp. 265\u2013275 (2009)","DOI":"10.1109\/ICSE.2009.5070527"}],"container-title":["Communications in Computer and Information Science","Software Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25579-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T02:13:04Z","timestamp":1748657584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25579-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255781","9783319255798"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25579-8_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"17 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}