{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T04:18:24Z","timestamp":1749010704249,"version":"3.41.0"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319394169"},{"type":"electronic","value":"9783319394176"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39417-6_16","type":"book-chapter","created":{"date-parts":[[2016,7,9]],"date-time":"2016-07-09T07:55:26Z","timestamp":1468050926000},"page":"357-380","source":"Crossref","is-referenced-by-count":18,"title":["Security Requirements Engineering for Cloud Computing: The Secure Tropos Approach"],"prefix":"10.1007","author":[{"given":"Haralambos","family":"Mouratidis","sequence":"first","affiliation":[]},{"given":"Nikolaos","family":"Argyropoulos","sequence":"additional","affiliation":[]},{"given":"Shaun","family":"Shei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,10]]},"reference":[{"key":"16_CR1","unstructured":"Depot, T.H.: The home depot reports findings in payment data breach investigation. http:\/\/krebsonsecurity.com\/2014\/09\/home-depot-hit-by-same-malware-as-target\/ (2014). Accessed 13 Oct 15"},{"key":"16_CR2","unstructured":"Pavel, A.: Amazon.com server said to have been used in Sony attack. http:\/\/www.bloomberg.com\/news\/articles\/2011-05-13\/sony-network-said-to-have-been-invaded-by-hackers-using-amazon-com-server (2011). Accessed 13 Oct 15"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Cloud Security Alliance: Security research alliance to promote network security. Netw. Secur. 1999(2), 3\u20134 (1999)","DOI":"10.1016\/S1353-4858(99)90042-9"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Bergmayr, A., Bruneli\u00e8re, H., Izquierdo, J.L.C., Gorro\u00f1ogoitia, J., Kousiouris, G., Kyriazis, D., Langer, P., Menychtas, A., Orue-Echevarria, L., Pezuela, C., Wimmer, M.: Migrating legacy software to the cloud with ARTIST. In: European Conference on Software Maintenance and Reengineering, CSMR, pp. 465\u2013468 (2013)","DOI":"10.1109\/CSMR.2013.73"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Ferry, N., Rossini, A., Chauvel, F., Morin, B., Solberg, A.: Towards model-driven provisioning, deployment, monitoring, and adaptation of multicloud systems. In: 6th International Conference on Cloud Computing, pp. 887\u2013894. IEEE Press (2013)","DOI":"10.1109\/CLOUD.2013.133"},{"key":"16_CR6","unstructured":"Frey, S., Hasselbring, W.: The cloudmig approach: Model-based migration of software systems to cloud-optimized applications. Int. J. Adv. Softw. 4(3\u20134), 342\u2013353 (2011)"},{"key":"16_CR7","unstructured":"Armbrust, M., Fox, O., Griffith, R., Joseph, A.D., Katz, Y., Konwinski, A., et al.: Above the clouds: A Berkeley view of cloud computing. Technical report, pp. 07\u2013013. University of California, Berkeley (2009)"},{"issue":"3","key":"16_CR8","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P Bresciani","year":"2004","unstructured":"Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: an agent-oriented software development methodology. Auton. Agent. Multi-Agent Syst. 8(3), 203\u2013236 (2004)","journal-title":"Auton. Agent. Multi-Agent Syst."},{"key":"16_CR9","unstructured":"Mouratidis, H.: A security oriented approach in the development of multiagent bsystems: applied to the management of the health and social care needs of older people in England. Ph.D. Thesis, University of Sheffields, UK (2004)"},{"key":"16_CR10","unstructured":"Yu, E.: Modelling strategic relationships for process reengineering. Ph.D. thesis, Department of Computer Science, University of Toronto, Canada (1995)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Chung, L., Nixon B.: Dealing with non-functional requirements: three experimental studies of a process-oriented approach. In: 17th International Conference on Software Engineering, pp. 25\u201337. ACM (1995)","DOI":"10.1145\/225014.225017"},{"issue":"9","key":"16_CR12","doi-asserted-by":"crossref","first-page":"2276","DOI":"10.1016\/j.jss.2013.03.011","volume":"86","author":"H Mouratidis","year":"2013","unstructured":"Mouratidis, H., Islam, S., Kalloniatis, C., Gritzalis, S.: A framework to support selection of cloud providers based on security and privacy requirements. J. Syst. Softw. 86(9), 2276\u20132293 (2013)","journal-title":"J. Syst. Softw."},{"issue":"3","key":"16_CR13","doi-asserted-by":"crossref","first-page":"331","DOI":"10.4304\/jsw.6.3.331-339","volume":"6","author":"H Mouratidis","year":"2011","unstructured":"Mouratidis, H.: Secure software systems engineering: the secure tropos approach. J. Softw. 6(3), 331\u2013339 (2011)","journal-title":"J. Softw."},{"issue":"3","key":"16_CR14","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s00766-003-0183-z","volume":"9","author":"AI Anton","year":"2004","unstructured":"Anton, A.I., Earp, J.B.: A requirements taxonomy for reducing web site privacy vulnerabilities. Requir. Eng. 9(3), 169\u2013185 (2004)","journal-title":"Requir. Eng."},{"key":"16_CR15","unstructured":"Schumacher, M., Roedig, U.: Security engineering with patterns. In: 8th Conference on Pattern Languages for Programs (PLoP), Illinois, USA (2001)"},{"issue":"10","key":"16_CR16","doi-asserted-by":"crossref","first-page":"978","DOI":"10.1109\/32.879820","volume":"26","author":"A Lamsweerde van","year":"2000","unstructured":"van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. Trans. Softw. Eng. 26(10), 978\u20131005 (2000)","journal-title":"Trans. Softw. Eng."},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Crook, R., Ince, D., Lin, L.C., Nuseibeh, B.: Security requirements engineering: when anti-requirements hit the fan. In: 10th International Requirements Engineering Conference, pp. 203\u2013205. IEEE Press (2002)","DOI":"10.1109\/ICRE.2002.1048527"},{"key":"16_CR18","unstructured":"Lin, L.C., Nuseibeh, B., Ince, D., Jackson, M., Moffett, J.: Analysing security threats and vulnerabilities using abuse frames. Technical report 2003\/10, The Open University (2003)"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: 11th International Requirements Engineering Conference, pp. 151\u2013161. IEEE Press (2003)","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"McDermott, J., Fox, C.: Using abuse care models for security requirements analysis. In: 15th Annual Computer Security Applications Conference, pp. 55\u201364. IEEE Press (1999)","DOI":"10.1109\/CSAC.1999.816013"},{"issue":"1","key":"16_CR21","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requir. Eng. 10(1), 34\u201344 (2005)","journal-title":"Requir. Eng."},{"key":"16_CR22","unstructured":"Jurjens, J.: Secure Systems Development with UML. Springer (2005)"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: a UML based modelling language for model-driven security. In: UML 2002 The Unified Modeling Language, pp. 426\u2013441. Springer (2002)","DOI":"10.1007\/3-540-45800-X_33"},{"issue":"2","key":"16_CR24","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(2), 285\u2013309 (2007)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J.: Requirement engineering meets security: a case study on modelling secure electronic transactions by VISA and Mastercard. In: 22nd International Conference On Conceptual Modeling (ER 2003), pp. 263-276. Springer (2003)","DOI":"10.1007\/978-3-540-39648-2_22"},{"key":"16_CR26","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.csi.2006.04.002","volume":"29","author":"D Mellado","year":"2007","unstructured":"Mellado, D., Fern\u00e1ndez-Medina, E., Piattini, M.: A common criterion based security requirements engineering process for the development of secure information system. Comput. Stan. Interfaces 29, 244\u2013253 (2007)","journal-title":"Comput. Stan. Interfaces"},{"issue":"4","key":"16_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1082983.1083214","volume":"30","author":"NR Mead","year":"2005","unstructured":"Mead, N.R., Steheny, T.: Security quality requirements engineering (SQUARE) methodology. SIGSOFT Softw. Eng. Notes 30(4), 1\u20137 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Houmb, S.H., Islam, S., Knauss, E., Jrjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requirements. Eng. J. 15(1), 63\u201393 (2010)","DOI":"10.1007\/s00766-009-0093-9"},{"issue":"2","key":"16_CR29","doi-asserted-by":"crossref","first-page":"36","DOI":"10.4018\/jsse.2012040102","volume":"3","author":"M Pavlidis","year":"2012","unstructured":"Pavlidis, M., Mouratidis, H., Islam, S.: Modelling security using trust based concepts. Int. J. Secure Softw. Eng. 3(2), 36\u201353 (2012)","journal-title":"Int. J. Secure Softw. Eng."},{"issue":"5","key":"16_CR30","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1016\/j.infsof.2010.01.002","volume":"52","author":"DG Rosado","year":"2010","unstructured":"Rosado, D.G., Fern\u00e1ndez-Medina, E., L\u00f3pez, J., Piattini, M.: Analysis of secure mobile grid systems: a systematic approach. Inf. Softw. Technol. 52(5), 517\u2013536 (2010)","journal-title":"Inf. Softw. Technol."},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Bandara, Arosha, Shinpei, H., Jurjens, J., Kaiya, H., Kubo, A., Laney, R., Mouratidis, H., et al.: Security patterns: comparing modeling approaches. In: Software Engineering for Secure Systems: Industrial and Research Perspectives: Industrial and Research Perspectives, p. 75 (2010)","DOI":"10.4018\/978-1-61520-837-1.ch004"},{"key":"16_CR32","unstructured":"Shei, S., Delaney, A., Kapetanakis, S., Mouratidis, H.: Visually Mapping Requirements Models to Cloud Services"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Shei, S., M\u00e1rquez Alca\u00f1iz, L., Mouratidis, H., Delaney, A., Rosado, D.G., Fern\u00e1ndez-Medina, E.: Modelling secure cloud systems based on system requirements. In: Proceedings of ESPRE, pp. 19\u201324 (2015)","DOI":"10.1109\/ESPRE.2015.7330163"},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Pavlidis, M., Islam, S., Mouratidis, H.: A CASE tool to support automated modelling and analysis of security requirements. In: Nurcan, S., (eds.) IS Olympics: Information Systems in a Diverse World, pp. 95\u2013109. Springer (2012)","DOI":"10.1007\/978-3-642-29749-6_7"},{"key":"16_CR35","unstructured":"Greek Parliament: Act 3892: Electronic registration and fulfilment of medical prescriptions and clinical test referrals. FEK 189(1), 4225\u20134232 (2010). [In Greek]"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Argyropoulos, N., Mouratidis, H., Fish, A.: Towards the derivation of secure business process designs. In: 2nd International Workshop on Conceptual Modelling in Requirements and Business Analysis (MReBA) in Conjunction with the 34th International Conference on Conceptual Modeling (ER\u201915), Stockholm, Sweden, pp. 1\u201311. Springer (2015)","DOI":"10.1007\/978-3-319-25747-1_25"},{"key":"16_CR37","doi-asserted-by":"crossref","unstructured":"Argyropoulos, N., M\u00e1rquez Alca\u00f1iz, L., Mouratidis, H., Fish, A., Rosado, D.G., De Guzm\u00e1n, I.G.R., Fern\u00e1ndez-Medina, E.: Eliciting security requirements for business processes of legacy systems. In: 8th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling, Valencia, Spain. Springer (2015)","DOI":"10.1007\/978-3-319-25897-3_7"}],"container-title":["Domain-Specific Conceptual Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39417-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T00:27:44Z","timestamp":1748996864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39417-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319394169","9783319394176"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39417-6_16","relation":{},"subject":[],"published":{"date-parts":[[2016]]}}}