{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:03:52Z","timestamp":1743026632128,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319395630"},{"type":"electronic","value":"9783319395647"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39564-7_23","type":"book-chapter","created":{"date-parts":[[2016,6,6]],"date-time":"2016-06-06T07:27:56Z","timestamp":1465198076000},"page":"243-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Discovering Potential Interaction Violations among Requirements"],"prefix":"10.1007","author":[{"given":"Curtis","family":"Busby-Earle","sequence":"first","affiliation":[]},{"given":"Robert B.","family":"France","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,7]]},"reference":[{"key":"23_CR1","unstructured":"Roudier, Y., Apvrille, L.: SysML-Sec-a model driven approach for designing safe and secure systems. In: International Special Session on Security and Privacy in Model Based Engineering: Proceedings of the 3rd International Conference on Model Driven Engineering and Software Development. MODELSWARD 2015, Angers, Loire Valley, France. IEEE Computer Society Press (2015)"},{"key":"23_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-319-29968-6_6","volume-title":"Graphical Models for Security","author":"MG Ivanova","year":"2016","unstructured":"Ivanova, M.G., Probst, C.W., Hansen, R.R., Kamm\u00fcller, F.: Transforming graphical system models to graphical attack models. In: Mauw, S., et al. (eds.) GraMSec 2015. LNCS, vol. 9390, pp. 82\u201396. Springer, Heidelberg (2016). doi:10.1007\/978-3-319-29968-6_6"},{"key":"23_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-29968-6_3","volume-title":"Graphical Models for Security","author":"L Apvrille","year":"2016","unstructured":"Apvrille, L., Roudier, Y.: SysML-Sec attack graphs: compact representations for complex attacks. In: Mauw, S., et al. (eds.) GraMSec 2015. LNCS, vol. 9390, pp. 35\u201349. Springer, Heidelberg (2016). doi:10.1007\/978-3-319-29968-6_3"},{"key":"23_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/978-3-319-19243-7_41","volume-title":"Advanced Information Systems Engineering Workshops","author":"A Schilling","year":"2015","unstructured":"Schilling, A., Werners, B.: Optimizing information systems security design based on existing security knowledge. In: Persson, A., Stirna, J. (eds.) CAiSE 2015 Workshops. LNBIP, vol. 215, pp. 447\u2013458. Springer, Heidelberg (2015)"},{"key":"23_CR5","series-title":"Lecture Notes in Mechanical Engineering","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-642-53742-4","volume-title":"Dependability of Self-Optimizing Mechatronic Systems","author":"J Gausemeier","year":"2014","unstructured":"Gausemeier, J., Rammig, F.J., Sch\u00e4fer, W., Sextro, W.: Case study. In: Gausemeier, J., Rammig, F.J., Sch\u00e4fer, W., Sextro, W. (eds.) Dependability of Self-Optimizing Mechatronic Systems. LNME, vol. 2, pp. 175\u2013192. Springer, Heidelberg (2014)"},{"key":"23_CR6","unstructured":"Landtsheer, D., Renaud, van Lamsweerde, A.: Reasoning about confidentiality at requirements engineering time. In: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering. ESEC\/FSE-13, Lisbon, Portugal. ACM (2005)"},{"issue":"4","key":"23_CR7","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MS.2007.114","volume":"24","author":"M Hafiz","year":"2007","unstructured":"Hafiz, M., Adamczyk, P., Johnson, R.E.: Organizing security patterns. IEEE Softw. 24(4), 52\u201360 (2007). IEEE Computer Society Press","journal-title":"IEEE Softw."},{"key":"23_CR8","volume-title":"Computer Security: Principles and Practice","author":"W Stallings","year":"2012","unstructured":"Stallings, W., Brown, L.: Computer Security: Principles and Practice, 2nd edn. Pearson Prentice Hall, Upper Saddle River (2012)","edition":"2"},{"key":"23_CR9","volume-title":"Introduction to Algorithms","author":"TH Cormen","year":"2009","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. MIT Press, Cambridge (2009)","edition":"3"},{"key":"23_CR10","first-page":"44","volume-title":"Integrating Security and Software Engineering: Advances and Future Vision","author":"NR Mead","year":"2007","unstructured":"Mead, N.R.: Identifying security requirements using the Security Quality Requirements Engineering (SQUARE) method. In: Mouratidis, H., Giorgini, P. (eds.) Integrating Security and Software Engineering: Advances and Future Vision, pp. 44\u201369. IGI Global, Hershey (2007)"},{"key":"23_CR11","first-page":"1","volume-title":"Beautiful Security: Leading Security Experts Explain How They Think","author":"P Zatko","year":"2009","unstructured":"Zatko, P.: Psychological security. In: Oram, A., Viega, J. (eds.) Beautiful Security: Leading Security Experts Explain How They Think, pp. 1\u201320. O\u2019Reilly Media, California (2009)"},{"key":"23_CR12","series-title":"International Series in Software Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-functional Requirements in Software Engineering","author":"L Chung","year":"2000","unstructured":"Chung, L., Nixon, B.A., Yu, E., Mylopoulos, J.: Non-functional Requirements in Software Engineering. International Series in Software Engineering, vol. 5. Springer, Heidelberg (2000)"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"UML 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"23_CR14","unstructured":"Sindre, G., Opdahl, A.: Eliciting security requirements by misuse cases. In: Proceedings of Technology of Object Oriented Languages and Systems. IEEE Computer Society (2000)"},{"key":"23_CR15","unstructured":"McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: Proceedings of Computer Security Applications Conference. IEEE Computer Society (1999)"},{"key":"23_CR16","volume-title":"A Taxonomy (with Examples) of Cases of Software Vulnerabilities in Internet Software (CW346)","author":"F Piessens","year":"2002","unstructured":"Piessens, F.: A Taxonomy (with Examples) of Cases of Software Vulnerabilities in Internet Software (CW346). Katholieke Universiteit Leuven, Belgium (2002)"},{"key":"23_CR17","unstructured":"Busby-Earle, C., Mugisa, E.K.: Metadata for boilerplate placement values for secure software development using derived requirements. In: Proceedings of the 13th IASTED International Conference on Software Engineering and Applications (SEA 2009). ACTA Press, Cambridge, Massachusetts (2009)"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"van Lamsweerde, A.: Requirements engineering in the year 00: a research perspective. In: Proceedings of the 22nd International Conference on Software Engineering. ICSE 2000, Limerick, Ireland. ACM (2000)","DOI":"10.1145\/337180.337184"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Devanbu, P.T., Stubblebine, S.: Software engineering for security: a roadmap. In: Proceedings of the Conference on the Future of Software Engineering. ICSE 2000, Limerick, Ireland. ACM (2000)","DOI":"10.1145\/336512.336559"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Wang, A.J.A.: Information security models and metrics. In: Proceedings of the 43rd Annual Southeast Regional Conference. ACM-SE 43, Kennesaw, Georgia. ACM (2005)","DOI":"10.1145\/1167253.1167295"},{"key":"23_CR21","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: Proceedings of the 11th IEEE International Conference on Requirements Engineering. RE 2003, Washington DC. IEEE Computer Society (2003)"}],"container-title":["Lecture Notes in Business Information Processing","Advanced Information Systems Engineering Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39564-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:08:28Z","timestamp":1623024508000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-39564-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319395630","9783319395647"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39564-7_23","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"7 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ljubljana","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}