{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:56:53Z","timestamp":1743130613155,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319401799"},{"type":"electronic","value":"9783319401805"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40180-5_16","type":"book-chapter","created":{"date-parts":[[2016,6,20]],"date-time":"2016-06-20T13:36:32Z","timestamp":1466429792000},"page":"229-241","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Enterprise Model Frame for Supporting Security Requirement Elicitation from Business Processes"],"prefix":"10.1007","author":[{"given":"Marite","family":"Kirikova","sequence":"first","affiliation":[]},{"given":"Raimundas","family":"Matulevi\u010dius","sequence":"additional","affiliation":[]},{"given":"Kurt","family":"Sandkuhl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,21]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Firesmith, D.: Engineering safety and security related requirements for software intensive systems. In: ICSE 2007 Companion, p. 169. IEEE (2007)","DOI":"10.1109\/ICCBSS.2007.15"},{"key":"16_CR2","volume-title":"Secure Systems Development with UML","author":"J J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)"},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Eng. 10(1), 34\u201344 (2005)","journal-title":"Requirements Eng."},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/978-3-319-10975-6_6","volume-title":"Availability, Reliability, and Security in Information Systems","author":"D Mu\u00f1ante","year":"2014","unstructured":"Mu\u00f1ante, D., Chiprianov, V., Gallon, L., Aniort\u00e9, P.: A review of security requirements engineering methods with respect to risk analysis and model-driven engineering. In: Teufel, S., Min, T.A., You, I., Weippl, E. (eds.) CD-ARES 2014. LNCS, vol. 8708, pp. 79\u201393. Springer, Heidelberg (2014)"},{"key":"16_CR5","unstructured":"Ahmed, N., Deriving security requirements from business process models. Ph.D. thesis. University of Tartu (2014)"},{"key":"16_CR6","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-319-19270-3_2","volume-title":"Information Systems Engineering in Complex Environments","author":"N Ahmed","year":"2015","unstructured":"Ahmed, N., Matulevi\u010dius, R.: Presentation and validation of method for security requirements elicitation from business processes. In: Nurcan, S., Pimenidis, E. (eds.) CAiSE Forum 2014. LNBIP, vol. 204, pp. 20\u201335. Springer, Heidelberg (2015)"},{"key":"16_CR7","unstructured":"Software and Systems Engineering Vocabulary (2015). http:\/\/pascal.computer.org\/sev_display\/index.action"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Leitner, M., Miller, M., Rinderle-Ma, St.: An analysis and evaluation of security aspects in business process model and notation. In: Proceedings of the Eighth International Conference on Availability, Reliability and Security (ARES), pp. 262\u2013267 (2013)","DOI":"10.1109\/ARES.2013.34"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J.: Developing secure systems with UMLsec from business process to implementation. Verl\u00e4ssliche IT-Systeme 2001, DuD-Fachbeitr\u00e4ge, pp. 151\u2013161 (2001)","DOI":"10.1007\/978-3-663-05918-9_11"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Brucker, A., Hang, I., L\u00fcckemeyer, G., Ruparel, R.: SecureBPMN: modeling and enforcing access requirements in business processes. In: Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT 2012), pp. 123\u2013126 (2012)","DOI":"10.1145\/2295136.2295160"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Rodriguez, A., Fernandez, M, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE-TIS(4), pp. 745\u2013752 (2007)","DOI":"10.1093\/ietisy\/e90-d.4.745"},{"key":"16_CR12","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/0-387-31167-X_12","volume-title":"Security Management, Integrity, and Internal Control in Information Systems","author":"JL Spears","year":"2006","unstructured":"Spears, J.L.: A holistic risk analysis method for identifying information security risks. In: Dowland, P., Furnell, S., Thuraisingham, B., Wang, X.S. (eds.) Security Management, Integrity, and Internal Control in Information Systems. IFIP, vol. 193, pp. 185\u2013202. Springer US, New York (2006)"},{"key":"16_CR13","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/978-3-662-43745-2_14","volume-title":"Enterprise, Business-Process and Information Systems Modeling","author":"M Salnitri","year":"2014","unstructured":"Salnitri, M., Dalpiaz, F., Giorgini, P.: Modeling and verifying security policies in business processes. In: Bider, I., Gaaloul, K., Krogstie, J., Nurcan, S., Proper, H.A., Schmidt, R., Soffer, P. (eds.) BPMDS 2014 and EMMSAD 2014. LNBIP, vol. 175, pp. 200\u2013214. Springer, Heidelberg (2014)"},{"key":"16_CR14","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/978-3-319-12574-9_5","volume-title":"Cyber Security and Privacy","author":"M Salnitri","year":"2014","unstructured":"Salnitri, M., Paja, E., Giorgini, P.: Preserving compliance with security requirements in socio-technical systems. In: Cleary, F., Felici, M. (eds.) CSP Forum 2014. CCIS, vol. 470, pp. 49\u201362. Springer, Heidelberg (2014)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Ahmed, N., Matulevi\u010dius, R.: A taxonomy for assessing security in business process Modeling. In: Proceeding of RCIS, pp. 1\u201310. IEEE (2013)","DOI":"10.1109\/RCIS.2013.6577700"},{"key":"16_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28616-2","volume-title":"Business Process Management: Concepts, Languages, Architectures","author":"M Weske","year":"2012","unstructured":"Weske, M.: Business Process Management: Concepts, Languages, Architectures. Springer, Heidelberg (2012)"},{"issue":"4","key":"16_CR17","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.csi.2013.12.007","volume":"36","author":"N Ahmed","year":"2014","unstructured":"Ahmed, N., Matulevi\u010dius, R.: Securing business processes using security risk-oriented patterns. Comput. Stand. Interfaces 36(4), 723\u2013733 (2014)","journal-title":"Comput. Stand. Interfaces"},{"key":"16_CR18","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-12544-7_16","volume-title":"Intentional Perspectives on Information Systems Engineering","author":"E Dubois","year":"2010","unstructured":"Dubois, E., Heymans, P., Mayer, N., Matulevi\u010dius, R.: A systematic approach to define the domain of information system security risk management. In: Nurcan, S., Salinesi, C., Souveyet, C., Ralyt\u00e9, J. (eds.) Intentional Perspectives on Information Systems Engineering, pp. 289\u2013306. Springer, Heidelberg (2010)"},{"key":"16_CR19","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-319-01863-8_11","volume-title":"New Trends in Databases and Information Systems","author":"M Kirikova","year":"2014","unstructured":"Kirikova, M., Pudane, M.: Viable systems model based information flows. In: Catania, B., Cerquitelli, T., Chiusano, S., Guerrini, G., K\u00e4mpf, M., Kemper, A., Novikov, B., Palpanas, T., Pokorny, J., Vakali, A. (eds.) New Trends in Databases and Information Systems. AISC, vol. 241, pp. 97\u2013104. Springer, Heidelberg (2014)"},{"key":"16_CR20","unstructured":"ArchiMate 2.1 Specification, Open Group (2013). http:\/\/pubs.opengroup.org\/architecture\/archimate2-doc\/"},{"key":"16_CR21","unstructured":"Cjaputa K.: Business process based introduction of security aspects in enterprise architecture. Master thesis, RTU (2016)"},{"key":"16_CR22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-43725-4","volume-title":"Enterprise Modeling Tackling Business Challenges with the 4EM Method","author":"K Sandkuhl","year":"2014","unstructured":"Sandkuhl, K., Stirna, J., Persson, A., Wi\u00dfotzki, M.: Enterprise Modeling Tackling Business Challenges with the 4EM Method. Springer, Heidelberg (2014)"}],"container-title":["Communications in Computer and Information Science","Databases and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40180-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T23:31:45Z","timestamp":1692401505000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40180-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319401799","9783319401805"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40180-5_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}