{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:02:10Z","timestamp":1725566530733},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540233077"},{"type":"electronic","value":"9783540301875"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30187-5_25","type":"book-chapter","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T19:50:15Z","timestamp":1285185015000},"page":"350-364","source":"Crossref","is-referenced-by-count":5,"title":["Integrating a Security Requirement Language with UML"],"prefix":"10.1007","author":[{"given":"H.","family":"Abie","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D. B.","family":"Aredo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T.","family":"Kristoffersen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S.","family":"Mazaher","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"T.","family":"Raguin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols, The Spi Calculus. Research Report, digital Systems Research Center (January 1998)","DOI":"10.1145\/266420.266432"},{"key":"25_CR2","unstructured":"Aredo, D.B., Kristoffersen, T., Mazaher, S.: Abstract Security Requirement Specification. Technical Report DART\/03\/04, Norsk Regnesentral, Oslo, Norway (March 2004)"},{"key":"25_CR3","volume-title":"Proceedings of the Computer Security Foundations Workshop III","author":"P. Bieber","year":"1990","unstructured":"Bieber, P.: A Logic of Communication in a Hostile environment. In: Proceedings of the Computer Security Foundations Workshop III, June 1990, IEEE Computer Society Press, Los Alamitos (1990)"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems\u00a08(1) (February 1990)","DOI":"10.1145\/77648.77649"},{"key":"25_CR5","unstructured":"CASENET, IST project 2001-32446: User Trial Progress Report. Deliverable CASENET\/WP5\/D5.2 (June 2003)"},{"key":"25_CR6","unstructured":"CASENET, IST project IST-2001-32446: http:\/\/www.casenet-eu.org\/"},{"key":"25_CR7","unstructured":"Denker, G., Millen, J., Rues, H.: The CAPSL Integrated Protocol Environment. Technical Report SRI-CSL-2000-02, SRI International, Computer Science Laboratory (October 2000)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Higginbotham, M.D., Maley, J.G., Milheizler, A.J., Suskie, B.j.: Integrating Information Security Engineering with System Engineering with System Engineering Tools. In: Proceedings of WETICE 1998 (July 1998)","DOI":"10.1109\/ENABL.1998.725712"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. Jurjens","year":"2002","unstructured":"Jurjens, J.: UMLsec: Extending UML for Secure Systems Development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, p. 412. Springer, Heidelberg (2002)"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, p. 426. Springer, Heidelberg (2002)"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"G. Lowe","year":"1996","unstructured":"Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In: Brinksma, E., Steffen, B., Cleaveland, W.R., Larsen, K.G., Margaria, T. (eds.) TACAS 1995. LNCS, vol.\u00a01019, Springer, Heidelberg (1996)"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Meadows, C., Syverson, P.: A Formal Language for Cryptographic Protocol Requirements. Designs, Codes and Cryptography\u00a07(1-2) (January 1996)","DOI":"10.1007\/BF00125075"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Programming\u00a026(2) (1996)","DOI":"10.1016\/0743-1066(95)00095-X"},{"key":"25_CR14","volume-title":"Proceedings of the Computer Security Foundations Workshop II","author":"L. Moser","year":"1989","unstructured":"Moser, L.: A Logic of Knowledge and Belief for Reasoning about Computer Security. In: Proceedings of the Computer Security Foundations Workshop II, June 1989, IEEE Computer Society Press, Los Alamitos (1989)"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45017-3_7","volume-title":"Advanced Information Systems Engineering","author":"H. Mouratidis","year":"2003","unstructured":"Mouratidis, H., Giorgini, P., Manson, G.: Integrating Security and Systems Engineering: Towards the Modeling of Secure Information Systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol.\u00a02681, Springer, Heidelberg (2003)"},{"key":"25_CR16","unstructured":"OMG: The Unified Modeling Language Specification V1.5., Object Management Group, Needham, MA, U.S.A.\u201d (March 2003)"},{"key":"25_CR17","unstructured":"OMG, http:\/\/www.omg.org\/technology\/documents\/modeling_spec_catalog.htm"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Shroff, M., France, R.: Towards a Formalization of UML Class Structures in Z. In: Proceedings of COMPSAC 1997 (August 1997)","DOI":"10.1109\/CMPSAC.1997.625087"},{"key":"25_CR19","volume-title":"Proceedings of the Computer Security Foundations Workshop III","author":"P. Syverson","year":"1990","unstructured":"Syverson, P.: Formal Semantics of Logics of Cryptographic Protocols. In: Proceedings of the Computer Security Foundations Workshop III, June 1990, IEEE Computer Society Press, Los Alamitos (1990)"},{"key":"25_CR20","volume-title":"Trusted Information, The New Decade Challenge, Proceedings of the IFIP 16th International Conference on Information Security (Sec 2001)","author":"G. Wimmel","year":"2001","unstructured":"Wimmel, G., Wi\u00dfpeintner, A.: Extended Description Techniques for Security Engineering. In: Dupuy, M., Paradinas, P. (eds.) Trusted Information, The New Decade Challenge, Proceedings of the IFIP 16th International Conference on Information Security (Sec 2001), Kluwer Academic Publishers, Dordrecht (2001)"}],"container-title":["Lecture Notes in Computer Science","&lt;\u2009&lt;UML&gt;\u2009&gt; 2004 - The Unified Modeling Language. Modelling Languages and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30187-5_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:46:25Z","timestamp":1605761185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30187-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540233077","9783540301875"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30187-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}