{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:26:58Z","timestamp":1725550018425},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540240754"},{"type":"electronic","value":"9783540305552"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30555-2_32","type":"book-chapter","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T13:35:49Z","timestamp":1268400949000},"page":"273-282","source":"Crossref","is-referenced-by-count":2,"title":["Secure Requirements Elicitation Through Triggered Message Sequence Charts"],"prefix":"10.1007","author":[{"given":"Arnab","family":"Ray","sequence":"first","affiliation":[]},{"given":"Bikram","family":"Sengupta","sequence":"additional","affiliation":[]},{"given":"Rance","family":"Cleaveland","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Message sequence charts (MSC). ITU-TS Recommendation Z.120 (1996)"},{"issue":"7","key":"32_CR2","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Wagner, D.: Static analysis and computer security:new techinques for software assurance. PhD thesis, University of California, Berkeley (2000)","DOI":"10.1007\/3-540-47764-0_25"},{"key":"32_CR4","unstructured":"Fenton, J.S.: Information protection systems. Ph.D thesis, University of Cambridge, England (1973)"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45608-2_1","volume":"2171","author":"P. Ryan","year":"2001","unstructured":"Ryan, P.: Mathematical models of computer security\u2013tutorial lectures. Foundations of Security Analysis and Design\u00a02171, 1\u201362 (2001)","journal-title":"Foundations of Security Analysis and Design"},{"key":"32_CR6","unstructured":"Reniers, M.A.: Message sequence chart: Syntax and semantics. PhD Thesis, Eindhoven University of Technology (1998)"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Focardi, R., Gorrieri, R., Martinelli, F.: Information flow analysis in a discrete-time process algebra. In: IEEE Computer Security Foundations Workshop, pp. 170\u2013184 (2000)","DOI":"10.1109\/CSFW.2000.856935"},{"key":"32_CR8","unstructured":"Ryan, P.: A csp formulation of non-interference and unwinding. Presented at CSFW 1990 and published in Cipher, Winter (1990-1991)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Sengupta, B., Cleaveland, R.: Refinement-based requirements modeling using triggered message sequence charts. In: IEEE International Requirements Engineering Conference (2003)","DOI":"10.1109\/ICRE.2003.1232741"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Sengupta, B.: Triggered message sequence charts. Ph.D Thesis, State University of New York, Stony Brook (2003)","DOI":"10.1007\/978-3-540-45069-6_9"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Sengupta, B., Cleaveland, R.: Triggered message sequence charts. In: Proceedings of ACM SIGSOFT Foundations of Software Engineering, pp. 167\u2013176 (2002)","DOI":"10.1145\/587051.587077"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30555-2_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T23:49:09Z","timestamp":1685490549000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30555-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540240754","9783540305552"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30555-2_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}