{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:23Z","timestamp":1725558983352},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_4","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:15:56Z","timestamp":1278882956000},"page":"31-45","source":"Crossref","is-referenced-by-count":2,"title":["\u201cDevices Are People Too\u201d Using Process Patterns to Elicit Security Requirements in Novel Domains: A Ubiquitous Healthcare Example"],"prefix":"10.1007","author":[{"given":"Yang","family":"Liu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John A.","family":"Clark","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Susan","family":"Stepney","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","volume-title":"Patterns for Effective Use Cases","author":"S. Adolph","year":"2003","unstructured":"Adolph, S., Bramble, P., Cockburn, A., Pols, A.: Patterns for Effective Use Cases. Addison-Wesley, Reading (2003)"},{"key":"4_CR2","volume-title":"A Pattern Language: towns, buildings, construction.","author":"C. Alexander","year":"1977","unstructured":"Alexander, C., et al.: A Pattern Language: towns, buildings, construction. OUP (1977)"},{"key":"4_CR3","unstructured":"Anderson, R.J.: Security in Clinical Information Systems (January 1996). British Medical Association,(1996)"},{"key":"4_CR4","unstructured":"Anderson, R.J.: An Update on the BMA Security Policy (1996), Available from http:\/\/www.cl.cam.ac.uk\/users\/rja14\/bmaupdate\/bmaupdate.html"},{"key":"4_CR5","unstructured":"Bardram, J.E.: Hospitals of the Future \u2013 ubiquitous computing support for medical work in hospitals. In: Proc. Second Ubiquitous Healthcare Computing (2003)"},{"key":"4_CR6","volume-title":"Smalltalk Best Practice Patterns","author":"K. Beck","year":"1997","unstructured":"Beck, K.: Smalltalk Best Practice Patterns. Prentice Hall, Englewood Cliffs (1997)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Bohn, J., Gartner, F., Vogt, H.: Dependability Issues of Pervasive Computing in a Healthcare Environment. In: Proc. First International Security in Pervasive Computing (2003)","DOI":"10.1007\/978-3-540-39881-3_8"},{"key":"4_CR8","volume-title":"AntiPatterns","author":"W.J. Brown","year":"1998","unstructured":"Brown, W.J., et al.: AntiPatterns. Wiley, Chichester (1998)"},{"key":"4_CR9","volume-title":"Writing Effective Use Cases","author":"A. Cockburn","year":"2001","unstructured":"Cockburn, A.: Writing Effective Use Cases. Addison-Wesley, Reading (2001)"},{"key":"4_CR10","volume-title":"Pattern Languages of Program Design","author":"J.O. Coplien","year":"1995","unstructured":"Coplien, J.O.: A generative development-process pattern language. In: Coplien, J.O., Schmidt, D.C. (eds.) Pattern Languages of Program Design. Addison-Wesley, Reading (1995)"},{"key":"4_CR11","volume-title":"Analysis Patterns","author":"M. Fowler","year":"1997","unstructured":"Fowler, M.: Analysis Patterns. Addison-Wesley, Reading (1997)"},{"key":"4_CR12","volume-title":"Design Patterns","author":"E. Gamma","year":"1995","unstructured":"Gamma, E., et al.: Design Patterns. Addison-Wesley, Reading (1995)"},{"key":"4_CR13","volume-title":"Problem Frames.","author":"M. Jackson","year":"2001","unstructured":"Jackson, M.: Problem Frames. Addison Wesley, Reading (2001)"},{"key":"4_CR14","unstructured":"Liu, Y.: Security in Ubiquitous Healthcare Systems. MSc thesis, Dept Computer Science, University of York, UK (2004)"},{"key":"4_CR15","unstructured":"The Open Group. Guide to Security Patterns, Draft 1 (April 2002)"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-44880-2_2","volume-title":"ZB 2003: Formal Specification and Development in Z and B","author":"S. Stepney","year":"2003","unstructured":"Stepney, S., Polack, F., Toyn, I.: An Outline Pattern Language for Z. In: Bert, D., P. Bowen, J., King, S., et al. (eds.) ZB 2003. LNCS, vol.\u00a02651, pp. 2\u201319. Springer, Heidelberg (2003)"},{"key":"4_CR17","unstructured":"Vaclav, J.M.: Protecting Doctors\u2019 Identity in Drug Prescription Analysis. Health Informatics Journal (December1998)"},{"key":"4_CR18","unstructured":"Medieval Theories of Analogy. Entry in Stanford Encyclopedia of Philosophy, http:\/\/plato.stanford.edu\/entries\/analogy-medieval\/#3"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-540-30144-8_35","volume-title":"Information Security","author":"T. Srivatanakul","year":"2004","unstructured":"Srivatanakul, T., Clark, J.A., Polack, F.A.C.: Effective Security Requirements Analysis: HAZOP and Use Cases. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 416\u2013427. Springer, Heidelberg (2004)"},{"key":"4_CR20","unstructured":"Srivratanakul, J., Clark, J., Polack, F., Stepney, S.: Challenging Formal Specifications with Mutation: A CSP Security Example. In: Proceedings of the 12th IEEE Asia Pacific Software Engineering Conference, APSEC (2003)"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:33:55Z","timestamp":1605760435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}