{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:03:12Z","timestamp":1725487392021},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540725879"},{"type":"electronic","value":"9783540725886"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-72588-6_141","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T14:35:23Z","timestamp":1184596523000},"page":"890-893","source":"Crossref","is-referenced-by-count":2,"title":["A Security Specification Library with a Schemaless Database"],"prefix":"10.1007","author":[{"given":"Shoichi","family":"Morimoto","sequence":"first","affiliation":[]},{"given":"Jingde","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"141_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"797","DOI":"10.1007\/11758549_107","volume-title":"Computational Science \u2013 ICCS 2006","author":"D. Horie","year":"2006","unstructured":"Horie, D., Morimoto, S., Cheng, J.: A Web User Interface of the Security Requirement Management Database Based on ISO\/IEC 15408. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2006. LNCS, vol.\u00a03994, pp. 797\u2013804. Springer, Heidelberg (2006)"},{"key":"141_CR2","unstructured":"ISO\/IEC 15408 standard: Information Technology - Security Techniques - Evaluation Criteria for IT Security (1999)"},{"key":"141_CR3","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1109\/CIMCA.2005.1631590","volume-title":"Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, vol. 2 (CIMCA-IAWTIC\u201905)","author":"S. Morimoto","year":"2005","unstructured":"Morimoto, S., Cheng, J.: Patterning Protection Profiles by UML for Security Specifications. In: Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, vol. 2 (CIMCA-IAWTIC\u201905), pp. 946\u2013951. IEEE-CS, Los Alamitos (2005)"},{"key":"141_CR4","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Computational Science and Its Applications - ICCSA 2006","author":"S. Morimoto","year":"2006","unstructured":"Morimoto, S., Horie, D., Cheng, J.: A Security Requirement Management Database Based on ISO\/IEC 15408. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Lagan\u00e1, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol.\u00a03982, pp. 1\u201310. Springer, Heidelberg (2006)"},{"key":"141_CR5","doi-asserted-by":"crossref","first-page":"1506","DOI":"10.1145\/1244002.1244325","volume-title":"Proceedings of the 22nd Annual ACM Symposium on Applied Computing (SAC\u201907)","author":"S. Morimoto","year":"2007","unstructured":"Morimoto, S., Shigematsu, S., Goto, Y., Cheng, J.: Formal Verification of Security Specifications with Common Criteria. In: Proceedings of the 22nd Annual ACM Symposium on Applied Computing (SAC\u201907), pp. 1506\u20131512. ACM, New York (2007)"},{"key":"141_CR6","unstructured":"World Wide Web Consortium: XQuery 1.0 and XPath 2.0 Formal Semantics, http:\/\/www.w3.org\/TR\/xquery-semantics\/"},{"key":"141_CR7","unstructured":"Xpriori LLC: NeoCore XMS, http:\/\/www.xpriori.com\/"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72588-6_141","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T09:03:05Z","timestamp":1629363785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72588-6_141"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540725879","9783540725886"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72588-6_141","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}