{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:27:21Z","timestamp":1725892041124},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540730309"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73031-6_27","type":"book-chapter","created":{"date-parts":[[2007,6,27]],"date-time":"2007-06-27T17:16:22Z","timestamp":1182964582000},"page":"355-366","source":"Crossref","is-referenced-by-count":42,"title":["Mal-Activity Diagrams for Capturing Attacks on Business Processes"],"prefix":"10.1007","author":[{"given":"Guttorm","family":"Sindre","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","first-page":"151","volume-title":"Security and Privacy Requirements Analysis within a Social Setting","author":"L. Liu","year":"2003","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting. 11th International Requirements Engineering Conference (RE\u201903), Monterey Bay, CA, 8-12 September, pp. 151\u2013160. IEEE Press, New York (2003)"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering\u00a010, 34\u201344 (2005)","journal-title":"Requirements Engineering"},{"key":"27_CR3","unstructured":"van Lamsweerde, A., Brohez, S., De Landtsheer, R., Janssens, D.: Froim System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering. In: Heytmeier, C., Mead, N. (eds.) 2nd International Workshop on Requirements Engineering for High Assurance Systems (RHAS\u201903), Carnegie Mellon University, September 8, pp. 49\u201356. Monterey Bay, CA (2003)"},{"key":"27_CR4","unstructured":"Haley, C.B., Moffett, J., Laney, R., Nuseibeh, B.: Arguing Security: Validating Security Requirements Using Structured Argumentation. In: 3rd Symposium on Requirements Engineering for Information Security (SREIS 2005), Paris, France, (August 29, 2005)"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"UML 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"27_CR6","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2004","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2004)"},{"key":"27_CR7","first-page":"120","volume-title":"TOOLS Pacific 2000","author":"G. Sindre","year":"2000","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting Security Requirements by Misuse Cases. In: Henderson-Sellers, B., Meyer, B. (eds.) TOOLS Pacific 2000, Sydney, pp. 120\u2013131. IEEE CS Press, Los Alamitos (2000)"},{"key":"27_CR8","volume-title":"Problem Frames","author":"M. Jackson","year":"2001","unstructured":"Jackson, M.: Problem Frames. Addison-Wesley, London (2001)"},{"key":"27_CR9","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"K.D. Mitnick","year":"2002","unstructured":"Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley Publishing, Inc, Indianapolis (2002)"},{"key":"27_CR10","unstructured":"Lin, L., Nuseibeh, B., Ince, D., Jackson, M.: Using Abuse Frames to Bound the Scope of Security Problems. In: Maiden, N.A.M. (ed.) 12th IEEE International Requirements Engineering Conference (RE\u201904), Kyoto, Japan, IEEE (2004)"},{"key":"27_CR11","unstructured":"Diallo, M.H., Romero-Mariona, J., Sim, S.E., Richardson, D.J.: A Comparative Evaluation of Three Approaches to Specifying Security Requirements. REFSQ\u201906, Luxembourg (2006)"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","first-page":"6","volume-title":"ER 2006 Workshops","author":"A. Rodriguez","year":"2006","unstructured":"Rodriguez, A., Fernandez-Medina, E., Piattini, M.: Capturing Security Requirements in Business Processes through a UML 2. In: Roddick, J.F., Benjamins, V.R., Si-Sa\u00efd Cherfi, S., Chiang, R., Claramunt, C., Elmasri, R., Grandi, F., Han, H., Hepp, M., Lytras, M., Mi\u0161i\u0107, V.B., Poels, G., Song, I.-Y., Trujillo, J., Vangenot, C. (eds.) ER 2006 Workshops. LNCS, vol.\u00a04231, pp. 6\u20139. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73031-6_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:09:57Z","timestamp":1605762597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73031-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540730309"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73031-6_27","relation":{},"subject":[]}}