{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T06:16:02Z","timestamp":1738217762397,"version":"3.34.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540789413"},{"type":"electronic","value":"9783540789420"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-78942-0_8","type":"book-chapter","created":{"date-parts":[[2008,4,18]],"date-time":"2008-04-18T06:45:30Z","timestamp":1208501130000},"page":"59-71","source":"Crossref","is-referenced-by-count":10,"title":["Model-Driven Security Engineering of Service Oriented Systems"],"prefix":"10.1007","author":[{"given":"Ruth","family":"Breu","sequence":"first","affiliation":[]},{"given":"Michael","family":"Hafner","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Innerhofer-Oberperfler","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Wozak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"SHVT Manual, Fraunhofer Institute for Secure Telecooperation (2004)"},{"key":"8_CR2","unstructured":"Business Process Modeling Notation (BPMN) Information (2006), Available online: http:\/\/www.bpmn.org"},{"key":"8_CR3","unstructured":"IHE.net: IT Infrastructure Technical Framework (2006), Available online: http:\/\/www.ihe.net"},{"key":"8_CR4","volume-title":"Managing information security risks: the OCTAVE approach","author":"C.J. Alberts","year":"2002","unstructured":"Alberts, C.J., Dorofee, A.J.: Managing information security risks: the OCTAVE approach. Pearson Education, London (2002)"},{"key":"8_CR5","volume-title":"Proc. 8th ACM Symposium on Access Control Models and Technologies","author":"D. Basin","year":"2003","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security for process-oriented systems. In: Proc. 8th ACM Symposium on Access Control Models and Technologies, ACM Press, New York (2003)"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/s10009-007-0045-y","volume":"9","author":"R. Breu","year":"2007","unstructured":"Breu, R., Popp, G., Alam, M.: Model-based development of access policies. Journal for Software Tools and Technology Transfer (STTT) 9, 457\u2013470 (2007)","journal-title":"Journal for Software Tools and Technology Transfer (STTT)"},{"key":"8_CR7","doi-asserted-by":"crossref","first-page":"423","DOI":"10.3233\/JCS-2005-13304","volume":"13","author":"A. Datta","year":"2005","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. Journal of Computer Security 13, 423\u2013482 (2005)","journal-title":"Journal of Computer Security"},{"key":"8_CR8","series-title":"LNCS","volume-title":"iTrust 2005","author":"P. Giorgini","year":"2005","unstructured":"Giorgini, P., et al.: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, Springer, Heidelberg (2005)"},{"key":"8_CR9","unstructured":"Federal Office for Information Security (BSI). IT Baseline Protection Manual (2003), Available online: http:\/\/www.bsi.bund.de\/english\/gshb\/manual\/index.htm"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Gutierrez, C., Fernandez-Medina, E., Piattini, M.: Security risk analysis in web services systems. In: Proc. SECRYPT 2006, pp. 425\u2013430 (2006)","DOI":"10.5220\/0002105004250430"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Hafner, M., Agreiter, B., Breu, R., Nowak, A.: SECTET \u2014 An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. Journal of Internet Research (2006)","DOI":"10.1108\/10662240610710978"},{"key":"8_CR12","unstructured":"Hailey, C., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering, a framework for representation and analysis. IEEE Transactions on Software Engineering (to appear, 2007)"},{"key":"8_CR13","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2004","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2004)"},{"key":"8_CR14","series-title":"LNCS","first-page":"426","volume-title":"UML 2002","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"issue":"4","key":"8_CR15","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1201\/1086\/44640.13.4.20040901\/83732.7","volume":"13","author":"T.R. Peltier","year":"2004","unstructured":"Peltier, T.R.: Risk analysis and risk management. Information Systems Security 13(4), 44\u201356 (2004)","journal-title":"Information Systems Security"},{"key":"8_CR16","unstructured":"Innerhofer-Oberperfler, F., Breu, R., Yautsiukhin, A.: Quantitative assessment of enterprise security systems (submitted)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Raptis, D., Dimitrakos, T., Gran, B.A., St\u00f8len, K.: The CORAS Approach for Model-based Risk Management applied to e-Commerce Domain. In: Proc. CMS-2002, pp. 169\u2013181 (2002)","DOI":"10.1007\/978-0-387-35612-9_13"},{"key":"8_CR18","series-title":"LNCS","first-page":"32","volume-title":"ER Workshops 2006","author":"A. Rodriguez","year":"2006","unstructured":"Rodriguez, A., Fernandez-Medina, E., Piattini, M.: Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile. In: Roddick, J.F., Benjamins, V.R., Si-said Cherfi, S., Chiang, R., Claramunt, C., Elmasri, R.A., Grandi, F., Han, H., Hepp, M., Lytras, M., Mi\u0161i\u0107, V.B., Poels, G., Song, I.-Y., Trujillo, J., Vangenot, C. (eds.) ER Workshops 2006. LNCS, vol. 4231, pp. 32\u201342. Springer, Heidelberg (2006)"},{"key":"8_CR19","unstructured":"Schabetsberger, T., Ammenwerth,, Breu, R., Hoerbst, A., Goebel, G., Penz, R., Schindelwig, K., Toth, H., Vogl, R., Wozak, F.: E-Health Approach to Link-up Actors in the Health Care System of Austria. Stud. Health Technol. Inform. 124"},{"key":"8_CR20","unstructured":"Service Central de la Securite des Systemes d\u2019Information. Expression of needs and identification of safety objectives (EBIOS) (online, 1997)"},{"key":"8_CR21","unstructured":"Wozak, F., Ammenwerth, E., Breu, M., Penz, R., Schabetsberger, T., Vogl, R., Wurz, M.: Medical Data GRIDs as approach towards secure cross enterprise document sharing (based on IHE XDS). In: Proc. MIE 2006, pp. 377\u2013383 (2006)"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems and e-Business Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78942-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T20:02:57Z","timestamp":1738180977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78942-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540789413","9783540789420"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78942-0_8","relation":{},"ISSN":["1865-1348"],"issn-type":[{"type":"print","value":"1865-1348"}],"subject":[],"published":{"date-parts":[[2008]]}}}