{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:12:02Z","timestamp":1742926322930,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642001987"},{"type":"electronic","value":"9783642001994"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00199-4_10","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T13:26:36Z","timestamp":1238073996000},"page":"111-121","source":"Crossref","is-referenced-by-count":1,"title":["Report: CC-Based Design of Secure Application Systems"],"prefix":"10.1007","author":[{"given":"Robin","family":"Sharp","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Common Criteria for Information Technology Security Evaluation, version 3.1, revision 1. Part 1: Introduction and general model, CCMB-2006-09-001 (September 2006)"},{"key":"10_CR2","unstructured":"Common Criteria for Information Technology Security Evaluation, version 3.1, revision 2. Part 2: Security functional components, CCMB-2007-09-002 (September 2007)"},{"key":"10_CR3","unstructured":"Common Criteria for Information Technology Security Evaluation, version 3.1, revision 2. Part 3: Security assurance components, CCMB-2007-09-003 (September 2007)"},{"key":"10_CR4","unstructured":"Bertoa, M.F., Troya, J., Vallecilo, A.: A survey on the quality information provided by software component vendors. In: Proc. 7th. ECOOP Workshop on Quantitative Approaches in Object-Oriented Software Engineering (July 2003)"},{"key":"10_CR5","unstructured":"Blakley, B., Heath, C.: Security design patterns. Technical Report G031, The Open Group, Reading, UK (April 2004)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Friis-Jensen, R.: A CC approach to secure workflow systems. Master\u2019s thesis, Informatics and Mathematical Modelling, Technical University of Denmark (February 2007)","DOI":"10.1533\/9780857099419.3.141"},{"key":"10_CR7","unstructured":"Galitzer, S.: Introducing Engineered Composition (EC). In: ACSA Workshop on the Application of Engineering Principles to System Security Design (WAEPSSD) (November 2002)"},{"key":"10_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"10_CR9","unstructured":"Khodaverdi, S., Vohra, V.: A CC approach to windmill control systems. Master\u2019s thesis, Informatics and Mathematical Modelling, Technical University of Denmark (February 2007)"},{"issue":"3","key":"10_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.5381\/jot.2005.4.3.a4","volume":"4","author":"W.J. Lloyd","year":"2005","unstructured":"Lloyd, W.J.: A Common Criteria based approach for COTS component selection. Journal of Object Technology\u00a04(3), 27\u201334 (2005)","journal-title":"Journal of Object Technology"},{"key":"10_CR11","unstructured":"Pedersen, A., Hedegaard, A.: Security in POS systems. Master\u2019s thesis, Informatics and Mathematical Modelling, Technical University of Denmark (August 2005)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Pedersen, A., Hedegaard, A., Sharp, R.: Designing a Secure Point-of-Sale System. In: Proc. 4th IEEE Intl. Workshop on Information Assurance (IWIA 2006), April 2006, pp. 51\u201365 (2006)","DOI":"10.1109\/IWIA.2006.6"},{"key":"10_CR13","unstructured":"Schumacher, M., Roedig, U.: Security engineering with patterns. In: Proc. 8th Conference on Pattern Languages of Programs, Monticello (July 2001)"},{"key":"10_CR14","unstructured":"The RAISE Method Group. The RAISE Development Method. BCS Practitioner Series. Prentice Hall (1995)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Vetterling, M., Wimmel, G., Wisspeintner, A.: Secure systems development based on the Common Criteria: The PalME project. In: Proc. 10th ACM SIGSOFT Symposium on Foundations of Software Engineering, November 2002, pp. 129\u2013138 (2002)","DOI":"10.1145\/587051.587071"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00199-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T18:00:20Z","timestamp":1739037620000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00199-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642001987","9783642001994"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00199-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}