{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:19:40Z","timestamp":1743034780902,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642001987"},{"type":"electronic","value":"9783642001994"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00199-4_5","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T09:26:36Z","timestamp":1238059596000},"page":"43-59","source":"Crossref","is-referenced-by-count":2,"title":["Pattern-Based Confidentiality-Preserving Refinement"],"prefix":"10.1007","author":[{"given":"Holger","family":"Schmidt","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-540-24747-0_27","volume-title":"Trust Management","author":"C. Haley","year":"2004","unstructured":"Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Picking battles: The impact of trust assumptions on the elaboration of security requirements. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 347\u2013354. Springer, Heidelberg (2004)"},{"issue":"1","key":"5_CR2","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"C.B. Haley","year":"2008","unstructured":"Haley, C.B., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering: A framework for representation and analysis. IEEE Transactions on Software Engineering\u00a034(1), 133\u2013153 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5_CR3","unstructured":"Haley, C.B., Moffett, J.D., Laney, R., Nuseibeh, B.: Arguing security: Validating security requirements using structured argumentation. In: Proceedings of the 3rd Symposium on Requirements Engineering for Information Security (SREIS 2005) held in conjunction with the 13th International Requirements Engineering Conference (RE 2005) (2005)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/11766155_17","volume-title":"Emerging Trends in Information and Communication Security","author":"D. Hatebur","year":"2006","unstructured":"Hatebur, D., Heisel, M., Schmidt, H.: Security engineering using problem frames. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 238\u2013253. Springer, Heidelberg (2006)"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/ARES.2007.12","volume-title":"Proceedings of the International Conference on Availability, Reliability and Security (AReS)","author":"D. Hatebur","year":"2007","unstructured":"Hatebur, D., Heisel, M., Schmidt, H.: A pattern system for security requirements engineering. In: Proceedings of the International Conference on Availability, Reliability and Security (AReS), pp. 356\u2013365. IEEE, Los Alamitos (2007)"},{"key":"5_CR6","first-page":"734","volume-title":"Proceedings of the International Workshop on Secure Systems Methodologies using Patterns (SPatterns)","author":"D. Hatebur","year":"2007","unstructured":"Hatebur, D., Heisel, M., Schmidt, H.: A security engineering process based on patterns. In: Proceedings of the International Workshop on Secure Systems Methodologies using Patterns (SPatterns), pp. 734\u2013738. IEEE, Los Alamitos (2007)"},{"key":"5_CR7","series-title":"IEEE Transactions","first-page":"195","volume-title":"Proceedings of the International Conference on Availability, Reliability and Security (AReS)","author":"D. Hatebur","year":"2008","unstructured":"Hatebur, D., Heisel, M., Schmidt, H.: Analysis and component-based realization of security requirements. In: Proceedings of the International Conference on Availability, Reliability and Security (AReS). IEEE Transactions, pp. 195\u2013203. IEEE, Los Alamitos (2008)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-87875-9_5","volume-title":"Model Driven Engineering Languages and Systems","author":"D. Hatebur","year":"2008","unstructured":"Hatebur, D., Heisel, M., Schmidt, H.: A formal metamodel for problem frames. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V\u00f6lter, M. (eds.) MODELS 2008. LNCS, vol.\u00a05301, pp. 68\u201382. Springer, Heidelberg (2008)"},{"key":"5_CR9","volume-title":"Communicating Sequential Processes","author":"C.A.R. Hoare","year":"1986","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall, Englewood Cliffs (1986)"},{"key":"5_CR10","unstructured":"Jackson, D.: Micromodels of software: Lightweight modelling and analysis with Alloy, \n                    \n                      http:\/\/softwareabstractions.org\/"},{"key":"5_CR11","volume-title":"Problem Frames. Analyzing and structuring software development problems","author":"M. Jackson","year":"2001","unstructured":"Jackson, M.: Problem Frames. Analyzing and structuring software development problems. Addison-Wesley, Reading (2001)"},{"key":"5_CR12","volume-title":"1st Irish Workshop on Formal Methods: Proceedings, Electronic Workshops in Computing","author":"L. Lai","year":"1997","unstructured":"Lai, L., Lai, L., Sanders, J.W.: A refinement calculus for communicating processes with state. In: 1st Irish Workshop on Formal Methods: Proceedings, Electronic Workshops in Computing. Springer, Heidelberg (1997)"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1145\/1138670.1138681","volume-title":"Proceedings of the International Workshop on Advances and Applications of Problem Frames (IWAAPF 2006)","author":"Z. Li","year":"2006","unstructured":"Li, Z., Hall, J.G., Rapanotti, L.: From requirements to specifications: a formal approach. In: Proceedings of the International Workshop on Advances and Applications of Problem Frames (IWAAPF 2006), pp. 65\u201370. ACM, New York (2006)"},{"key":"5_CR14","unstructured":"F.\u00a0S.\u00a0E. Limited. Failures-divergence refinement, FDR2 (2008)"},{"key":"5_CR15","unstructured":"Mantel, H.: A Uniform Framework for the Formal Specification and Verification of Information Flow Security. PhD thesis, Universit\u00e4t des Saarlandes, Saarbr\u00fccken, Germany (July 2003)"},{"issue":"2","key":"5_CR16","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H. Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure Tropos: A security-oriented extension of the Tropos methodology. International Journal of Software Engineering and Knowledge Engineering\u00a017(2), 285\u2013309 (2007)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Nelson, M., Nelson, T., Alencar, P., Cowan, D.: Exploring problem-frame concerns using formal analysis. In: Proceedings of the International Workshop on Advances and Applications of Problem Frames (IWAAPF 2004), Edinburgh, Scotland, pp. 61\u201368. IET (2004)","DOI":"10.1049\/ic:20040226"},{"issue":"2-4","key":"5_CR18","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.ic.2007.07.008","volume":"206","author":"T. Santen","year":"2008","unstructured":"Santen, T.: Preservation of probabilistic information flow under refinement. Information and Computation\u00a0206(2-4), 213\u2013249 (2008)","journal-title":"Information and Computation"},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/ICSE.2004.1317437","volume-title":"Proceedings of the 26th International Conference on Software Engineering (ICSE)","author":"A. Lamsweerde van","year":"2004","unstructured":"van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proceedings of the 26th International Conference on Software Engineering (ICSE), pp. 148\u2013157. IEEE Computer Society Press, Los Alamitos (2004)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00199-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,29]],"date-time":"2020-01-29T14:15:48Z","timestamp":1580307348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00199-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642001987","9783642001994"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00199-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}