{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,14]],"date-time":"2025-02-14T05:06:54Z","timestamp":1739509614228,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642049460"},{"type":"electronic","value":"9783642049477"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04947-7_16","type":"book-chapter","created":{"date-parts":[[2009,11,10]],"date-time":"2009-11-10T14:29:52Z","timestamp":1257863392000},"page":"126-136","source":"Crossref","is-referenced-by-count":3,"title":["Applying a UML Extension to Build Use Cases Diagrams in a Secure Mobile Grid Application"],"prefix":"10.1007","author":[{"given":"David G.","family":"Rosado","sequence":"first","affiliation":[]},{"given":"Eduardo","family":"Fern\u00e1ndez-Medina","sequence":"additional","affiliation":[]},{"given":"Javier","family":"L\u00f3pez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Bass, L., Bachmann, F., Ellison, R.J., Moore, A.P., Klein, M.: Security and survivability reasoning frameworks and architectural design tactics. SEI (2004)"},{"key":"16_CR2","unstructured":"Breu, R., Burger, K., Hafner, M., J\u00fcrjens, J., Popp, G., Lotz, V., Wimmel, G.: Key issues of a formally based process model for security engineering. In: International Conference on Software and Systems Engineering and their Applications (2003)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Haley, C.B., Moffet, J.D., Laney, R., Nuseibeh, B.: A framework for security requirements engineering. In: Software Engineering for Secure Systems Workshop, Shangai, China, pp. 35\u201342 (2006)","DOI":"10.1145\/1137627.1137634"},{"key":"16_CR4","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Mouratidis, H., Giorgini, P.: Integrating Security and Software Engineering: Advances and Future Vision. IGI Global (2006)","DOI":"10.4018\/978-1-59904-147-6"},{"key":"16_CR6","volume-title":"The Grid2: Blueprint for a Future Computing Infrastructure","author":"I. Foster","year":"2004","unstructured":"Foster, I., Kesselman, C.: The Grid2: Blueprint for a Future Computing Infrastructure, 2nd edn. Morgan Kaufmann Publishers, San Francisco (2004)","edition":"2"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Rosado, D.G., Fern\u00e1ndez-Medina, E., L\u00f3pez, J., Piattini, M.: Engineering Process Based On Grid Use Cases For Mobile Grid Systems. In: The Third International Conference on Software and Data Technologies- ICSOFT 2008, Porto, Portugal, pp. 146\u2013151 (2008)","DOI":"10.5220\/0001879901460151"},{"key":"16_CR8","volume-title":"International Conference on Availability, Reliability and Security (ARES 2008)","author":"D.G. Rosado","year":"2008","unstructured":"Rosado, D.G., Fern\u00e1ndez-Medina, E., L\u00f3pez, J., Piattini, M.: PSecGCM: Process for the development of Secure Grid Computing based Systems with Mobile devices. In: International Conference on Availability, Reliability and Security (ARES 2008). IEEE Computer Society, Barcelona (2008)"},{"key":"16_CR9","unstructured":"The Object Management Group (OMG): OMG Unified Modeling Language (OMG UML), Version 2.2 (2007), http:\/\/www.omg.org\/spec\/UML\/2.1.2\/Infrastructure\/PDF\/"},{"key":"16_CR10","volume-title":"Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle","author":"I. Alexander","year":"2004","unstructured":"Alexander, I., Maiden, N.: Scenarios, Stories, Use Cases: Through the Systems Development Life-Cycle. John Wiley & Sons, Chichester (2004)"},{"key":"16_CR11","unstructured":"Sindre, G., Opdahl, A.L.: Templates for misuse case description. In: 7th International Workshop on Requirements Engineering: Foundation for Software Quality, Austria (2001)"},{"key":"16_CR12","unstructured":"Sindre, G., Opdahl, A.L.: Capturing Security Requirements by Misuse Cases. In: 14th Norwegian Informatics Conference (NIK 2001), Troms\u00f8, Norway (2001)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Alexander, I.: Misuse Cases: Use Cases with Hostile Intent. IEEE Software, 58\u201366 (2003)","DOI":"10.1109\/MS.2003.1159030"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Firesmith, D.G.: Security Use Cases. Journal of Object Technology, 53\u201364 (2003)","DOI":"10.5381\/jot.2003.2.3.c6"},{"key":"16_CR15","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering Journal\u00a010, 34\u201344 (2005)","journal-title":"Requirements Engineering Journal"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Rosado, D.G., Fern\u00e1ndez-Medina, E., L\u00f3pez, J.: Obtaining Security Requirements for a Mobile Grid System. International Journal of Grid and High Performance Computing (2009) (to be published in April 1, 2009)","DOI":"10.4018\/jghpc.2009070101"},{"key":"16_CR17","unstructured":"Rosado, D.G., Fern\u00e1ndez-Medina, E., L\u00f3pez, J.: Extensi\u00f3n UML para Casos de Uso Reutilizables en entornos Grid M\u00f3viles Seguros. XIV Jornadas de Ingenier\u00eda del Software y Bases de Datos - JISBD 2009, San Sebasti\u00e1n (2009)"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Rosado, D.G., Fern\u00e1ndez-Medina, E., L\u00f3pez, J., Piattini, M.: Towards an UML Extension of Reusable Secure Use Cases for Mobile Grid systems. IEICE Transactions on Information and Systems (2009) (submitted)","DOI":"10.1109\/IWSESS.2009.5068452"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Rosado, D.G., Fern\u00e1ndez-Medina, E., L\u00f3pez, J.: Reusable Security Use Cases for Mobile Grid environments. In: Workshop on Software Engineering for Secure Systems, in conjunction with the 31st International Conference on Software Engineering, Vancouver, Canada, pp. 1\u20138 (2009)","DOI":"10.1109\/IWSESS.2009.5068452"},{"key":"16_CR20","unstructured":"OMG: OMG Unified Modeling Language (OMG UML), Superstructure, V2.1.2 (2007), http:\/\/www.omg.org\/spec\/UML\/2.1.2\/Infrastructure\/PDF\/"},{"key":"16_CR21","unstructured":"R\u00f8stad, L.: An extended misuse case notation: Including vulnerabilities and the insider threat. In: XII Working Conference on Requirements Engineering: Foundation for Software Quality, Luxembourg (2006)"}],"container-title":["Lecture Notes in Computer Science","Advances in Conceptual Modeling - Challenging Perspectives"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04947-7_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T04:49:27Z","timestamp":1739422167000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04947-7_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642049460","9783642049477"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04947-7_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}