{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:59:14Z","timestamp":1725544754226},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117466"},{"type":"electronic","value":"9783642117473"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11747-3_17","type":"book-chapter","created":{"date-parts":[[2010,1,24]],"date-time":"2010-01-24T20:03:02Z","timestamp":1264363382000},"page":"218-230","source":"Crossref","is-referenced-by-count":5,"title":["Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems"],"prefix":"10.1007","author":[{"given":"Albin","family":"Zuccato","sequence":"first","affiliation":[]},{"given":"Nils","family":"Daniels","sequence":"additional","affiliation":[]},{"given":"Cheevarat","family":"Jampathom","sequence":"additional","affiliation":[]},{"given":"Mikael","family":"Nilson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","first-page":"1139","volume-title":"ARES 2008 Proceedings","author":"A. Zuccato","year":"2008","unstructured":"Zuccato, A., Endersz, V., Daniels, N.: Security requirement Engineering at a Telekom Provider. In: Jakoubi, S., Tjoa, S., Weippl, E. (eds.) ARES 2008 Proceedings, pp. 1139\u20131147. IEEE Computer Society, Los Alamitos (2008)"},{"key":"17_CR2","volume-title":"Computer Security: Art and Science","author":"M. Bishop","year":"2003","unstructured":"Bishop, M.: Computer Security: Art and Science. Addison Wesley, Reading (2003)"},{"key":"17_CR3","unstructured":"International Organization for Standardization: ISO\/IEC 15408:2005 - Common Criteria for Information Technology Evaluation (2005)"},{"key":"17_CR4","unstructured":"National Institute of Standards and Technology: Special publications (800 series) (2009), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/PubsSPs.html"},{"issue":"1","key":"17_CR5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/S0167-4048(04)00065-3","volume":"23","author":"A. Zuccato","year":"2004","unstructured":"Zuccato, A.: Holistic security requirement engineering for electronic commerce. Computers & Security\u00a023(1), 63\u201376 (2004)","journal-title":"Computers & Security"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Mead, N., Hough, E., Stehney II, T.: Security Quality Requirements Engineering (SQUARE) Methodology. SEI Technical Report (2005)","DOI":"10.21236\/ADA443493"},{"key":"17_CR7","first-page":"55","volume-title":"Proceeding of the 15th Annual Computer Security Applications Conference","author":"J. McDermott","year":"1999","unstructured":"McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: Proceeding of the 15th Annual Computer Security Applications Conference, pp. 55\u201364. IEEE, Los Alamitos (1999)"},{"issue":"1","key":"17_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering\u00a010(1), 34\u201344 (2005)","journal-title":"Requirements Engineering"},{"key":"17_CR9","unstructured":"International Organization for Standardization: ISO\/IEC 27001:2005, IInformation technology \u2013 Security techniques \u2013 Information security management systems \u2013 Requirements (2005)"},{"key":"17_CR10","unstructured":"International Organization for Standardization: ISO\/IEC 15408-2:1999 Information technology \u2013 Security techniques \u2013 Evaluation criteria for IT security \u2013 Part 2: Security functional requirements (1999)"},{"key":"17_CR11","volume-title":"Security Patterns - Integrating Security and Systems Engineering","author":"M. Schumacher","year":"2006","unstructured":"Schumacher, M., Fernandez-Buglioni, E., abd Frank Buschman, D.H., Sommerlad, P.: Security Patterns - Integrating Security and Systems Engineering. Wiley, Chichester (2006)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Burr, W.E., Dodson, D.F., Polk, W.T.: Electronic Authentication Guideline. NIST Special Publication 800-63 Version 1.0.2, National Institute of Standards and Technology (2006)","DOI":"10.6028\/NIST.SP.800-63v1.0.2"},{"key":"17_CR13","unstructured":"International Organization for Standardization: ISO\/IEC 9000:2000 Quality management systems - Fundamentals and vocabulary (2000)"},{"key":"17_CR14","unstructured":"SSE-CMM Project: Systems Security Engineering Capability Maturity Model. v 3.0 edn. (2003)"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-642-00199-4_16","volume-title":"Engineering Secure Software and Systems","author":"A. Zuccato","year":"2009","unstructured":"Zuccato, A., K\u00f6gler, C.: Functional security testing \u2013 closing the gap between software testing and security testing: A case from a telecom provider. In: Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. LNCS, vol.\u00a05429, pp. 185\u2013194. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11747-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:21:58Z","timestamp":1558272118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11747-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117466","9783642117473"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11747-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}