{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:59:00Z","timestamp":1725544740367},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117466"},{"type":"electronic","value":"9783642117473"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11747-3_9","type":"book-chapter","created":{"date-parts":[[2010,1,25]],"date-time":"2010-01-25T01:03:02Z","timestamp":1264381382000},"page":"114-122","source":"Crossref","is-referenced-by-count":13,"title":["Idea: Reusability of Threat Models \u2013 Two Approaches with an Experimental Evaluation"],"prefix":"10.1007","author":[{"given":"Per H\u00e5kon","family":"Meland","sequence":"first","affiliation":[]},{"given":"Inger Anne","family":"T\u00f8ndel","sequence":"additional","affiliation":[]},{"given":"Jostein","family":"Jensen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","volume-title":"Software Security: Building Security In","author":"G. McGraw","year":"2006","unstructured":"McGraw, G.: Software Security: Building Security In. Addison-Wesley, Reading (2006)"},{"issue":"8","key":"9_CR2","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.is.2004.06.002","volume":"30","author":"H. Mouratidis","year":"2005","unstructured":"Mouratidis, H., Giorgini, P., Manson, G.: When security meets software engineering: a case of modelling secure information systems. Information Systems\u00a030(8), 609\u2013629 (2005)","journal-title":"Information Systems"},{"issue":"5","key":"9_CR3","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MSP.2005.119","volume":"3","author":"P. Torr","year":"2005","unstructured":"Torr, P.: Demystifying the threat modeling process. IEEE Security & Privacy\u00a03(5), 66\u201370 (2005)","journal-title":"IEEE Security & Privacy"},{"key":"9_CR4","unstructured":"Schneier, B.: Attack trees. Dr. Dobb\u2019s Journal (1999)"},{"key":"9_CR5","volume-title":"Threat modeling","author":"F. Swiderski","year":"2004","unstructured":"Swiderski, F., Snyder, W.: Threat modeling. Microsoft Press, Redmond (2004)"},{"issue":"1","key":"9_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirements Engineering\u00a010(1), 34\u201344 (2005)","journal-title":"Requirements Engineering"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"C. Haley","year":"2008","unstructured":"Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering: A framework for representation and analysis. IEEE Transactions on Software Engineering\u00a034(1), 133\u2013153 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: IEEE International Conference on Requirements Engineering, pp. 151\u2013161 (2003)","DOI":"10.1109\/ICRE.2003.1232746"},{"issue":"5","key":"9_CR9","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1016\/j.infsof.2008.05.013","volume":"51","author":"A.L. Opdahl","year":"2009","unstructured":"Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Information and Software Technology\u00a051(5), 916\u2013932 (2009)","journal-title":"Information and Software Technology"},{"key":"9_CR10","unstructured":"Sindre, G., Firesmith, D.G., Opdahl, A.L.: A reuse-based approach to determining security requirements. In: Proceedings of the 9th international workshop on requirements engineering: foundation for software quality, REFSQ 2003 (2003)"},{"key":"9_CR11","unstructured":"Diallo, M.H., Romero-Mariona, J., Sim, S.E., Alspaugh, T.A., Richardson, D.J.: A comparative evaluation of three approaches to specifying security requirements. In: 12th Working Conference on Requirements Engineering: foundation for Software Quality, REFSQ 2006 (2006)"},{"issue":"3","key":"9_CR12","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F. Davis","year":"1989","unstructured":"Davis, F.: Perceived usefulness, perceived ease of use, and user acceptance of information technologies. MIS Quarterly\u00a013(3), 319\u2013340 (1989)","journal-title":"MIS Quarterly"},{"key":"9_CR13","unstructured":"Meland, P.H., Spampinato, D.G., Hagen, E., Baadshaug, E.T., Krister, K.M., Vell, K.S.: SeaMonster: Providing tool support for security modeling. In: Norsk informasjonssikkerhetskonferanse, NISK 2008, Tapir (2008)"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1109\/ARES.2009.110","volume-title":"Proceedings of the Fourth International Conference on Availability, Reliability and Security (ARES2009)","author":"P.H. Meland","year":"2009","unstructured":"Meland, P.H., Ardi, S., Jensen, J., Rios, E., Sanchez, T., Shahmehri, N., T\u00f8ndel, I.A.: An architectural foundation for security model sharing and reuse. In: Proceedings of the Fourth International Conference on Availability, Reliability and Security (ARES2009), pp. 823\u2013828. IEEE Computer Society, Los Alamitos (2009)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11747-3_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:57:08Z","timestamp":1619783828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11747-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117466","9783642117473"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11747-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}