{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T05:23:41Z","timestamp":1772342621927,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642246050","type":"print"},{"value":"9783642246067","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24606-7_5","type":"book-chapter","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T01:19:30Z","timestamp":1319505570000},"page":"47-61","source":"Crossref","is-referenced-by-count":16,"title":["Establishing Regulatory Compliance for Software Requirements"],"prefix":"10.1007","author":[{"given":"Silvia","family":"Ingolfo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alberto","family":"Siena","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10506-006-9009-x","volume":"14","author":"G. Sartor","year":"2006","unstructured":"Sartor, G.: Fundamental legal concepts: A formal and teleological characterisation. Artificial Intelligence and Law\u00a014, 101\u2013142 (2006)","journal-title":"Artificial Intelligence and Law"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-540-72988-4_16","volume-title":"Advanced Information Systems Engineering","author":"S. Ghanavati","year":"2007","unstructured":"Ghanavati, S., Amyot, D., Peyton, L.: Towards a framework for tracking legal compliance in healthcare. In: Krogstie, J., Opdahl, A.L., Sindre, G. (eds.) CAiSE 2007 and WES 2007. LNCS, vol.\u00a04495, pp. 218\u2013232. Springer, Heidelberg (2007)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Young, J.D., Anton, A.I.: A method for identifying software requirements based on policy commitments. In: IEEE Int. Conf. Req. Eng., pp. 47\u201356 (2010)","DOI":"10.1109\/RE.2010.17"},{"key":"5_CR4","unstructured":"Siena, A.: Engineering law-compliant requirements. The N\u00f2mos framework. PhD thesis, University of Trento, Italy (2010)"},{"key":"5_CR5","unstructured":"Yu, E.: Modelling Strategic Relationships for Process Reengineering. PhD thesis, University of Toronto, Canada (1995)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Hohfeld, W.N.: Fundamental Legal Conceptions as Applied in Judicial Reasoning. Yale Law Journal\u00a023(1) (1913)","DOI":"10.2307\/785533"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Jureta, I., Mylopoulos, J., Faulkner, S.: Analysis of multi-party agreement in requirements validation. In: IEEE Int. Conf. Req. Eng., pp. 57\u201366 (2009)","DOI":"10.1109\/RE.2009.8"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Ingolfo, S.: Establishing compliance of software requirements through argumentation, Master\u2019s thesis, University of Trento, Italy (2010)","DOI":"10.1007\/978-3-642-24606-7_5"},{"issue":"6","key":"5_CR9","doi-asserted-by":"publisher","first-page":"1823","DOI":"10.2307\/3481436","volume":"90","author":"A.T. Guzman","year":"2002","unstructured":"Guzman, A.T.: A compliance-based theory of international law. California Law Review\u00a090(6), 1823\u20131887 (2002)","journal-title":"California Law Review"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Maxwell, J., Anton, A.: Checking existing requirements for compliance with law using a production rule model. In: Second International Workshop on Requirements Engineering and Law (RELAW), pp. 1\u20136 (2009)","DOI":"10.1109\/RELAW.2009.3"},{"key":"5_CR11","first-page":"33","volume-title":"Using goal-oriented requirements engineering for improving the quality of iso\/iec 15504 based compliance assessment frameworks","author":"A. Rifaut","year":"2008","unstructured":"Rifaut, A., Dubois, E.: Using goal-oriented requirements engineering for improving the quality of iso\/iec 15504 based compliance assessment frameworks, pp. 33\u201342. IEEE Computer Society, Los Alamitos (2008)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Robinson, W.N.: Implementing rule-based monitors within a framework for continuous requirements monitoring. In: Hawaii International Conference on System Sciences, vol.\u00a07, p. 188a (2005)","DOI":"10.1109\/HICSS.2005.306"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/978-3-540-76292-8_36","volume-title":"Advances in Conceptual Modeling \u2013 Foundations and Applications","author":"I. Habli","year":"2007","unstructured":"Habli, I., Wu, W., Attwood, K., Kelly, T.: Extending argumentation to goal-oriented requirements engineering. In: Hainaut, J.-L., Rundensteiner, E.A., Kirchberg, M., Bertolotto, M., Brochhausen, M., Chen, Y.-P.P., Cherfi, S.S.-S., Doerr, M., Han, H., Hartmann, S., Parsons, J., Poels, G., Rolland, C., Trujillo, J., Yu, E., Zim\u00e1nyie, E. (eds.) ER Workshops 2007. LNCS, vol.\u00a04802, pp. 306\u2013316. Springer, Heidelberg (2007)"},{"key":"5_CR14","unstructured":"Haley, C.B., Moffett, J.D., Laney, R., Nuseibeh, B.: Arguing security: validating security requirements using structured argumentation. In: SREIS 2005 (2005)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Ghetiu, T., Polac, F., Bown, J.: Argument-driven validation of computer simulations - a necessity, rather than an option. In: Advances in System Testing and Validation Lifecycle (VALID), pp. 1\u20134 (August 2010)","DOI":"10.1109\/VALID.2010.30"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling \u2013 ER 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24606-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T07:08:20Z","timestamp":1741849700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24606-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642246050","9783642246067"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24606-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}