{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:39:26Z","timestamp":1743086366947,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642247545"},{"type":"electronic","value":"9783642247552"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24755-2_12","type":"book-chapter","created":{"date-parts":[[2011,9,29]],"date-time":"2011-09-29T11:06:44Z","timestamp":1317294404000},"page":"134-143","source":"Crossref","is-referenced-by-count":0,"title":["Orchestrating Security and System Engineering for Evolving Systems"],"prefix":"10.1007","author":[{"given":"Fabio","family":"Massacci","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fabrice","family":"Bouquet","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elizabeta","family":"Fourneret","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jan","family":"Jurjens","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mass S.","family":"Lund","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S\u00e9bastien","family":"Madel\u00e9nat","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"JanTobias","family":"Muehlberg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Federica","family":"Paci","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"St\u00e9phane","family":"Paul","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bjornar","family":"Solhaug","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sven","family":"Wenzel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"3","key":"12_CR1","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/s10270-011-0197-9","volume":"11","author":"G\u00e1bor Bergmann","year":"2011","unstructured":"Bergmann, G., et al.: Change-Driven Model Transformations. Change (in) the Rule to Rule the Change. In: Software and System Modeling (to appear, 2011)","journal-title":"Software & Systems Modeling"},{"key":"12_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-642-16145-2_6","volume-title":"Model Driven Engineering Languages and Systems","author":"G. Bergmann","year":"2010","unstructured":"Bergmann, G., Horv\u00e1th, \u00c1., R\u00e1th, I., Varr\u00f3, D., Balogh, A., Balogh, Z., \u00d6kr\u00f6s, A.: Incremental evaluation of model queries over EMF models. In: Petriu, D.C., Rouquette, N., Haugen, \u00d8. (eds.) MODELS 2010. LNCS, vol.\u00a06394, pp. 76\u201390. Springer, Heidelberg (2010)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Breu, M., Breu, R., L\u00f6w, S.: Living on the MoVE: Towards an Architecture for a Living Models Infrastructure. International Journal on Advances in Software, 290\u2013295 (2010)","DOI":"10.1109\/ICSEA.2010.51"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MISE.2009.5069890","volume-title":"Proc. of the ICSE Workshop on Modeling in Software Engineering (MISE 2009)","author":"M. Chechik","year":"2009","unstructured":"Chechik, M., et al.: Relationship-based change propagation: A case study. In: Proc. of the ICSE Workshop on Modeling in Software Engineering (MISE 2009), pp. 7\u201312. IEEE, Los Alamitos (2009)"},{"issue":"7","key":"12_CR5","doi-asserted-by":"publisher","first-page":"1152","DOI":"10.1016\/j.infsof.2008.01.010","volume":"51","author":"B. Win De","year":"2009","unstructured":"De Win, B., et al.: On the secure software development process: CLASP, SDL and Touchpoints compared. Information and Software Technology\u00a051(7), 1152\u20131171 (2009)","journal-title":"Information and Software Technology"},{"key":"12_CR6","unstructured":"Deliverable 3.2 \u201cA Methodology for Evolutionary Requirements\u201d, http:\/\/www.securechange.eu"},{"key":"12_CR7","unstructured":"DOORS, http:\/\/www-01.ibm.com\/software\/awdtools\/doors\/"},{"key":"12_CR8","volume-title":"Proc. of IEEE Policy 2011","author":"N. Dragoni","year":"2011","unstructured":"Dragoni, N., et al.: A Load Time Policy Checker for Open Multi-Application Smart Cards. In: Proc. of IEEE Policy 2011. IEEE, Los Alamitos (2011)"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s00766-009-0090-z","volume":"15","author":"G. Elahi","year":"2010","unstructured":"Elahi, G., Yu, E., Zannone, N.: A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities. Requirements Engineering\u00a015, 41\u201362 (2010)","journal-title":"Requirements Engineering"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"F\u00e9lix, E., Delande, O., Massacci, F., Paci, F.: Managing Changes with Legacy Security Engineering Processes. In: Proc. of IEEE Int. Conf. on Intelligence and Security Informatics (2011)","DOI":"10.1109\/ISI.2011.5984064"},{"key":"12_CR11","volume-title":"Proc. of 1st Int. Workshop on Regression Testing","author":"E. Fourneret","year":"2011","unstructured":"Fourneret, E., et al.: Selective Test Generation Method for Evolving Critical Systems. In: Proc. of 1st Int. Workshop on Regression Testing. IEEE, Los Alamitos (2011)"},{"key":"12_CR12","volume-title":"Proc. of ARES 2011","author":"E. Fourneret","year":"2011","unstructured":"Fourneret, E., et al.: Model-Based Security Verification and Testing for Smart-cards. In: Proc. of ARES 2011. IEEE, Los Alamitos (2011)"},{"issue":"4","key":"12_CR13","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10207-006-0005-7","volume":"5","author":"P. Giorgini","year":"2006","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering for trust management: model, methodology, and reasoning. Internat. Journal of Information Security\u00a05(4), 257\u2013274 (2006)","journal-title":"Internat. Journal of Information Security"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"C. Haley","year":"2008","unstructured":"Haley, C., Laney, R., Moffett, J., Nuseibeh, B.: Security requirements engineering: A framework for representation and analysis. IEEE Trans. Softw. Eng.\u00a034, 133\u2013153 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"12_CR15","first-page":"81","volume-title":"Proc. of the 8th Intl. Workshop on Principles of Software Evolution","author":"J. Hassine","year":"2005","unstructured":"Hassine, J., Rilling, J., Hewitt, J.: Change impact analysis for requirement evolution using use case maps. In: Proc. of the 8th Intl. Workshop on Principles of Software Evolution, pp. 81\u201390. IEEE, Los Alamitos (2005)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Innerhofer-Oberperfler, F., Hafner, M., Breu, R.: Living Security \u2013 Collaborative Security Management in a Changing World. In: Proc. of IASTED Int. Conf. on Soft. Eng. (2011)","DOI":"10.2316\/P.2011.720-006"},{"key":"12_CR17","unstructured":"ISO 12207, Systems and software engineering \u2014 Software life cycle processes, ISO (2008)"},{"key":"12_CR18","unstructured":"ISO 15288, Systems and software engineering \u2014 System life cycle processes, ISO (2008)"},{"key":"12_CR19","unstructured":"ISO 31000, Risk management \u2013 Principles and guidelines, ISO (2009)"},{"key":"12_CR20","first-page":"271","volume-title":"Proc. of POPL 2011","author":"B. Jacobs","year":"2011","unstructured":"Jacobs, B., Piessens, F.: Expressive modular fine-grained concurrency specification. In: Proc. of POPL 2011, pp. 271\u2013282. ACM, New York (2011)"},{"key":"12_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-17164-2_21","volume-title":"Programming Languages and Systems","author":"B. Jacobs","year":"2010","unstructured":"Jacobs, B., Smans, J., Piessens, F.: A quick tour of the VeriFast program verifier. In: Ueda, K. (ed.) APLAS 2010. LNCS, vol.\u00a06461, pp. 304\u2013311. Springer, Heidelberg (2010)"},{"key":"12_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-21470-7_5","volume-title":"Modelling Foundations and Applications","author":"J. J\u00fcrjens","year":"2011","unstructured":"J\u00fcrjens, J., Marchal, L., Ochoa, M., Schmidt, H.: Incremental security verification for evolving uMLsec models. In: France, R.B., Kuester, J.M., Bordbar, B., Paige, R.F. (eds.) ECMFA 2011. LNCS, vol.\u00a06698, pp. 52\u201368. Springer, Heidelberg (2011)"},{"key":"12_CR23","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)"},{"key":"12_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12323-8","volume-title":"Model-Driven Risk Analysis \u2013 The CORAS Approach","author":"M.S. Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis \u2013 The CORAS Approach. Springer, Heidelberg (2011)"},{"key":"12_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-23082-0_9","volume-title":"Foundations of Security Analysis and Design VI","author":"M.S. Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Risk Analysis of Changing and Evolving Systems Using CORAS. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2011. LNCS, vol.\u00a06858, pp. 231\u2013274. Springer, Heidelberg (2011)"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Massacci, F., Mylopolous, J., Paci, F., Tun, T.T., Yu, Y.: An Extended Ontology for Security Requirements. In: 1st Internat. Workshop on Information Systems Security Engineering (WISSE 2011), London (2011)","DOI":"10.1007\/978-3-642-22056-2_64"},{"key":"12_CR27","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10515-007-0013-5","volume":"14","author":"F. Massacci","year":"2007","unstructured":"Massacci, F., Mylopoulos, J., Zannone, N.: Computer-aided support for Secure Tropos. Automated Software Eng.\u00a014, 341\u2013364 (2007)","journal-title":"Automated Software Eng."},{"key":"12_CR28","unstructured":"Normand, V., F\u00e9lix, E.: Toward model-based security engineering: developing a security analysis DSML. In: Proc. of ECMDA-FA (2009)"},{"key":"12_CR29","unstructured":"Philippaerts, P., et al.: The Belgian Electronic Identity Card: A Verification Case Study. In: Proc. AVOCS 2011 (2011) (submitted)"},{"key":"12_CR30","unstructured":"System Security Eng. Capability Maturity Model, http:\/\/www.sse-cmm.org\/index.html"},{"key":"12_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-21640-4_7","volume-title":"Advanced Information Systems Engineering","author":"M.S. Tran","year":"2011","unstructured":"Tran, M.S., Massacci, F.: Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution. In: Mouratidis, H., Rolland, C. (eds.) CAiSE 2011. LNCS, vol.\u00a06741, pp. 62\u201376. Springer, Heidelberg (2011)"},{"key":"12_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-02050-6_7","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"T.T. Tun","year":"2009","unstructured":"Tun, T.T., Yu, Y., Laney, R., Nuseibeh, B.: Early identification of problem interactions: A tool-supported approach. In: Glinz, M., Heymans, P. (eds.) REFSQ 2009 Amsterdam. LNCS, vol.\u00a05512, pp. 74\u201388. Springer, Heidelberg (2009)"},{"key":"12_CR33","first-page":"88","volume-title":"Proc. of the IEEE SSIRI 2010","author":"T.T. Tun","year":"2010","unstructured":"Tun, T.T., et al.: Model-based argument analysis for evolving security requirements. In: Proc. of the IEEE SSIRI 2010, pp. 88\u201397. IEEE, Los Alamitos (2010)"},{"key":"12_CR34","first-page":"148","volume-title":"Proc. of ICSE 2004","author":"A. Lamsweerde van","year":"2004","unstructured":"van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proc. of ICSE 2004, pp. 148\u2013157. ACM, New York (2004)"},{"key":"12_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-21461-5_21","volume-title":"Formal Techniques for Distributed Systems","author":"F. Vogels","year":"2011","unstructured":"Vogels, F., Jacobs, B., Piessens, F., Smans, J.: Annotation inference for separation logic based verifiers. In: Bruni, R., Dingel, J. (eds.) FORTE 2011 and FMOODS 2011. LNCS, vol.\u00a06722, pp. 319\u2013333. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Towards a Service-Based Internet"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24755-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T14:58:53Z","timestamp":1560697133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24755-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642247545","9783642247552"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24755-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}