{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T04:32:19Z","timestamp":1742358739916,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272127"},{"type":"electronic","value":"9783642272134"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27213-4_15","type":"book-chapter","created":{"date-parts":[[2012,1,12]],"date-time":"2012-01-12T00:55:51Z","timestamp":1326329751000},"page":"217-229","source":"Crossref","is-referenced-by-count":0,"title":["Quality Needs Structure: Industrial Experiences in Systematically Defining Software Security Requirements"],"prefix":"10.1007","author":[{"given":"Christian","family":"Fr\u00fchwirth","sequence":"first","affiliation":[]},{"given":"Richard","family":"Mordinyi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Biffl, S., Mordinyi, R., Moser, T.: Automated Derivation of Configurations for the Integration of Software(+) Engineering Environments. Paper presented at the 1st International Workshop on Automated Configuration and Tailoring of Applications, ACoTA 2010 (2010)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Fruehwirth, C., Biffl, S., Tabatabai, M., Weippl, E.: Addressing misalignment between information security metrics and business-driven security objectives. Paper presented at the Proceedings of the 6th International Workshop on Security Measurements and Metrics, Bolzano, Italy (2010)","DOI":"10.1145\/1853919.1853927"},{"key":"15_CR3","unstructured":"Fr\u00fchwirth, C., Biffl, S., Schatten, A., Schrittwieser, S., Weippl, E., Sunindyo, W.: Research Challenges in the Security Design and Evaluation of an Engineering Service Bus Platform. Paper presented at the 36th EUROMICRO Conference on Software Engineering and Advanced Applications (SEAA), Lille, France (2010)"},{"key":"15_CR4","unstructured":"Fr\u00fchwirth, C., Mordinyi, R., Biffl, S.: Systematic Definition of Security Requirements by means of Misuse Cases in Multi-Engineering Domains, Christian Doppler Laboratory, Vienna University of Technology (2011), http:\/\/cdl.ifs.tuwien.ac.at\/techrep\/icgse"},{"key":"15_CR5","unstructured":"Harris, S.: CISSP All-in-One Exam Guide. McGraw-Hill (2008)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Herbsleb, J.D.: Global Software Engineering: The Future of Socio-technical Coordination. Paper presented at the 2007 Future of Software Engineering (2007)","DOI":"10.1109\/FOSE.2007.11"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Kang, M.H., Park, J.S., Froscher, J.N.: Access control mechanisms for inter-organizational workflow. Paper presented at the Proceedings of the sixth ACM Symposium on Access Control Models and Technologies, Chantilly, Virginia, United States (2001)","DOI":"10.1145\/373256.373266"},{"issue":"2","key":"15_CR8","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MSP.2006.35","volume":"4","author":"F. Keblawi","year":"2006","unstructured":"Keblawi, F., Sullivan, D.: Applying the Common Criteria in Systems Engineering. IEEE Security and Privacy\u00a04(2), 50\u201355 (2006), doi:10.1109\/msp.2006.35","journal-title":"IEEE Security and Privacy"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Long, D.L., Baker, J., Fung, F.: A prototype secure workflow server. In: Proceedings of 15th Annual Computer Security Applications Conference (ACSAC 1999), pp. 129\u2013133 (1999)","DOI":"10.1109\/CSAC.1999.816020"},{"issue":"2","key":"15_CR10","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.csi.2006.04.002","volume":"29","author":"D. Mellado","year":"2007","unstructured":"Mellado, D., Fern, E., Medina, N., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Comput Stand Interfaces\u00a029(2), 244\u2013253 (2007), doi:10.1016\/j.csi.2006.04.002","journal-title":"Comput Stand Interfaces"},{"key":"15_CR11","unstructured":"Mordinyi, R., Moser, T., Biffl, S., Dhungana, D.: Flexible Support for Adaptable Software and Systems Engineering Processes. Paper presented at the Proceedings of the 23rd International Conference on Software Engineering and Knowledge Engineering (SEKE 2011), USA (2011)"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Moser, T., Biffl, S.: Semantic Tool Interoperability for Engineering Manufacturing Systems. Paper presented at the 15th IEEE International Conference on Emerging Techonologies and Factory Automation (ETFA 2010) (2010)","DOI":"10.1109\/ETFA.2010.5641343"},{"key":"15_CR13","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/978-1-4419-7335-1_6","volume-title":"Canadian Semantic Web: Technologies and Applications","author":"T. Moser","year":"2010","unstructured":"Moser, T., Mordinyi, R., Sunindyo, W.D., Biffl, S.: Semantic Service Matchmaking in the ATM Domain Considering Infrastructure Capability Constraints. In: Du, W., Ensan, F. (eds.) Canadian Semantic Web: Technologies and Applications, pp. 133\u2013157. Springer, Heidelberg (2010)"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/978-3-540-68914-0_11","volume-title":"Applied Cryptography and Network Security","author":"M. Mut-Puigserver","year":"2008","unstructured":"Mut-Puigserver, M., Payeras-Capell\u00e0, M.M., Ferrer-Gomila, J.L., Huguet-Rotger, L.: Replay Attack in a Fair Exchange Protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 174\u2013187. Springer, Heidelberg (2008)"},{"key":"15_CR15","unstructured":"Systems Security Engineers - Capability Maturity Model, http:\/\/www.sse-cmm.org\/index.html"},{"issue":"1","key":"15_CR16","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MS.2008.19","volume":"25","author":"I.A. Tondel","year":"2008","unstructured":"Tondel, I.A., Jaatun, M.G., Meland, P.H.: Security Requirements for the Rest of Us: A Survey. IEEE Softw.\u00a025(1), 20\u201327 (2008), doi:10.1109\/ms.2008.19","journal-title":"IEEE Softw."},{"key":"15_CR17","unstructured":"Zimmermann, H.: OSI reference model\\&mdash;The ISO model of architecture for open systems interconnection. In: Innovations in Internetworking, pp. 2\u20139. Artech House, Inc. (1988)"}],"container-title":["Lecture Notes in Business Information Processing","Software Quality. Process Automation in Software Development"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27213-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T18:53:17Z","timestamp":1742323997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27213-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642272127","9783642272134"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27213-4_15","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}