{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:40:47Z","timestamp":1725666047237},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642287138"},{"type":"electronic","value":"9783642287145"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28714-5_11","type":"book-chapter","created":{"date-parts":[[2012,3,5]],"date-time":"2012-03-05T21:08:08Z","timestamp":1330981688000},"page":"132-139","source":"Crossref","is-referenced-by-count":14,"title":["Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions"],"prefix":"10.1007","author":[{"given":"Mohammad Jabed Morshed","family":"Chowdhury","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Raimundas","family":"Matulevi\u010dius","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guttorm","family":"Sindre","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Karpati","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"Chowdhury, M.J.M.: Modeling Security Risks at the System Design Stage: Alignment of Mal-activity Diagrams and SecureUML to the ISSRM Domain Model. Master Theses (2011), \n                    \n                      http:\/\/nordsecmob.tkk.fi\/thesis.html"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-642-12544-7_16","volume-title":"International Perspectives on Information Systems Engineering","author":"E. Dubois","year":"2010","unstructured":"Dubois, E., Heymans, P., Mayer, N., Matulevi\u010dius, R.: A Systematic Approach to Define the Domain of Information System Security Risk Management. In: Nurcan, S., Salinesi, C., Souveyet, C., Ralyt\u0117, J. (eds.) International Perspectives on Information Systems Engineering, pp. 289\u2013306. Springer, Heidelberg (2010)"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"1397","DOI":"10.1109\/ARES.2008.88","volume-title":"3rd International Conference on Availability, Reliability and Security","author":"R. Matulevi\u010dius","year":"2008","unstructured":"Matulevi\u010dius, R., Mayer, N., Heymans, P.: Alignment of Misuse cases with Security Risk Management. In: 3rd International Conference on Availability, Reliability and Security, pp. 1397\u20131404. IEEE Computer Society, Washington (2008)"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-540-69534-9_40","volume-title":"Advanced Information Systems Engineering","author":"R. Matulevi\u010dius","year":"2008","unstructured":"Matulevi\u010dius, R., Mayer, N., Mouratidis, H., Dubois, E., Heymans, P., Genon, N.: Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development. In: Bellahs\u00e8ne, Z., L\u00e9onard, M. (eds.) CAiSE 2008. LNCS, vol.\u00a05074, pp. 541\u2013555. Springer, Heidelberg (2008)"},{"key":"11_CR5","unstructured":"Mayer, N.: Model Based Management of Information System Security Risk. Doctoral Thesis, University of Namur (2009)"},{"key":"11_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-540-73031-6_27","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"G. Sindre","year":"2007","unstructured":"Sindre, G.: Mal-Activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, P., Paech, B., Heymans, P. (eds.) REFSQ 2007. LNCS, vol.\u00a04542, pp. 355\u2013366. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28714-5_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:07:00Z","timestamp":1620126420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28714-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642287138","9783642287145"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28714-5_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}