{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:07:56Z","timestamp":1725667676884},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642288784"},{"type":"electronic","value":"9783642288791"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28879-1_11","type":"book-chapter","created":{"date-parts":[[2012,3,12]],"date-time":"2012-03-12T06:00:09Z","timestamp":1331532009000},"page":"155-172","source":"Crossref","is-referenced-by-count":5,"title":["Using Requirements Engineering in an Automatic Security Policy Derivation Process"],"prefix":"10.1007","author":[{"given":"Mariem","family":"Graa","sequence":"first","affiliation":[]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[]},{"given":"Fabien","family":"Autrel","sequence":"additional","affiliation":[]},{"given":"Hanieh","family":"Azkia","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Cavalli","sequence":"additional","affiliation":[]},{"given":"Amel","family":"Mammar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"11_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1049\/cce:20030108","volume":"14","author":"I. Alexander","year":"2003","unstructured":"Alexander, I.: Misuse cases help to elicit non-functional requirements. Computing and Control Engineering Journal\u00a014(1), 40\u201345 (2003)","journal-title":"Computing and Control Engineering Journal"},{"key":"11_CR2","unstructured":"Card, I., Profile, P.: Common Criteria for Information Technology Security Evaluation (2001)"},{"key":"11_CR3","unstructured":"Coatrieux, G., Maitre, H., Sankur, B.: Strict integrity control of biomedical images. In: Proceedings of SPIE"},{"issue":"4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10207-007-0051-9","volume":"7","author":"F. Cuppens","year":"2008","unstructured":"Cuppens, F., Cuppens-Boulahia, N.: Modeling contextual security policies. International Journal of Information Security\u00a07(4), 285\u2013305 (2008)","journal-title":"International Journal of Information Security"},{"key":"11_CR5","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Mi\u00e8ge, A.: Inheritance hierarchies in the Or-BAC model and application in a network environment. In: Second Foundations of Computer Security Workshop (FCS 2004), Turku, Finland (2004)"},{"key":"11_CR6","unstructured":"Cuppens, F., Mi\u00e8ge, A.: Modelling contexts in the Or-BAC model. In: 19th Annual Computer Security Applications Conference, Las Vegas (2003)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Darimont, R., Van Lamsweerde, A.: Formal refinement patterns for goal-driven requirements elaboration. ACM SIGSOFT Software Engineering Notes 21","DOI":"10.1145\/250707.239131"},{"key":"11_CR8","unstructured":"DCSSI: Expression des Besoins et Identification des Objectifs de Securite (February 2004), \n                    \n                      http:\/\/www.ssi.gouv.fr\/IMG\/pdf\/ebiosv2-section1-introduction-2004-02-05.pdf\n                    \n                    \n                   (Online; accessed April 20, 2011)"},{"key":"11_CR9","unstructured":"Autrel, F., Cuppens, F., Cuppens-Boulahia, N., Coma, C.: Motorbac 2: a security policy tool. In: Third Joint Conference on Security in Networks Architectures and Security of Information Systems (SARSSI), Loctudy, France (2008)"},{"key":"11_CR10","unstructured":"Finkelstein, A., Dowell, J.: A Comedy of Errors: the London Ambulance Service case study. In: Proceedings of 8th International Workshop on Software Specification and Design (IWSSD-8),"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Firesmith, D.: Security use cases. Technology 2","DOI":"10.5381\/jot.2003.2.3.c6"},{"key":"11_CR12","unstructured":"Herrmann, A., Paech, B.: Quality Misuse. In: Proceedings of the Fourteenth International Workshop on Requirements Engineering: Foundation of Software Quality"},{"key":"11_CR13","unstructured":"Johnson, J.: Chaos: The dollar drain of IT project failures. Application Development Trends 2"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Jonker, W., Linnartz, J.: Digital rights management in consumer electronics products. IEEE Signal Processing Magazine\u00a021","DOI":"10.1109\/MSP.2004.1276116"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Laleau, R., Semmak, F., Matoussi, A., Petit, D., Hammad, A., Tatibouet, B.: A first attempt to combine SysML requirements diagrams and B. Innovations in Systems and Software Engineering (2010)","DOI":"10.1007\/s11334-009-0119-y"},{"key":"11_CR16","unstructured":"Letier, E.: Reasoning about agents in goal-oriented requirements engineering (2001)"},{"key":"11_CR17","unstructured":"Miller, M., Cox, I., Linnartz, J., Kalker, T.: A review of watermarking principles and practices. Digital Signal Processing for Multimedia Systems, 461\u2013485 (1999)"},{"key":"11_CR18","unstructured":"Sa, R.I.: Objectiver: un atelier de gnie logiciel pour l\u2019ingnierie des exigences (2004), \n                    \n                      http:\/\/www.objectiver.com"},{"key":"11_CR19","unstructured":"Sindre, G., Opdahl, A.: Templates for misuse case description. In: Proc. of the 7th International Workshop on Requirements Engineering, Foundation for Software Quality (REFSQ 2001), Citeseer (2001)"},{"key":"11_CR20","unstructured":"Ullman, J.D.: Principles of database and knowledge-base systems. Computer Science Press (1989)"},{"key":"11_CR21","unstructured":"Van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models"},{"key":"11_CR22","unstructured":"Van Lamsweerde, A.: Goal-oriented requirements engineering: From system objectives to UML models to precise software specifications. In: Proceedings of the 25th International Conference on Software Engineering"},{"key":"11_CR23","unstructured":"Van Lamsweerde, A.: Goal-oriented requirements engineering: A guided tour. In: Proceedings of the 5th IEEE International Symposium on Requirements Engineering, p. 0249 (2001)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneus Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28879-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:47:08Z","timestamp":1558298828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28879-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642288784","9783642288791"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28879-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}