{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:53:06Z","timestamp":1747806786134},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642292309"},{"type":"electronic","value":"9783642292316"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29231-6_7","type":"book-chapter","created":{"date-parts":[[2012,4,3]],"date-time":"2012-04-03T01:49:29Z","timestamp":1333417769000},"page":"77-89","source":"Crossref","is-referenced-by-count":11,"title":["Security Requirements Engineering for Secure Business Processes"],"prefix":"10.1007","author":[{"given":"Elda","family":"Paja","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Giorgini","sequence":"additional","affiliation":[]},{"given":"St\u00e9phane","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Per H\u00e5kon","family":"Meland","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"7_CR1","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S0925-5273(03)00102-6","volume":"90","author":"R. Aguilar-Saven","year":"2004","unstructured":"Aguilar-Saven, R.: Business process modelling: Review and framework. International Journal of Production Economics\u00a090(2), 129\u2013149 (2004)","journal-title":"International Journal of Production Economics"},{"key":"7_CR2","first-page":"201","volume":"127","author":"C. Wolter","year":"2008","unstructured":"Wolter, C., Menzel, M., Meinel, C.: Modelling security goals in business processes. Modellierung\u00a0127, 201\u2013216 (2008)","journal-title":"Modellierung"},{"issue":"4","key":"7_CR3","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1093\/ietisy\/e90-d.4.745","volume":"90","author":"A. Rodr\u00edguez","year":"2007","unstructured":"Rodr\u00edguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: A bpmn extension for the modeling of security requirements in business processes. IEICE Transactions on Information and Systems\u00a090(4), 745\u2013752 (2007)","journal-title":"IEICE Transactions on Information and Systems"},{"issue":"3","key":"7_CR4","doi-asserted-by":"publisher","first-page":"53","DOI":"10.5381\/jot.2003.2.3.c6","volume":"2","author":"D.G. Firesmith","year":"2003","unstructured":"Firesmith, D.G.: Security Use Cases. Journal of Object Technology\u00a02(3), 53\u201364 (2003)","journal-title":"Journal of Object Technology"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/3-540-44895-0_12","volume-title":"Business Process Management","author":"M. Backes","year":"2003","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: Security in Business Process Engineering. In: van der Aalst, W.M.P., ter Hofstede, A.H.M., Weske, M. (eds.) BPM 2003. LNCS, vol.\u00a02678, pp. 168\u2013183. Springer, Heidelberg (2003)"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in service-oriented business process management. In: 2009 International Conference on Availability, Reliability and Security, pp. 41\u201348. IEEE (2009)","DOI":"10.1109\/ARES.2009.90"},{"key":"7_CR7","unstructured":"Pavlovski, C., Zou, J.: Non-functional requirements in business process modeling. In: Proceedings of the Fifth Asia-Pacific Conference on Conceptual Modelling, vol.\u00a079, pp. 103\u2013112. Australian Computer Society, Inc. (2008)"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jismd.2011040101","volume":"2","author":"E. Cardoso","year":"2011","unstructured":"Cardoso, E., Almeida, J., Guizzardi, R., Guizzardi, G.: A method for eliciting goals for business process models based on non-functional requirements catalogues. International Journal of Information System Modeling and Design (IJISMD)\u00a02(2), 1\u201318 (2011)","journal-title":"International Journal of Information System Modeling and Design (IJISMD)"},{"issue":"1","key":"7_CR9","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.: Eliciting security requirements with misuse cases. Requirements Engineering\u00a010(1), 34\u201344 (2005)","journal-title":"Requirements Engineering"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for Secure Systems Development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-540-73031-6_27","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"G. Sindre","year":"2007","unstructured":"Sindre, G.: Mal-Activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, P., Heymans, P. (eds.) REFSQ 2007. LNCS, vol.\u00a04542, pp. 355\u2013366. Springer, Heidelberg (2007)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Greiner, U., Lippe, S., Kahl, T., Ziemann, J., J\u00e4kel, F.W.: Designing and implementing cross-organizational business processes-description and application of a modelling framework. Enterprise Interoperability, pp. 137\u2013147 (2007)","DOI":"10.1007\/978-1-84628-714-5_13"},{"issue":"1","key":"7_CR13","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1023\/A:1008319631231","volume":"7","author":"M.P. Singh","year":"1999","unstructured":"Singh, M.P.: An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts. Artificial Intelligence and Law\u00a07(1), 97\u2013113 (1999)","journal-title":"Artificial Intelligence and Law"},{"key":"7_CR14","unstructured":"OASIS: Reference Architecture Foundation for Service Oriented Architecture, Version 1.0, Organization for the Advancement of Structured Information Standards (2009)"},{"key":"7_CR15","unstructured":"Aniketos: Deliverable 6.1: Initial analysis of the industrial case studies (2011)"},{"key":"7_CR16","unstructured":"Yu, E.: Modelling Strategic Relationships for Process Reengineering. PhD thesis, University of Toronto, Canada (1996)"},{"issue":"3","key":"7_CR17","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P. Bresciani","year":"2004","unstructured":"Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems\u00a08(3), 203\u2013236 (2004)","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"key":"7_CR18","unstructured":"Number:formal\/2011-01-03, O.D.: Business process model and notation (bpmn) version 2.0 (2011)"},{"key":"7_CR19","unstructured":"Allweyer, T.: BPMN 2.0. BoD (2010)"}],"container-title":["Lecture Notes in Business Information Processing","Workshops on Business Informatics Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29231-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:14:30Z","timestamp":1558379670000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29231-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642292309","9783642292316"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29231-6_7","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}