{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:17:23Z","timestamp":1773778643480,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642310713","type":"print"},{"value":"9783642310720","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31072-0_24","type":"book-chapter","created":{"date-parts":[[2012,7,2]],"date-time":"2012-07-02T12:22:26Z","timestamp":1341231746000},"page":"347-361","source":"Crossref","is-referenced-by-count":38,"title":["A Combined Process for Elicitation and Analysis of Safety and Security Requirements"],"prefix":"10.1007","author":[{"given":"Christian","family":"Raspotnig","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Karpati","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vikash","family":"Katta","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"24_CR1","unstructured":"Object Management Group: Unified modeling language (OMG UML), superstructure (2011), http:\/\/www.omg.org\/spec\/UML\/2.4\/Superstructure"},{"key":"24_CR2","unstructured":"Watson, A.: Visual modelling: past, present and future (2011), http:\/\/www.uml.org\/VisualModeling.pdf"},{"key":"24_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. Requirement Engineering\u00a010, 34\u201344 (2005)","journal-title":"Requirement Engineering"},{"key":"24_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-540-73031-6_27","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"G. Sindre","year":"2007","unstructured":"Sindre, G.: Mal-Activity Diagrams for Capturing Attacks on Business Processes. In: Sawyer, P., Heymans, P. (eds.) REFSQ 2007. LNCS, vol.\u00a04542, pp. 355\u2013366. Springer, Heidelberg (2007)"},{"key":"24_CR5","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-16782-9_1","volume-title":"The Practice of Enterprise Modeling","author":"V. Katta","year":"2010","unstructured":"Katta, V., Karpati, P., Opdahl, A.L., Raspotnig, C., Sindre, G.: Comparing Two Techniques for Intrusion Visualization. In: van Bommel, P., Hoppenbrouwers, S., Overbeek, S., Proper, E., Barjis, J. (eds.) PoEM 2010. LNBIP, vol.\u00a068, pp. 1\u201315. Springer, Heidelberg (2010)"},{"key":"24_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-28714-5_10","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"C. Raspotnig","year":"2012","unstructured":"Raspotnig, C., Opdahl, A.: Supporting Failure Mode and Effect Analysis: A Case Study with Failure Sequence Diagrams. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol.\u00a07195, pp. 117\u2013131. Springer, Heidelberg (2012)"},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Ericson, C.: Hazard analysis techniques for system safety. Wiley-Interscience (2005)","DOI":"10.1002\/0471739421"},{"key":"24_CR8","unstructured":"ATM Bedriftsnettverk: Delievery DA-1.1. Technical report (2011)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis - The CORAS approach. Springer (2011)","DOI":"10.1007\/978-3-642-12323-8"},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Mouratidis, H.: Secure tropos: A security-oriented extension of the tropos methodology. Journal of Autonomous Agents and Multi-Agent Systems (2005)","DOI":"10.4018\/978-1-59140-581-8.ch002"},{"key":"24_CR11","unstructured":"Lin, L., Nuseibeh, B.A., Ince, D.C., Jackson, M., Moffett, J.D.: Analysing security threats and vulnerabilities using abuse frames. Technical Report 2003\/10, The Open University, Walton Hall, United Kingdom (October 2003)"},{"key":"24_CR12","unstructured":"Lamsweerde, A.V.: Requirements Engineering - From System Goals to UML Models to Software Specifications. Wiley (2009)"},{"key":"24_CR13","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/ICSE.2004.1317437","volume-title":"Proceedings of the 26th International Conference on Software Engineering, ICSE 2004","author":"A.V. Lamsweerde","year":"2004","unstructured":"Lamsweerde, A.V.: Elaborating security requirements by construction of intentional anti-models. In: Proceedings of the 26th International Conference on Software Engineering, ICSE 2004, pp. 148\u2013157. IEEE Computer Society, Washington, DC (2004)"},{"key":"24_CR14","doi-asserted-by":"crossref","unstructured":"Firesmith, D.G.: Common Concepts Underlying Safety, Security, and Survivability Engineering. Technical Note CMU\/SEI-2003-TN-033, Software Engineering Institute (2003)","DOI":"10.21236\/ADA421683"},{"key":"24_CR15","volume-title":"Proceedings of the Fourth International Workshop on Requirements Engineering for High- Availability Systems. RHAS\u20199205","author":"D.G. Firesmith","year":"2005","unstructured":"Firesmith, D.G.: A taxonomy of security-related requirements. In: Proceedings of the Fourth International Workshop on Requirements Engineering for High- Availability Systems. RHAS\u20199205. IEEE Computer Society, Washington, DC (2005)"},{"key":"24_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-45416-0_2","volume-title":"Computer Safety, Reliability and Security","author":"R. Winther","year":"2001","unstructured":"Winther, R., Johnsen, O.A., Gran, B.A.: Security Assessments of Safety Critical Systems Using HAZOPs. In: Voges, U. (ed.) SAFECOMP 2001. LNCS, vol.\u00a02187, pp. 14\u201324. Springer, Heidelberg (2001)"},{"key":"24_CR17","unstructured":"Ministry of Defence: HAZOP studies on systems containing programmable electronics. UK Ministry of Defence Interim Def Stan 00-58 (1994), http:\/\/www.dstan.mod.uk\/dstandata\/ix-00.htm"},{"key":"24_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-540-30144-8_35","volume-title":"Information Security","author":"T. Srivatanakul","year":"2004","unstructured":"Srivatanakul, T., Clark, J.A., Polack, F.: Effective Security Requirements Analysis: HAZOP and Use Cases. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol.\u00a03225, pp. 416\u2013427. Springer, Heidelberg (2004)"},{"key":"24_CR19","unstructured":"Eurocontrol: SESAR ATM preliminary security risk assessment method (2011)"},{"key":"24_CR20","unstructured":"Eurocontrol: ATM security risk management toolkit. Technical Report EUROCONTROL- GUID-144, EUROCONTROL ATM Security Domain (2010)"},{"key":"24_CR21","unstructured":"ISO\/IEC: Information Technology - Security Techniques - Information Security Risk Management ISO 27005"},{"key":"24_CR22","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/978-0-387-73947-2_20","volume-title":"Situational Method Engineering: Fundamentals and Experiences","author":"G. Sindre","year":"2007","unstructured":"Sindre, G.: A look at misuse cases for safety concerns. In: Ralyt\u00e9, J., Brinkkemper, S., Henderson-Sellers, B. (eds.) Situational Method Engineering: Fundamentals and Experiences. IFIP, vol.\u00a0244, pp. 252\u2013266. Springer, Boston (2007)"},{"key":"24_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-540-75563-0_29","volume-title":"Conceptual Modeling - ER 2007","author":"T. St\u00e5lhane","year":"2007","unstructured":"St\u00e5lhane, T., Sindre, G.: A Comparison of Two Approaches to Safety Analysis Based on Use Cases. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol.\u00a04801, pp. 423\u2013437. Springer, Heidelberg (2007)"},{"key":"24_CR24","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/ICRE.2002.1048506","volume-title":"Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering, RE 2002","author":"I.F. Alexander","year":"2002","unstructured":"Alexander, I.F.: Initial industrial experience of misuse cases in trade-off analysis. In: Proceedings of the 10th Anniversary IEEE Joint International Conference on Requirements Engineering, RE 2002, pp. 61\u201370. IEEE Computer Society, Washington, DC (2002)"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Raspotnig, C., Opdahl, A.: Improving security and safety modelling with failure sequence diagrams. International Journal of Secure Software Engineering (IJSSE), 20\u201336 (2012)","DOI":"10.4018\/jsse.2012010102"},{"key":"24_CR26","unstructured":"SESAR Joint Undertaking: About SESAR JU (2012), http:\/\/www.sesarju.eu\/about"},{"key":"24_CR27","unstructured":"Saab, L.F.V.: Advanced remote tower (2012), http:\/\/adv.remote-tower.net\/"},{"key":"24_CR28","unstructured":"Eurocontrol: Air Navigation Safety Assessment Methodology. (electronic) edn. 2.1 (2006)"},{"key":"24_CR29","unstructured":"CORAS: The CORAS Method, http:\/\/coras.sourceforge.net\/"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise, Business-Process and Information Systems Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31072-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T01:21:39Z","timestamp":1642641699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31072-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642310713","9783642310720"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31072-0_24","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}