{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T12:35:15Z","timestamp":1725712515088},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336171"},{"type":"electronic","value":"9783642336188"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33618-8_28","type":"book-chapter","created":{"date-parts":[[2013,1,15]],"date-time":"2013-01-15T14:34:16Z","timestamp":1358260456000},"page":"194-206","source":"Crossref","is-referenced-by-count":6,"title":["Ontology-Based Support for Security Requirements Specification Process"],"prefix":"10.1007","author":[{"given":"Olawande","family":"Daramola","sequence":"first","affiliation":[]},{"given":"Guttorm","family":"Sindre","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Moser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","unstructured":"Rushby, J.: Security Requirements Specifications: How and What? Symposium on Requirements Engineering for Information Security (SREIS), Indianapolis (2001)"},{"issue":"1","key":"28_CR2","doi-asserted-by":"publisher","first-page":"61","DOI":"10.5381\/jot.2004.3.1.c6","volume":"3","author":"D. Firesmith","year":"2004","unstructured":"Firesmith, D.: Specifying Reusable Security Requirements. Journal of Object Technology\u00a03(1), 61\u201375 (2004)","journal-title":"Journal of Object Technology"},{"issue":"3","key":"28_CR3","first-page":"25","volume":"13","author":"A. Chandrabrose","year":"2011","unstructured":"Chandrabrose, A.: Alagarsami: Security Requirements Engineering \u2013 A Strategic Approach. International Journal of Computer Applications\u00a013(3), 25\u201332 (2011)","journal-title":"International Journal of Computer Applications"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Viega, J.: The CLASP Application Security Process. Training Manual, vol.\u00a01(1). Secure Software Inc. (2005)","DOI":"10.1145\/1082983.1083207"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Mead, N., Stehney, T.: Security quality requirements engineering (SQUARE) methodology. In: Proceedings of International Conference on Software Engineering for Secure Systems (SESS 2005), pp. 1\u20135 (2005)","DOI":"10.21236\/ADA443493"},{"key":"28_CR6","unstructured":"Common Criteria Implementation Board. Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Requirements (1999)"},{"issue":"2","key":"28_CR7","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H. Mouratidis","year":"2004","unstructured":"Mouratidis, H., Giorgini, P.: Secure Tropos: A security-oriented extension of the Tropos methodology. International Journal of Software Engineering and Knowledge Engineering\u00a017(2), 285\u2013309 (2004)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"issue":"1","key":"28_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.: Eliciting Security Requirements with Misuse Cases. Requirements Engineering\u00a010(1), 34\u201344 (2005)","journal-title":"Requirements Engineering"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: 4th International Symposium on Information, Computer, and Communications Security (ASIACCS 2009), pp. 183\u2013194 (2009)","DOI":"10.1145\/1533057.1533084"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Kim, A., Luo, J., Kang, M.: Security Ontology for Annotating Resources. In: 4th International Conference on Ontologies, Databases, and Applications of Semantics, ODBASE 2005 (2005)","DOI":"10.1007\/11575801_34"},{"issue":"4","key":"28_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jisp.2007100101","volume":"1","author":"A. Herzog","year":"2007","unstructured":"Herzog, A., Shahmehri, N., Duma, C.: An Ontology of Information Security. International Journal of Information Security\u00a01(4), 1\u201323 (2007)","journal-title":"International Journal of Information Security"},{"key":"28_CR12","unstructured":"Donner, M.: Toward a Security Ontology. IEEE Security and Privacy (2003)"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Souag, A., Salinesi, C., Wattiau, I.: Ontologies for Security Requirements: A Literature Survey and Classification. In: WISSE 2012 in Conjunction with 24th International Conference on Advanced Information Systems Engineering (CAiSE 2012), pp. 8 pages (June 2012)","DOI":"10.1007\/978-3-642-31069-0_5"},{"key":"28_CR14","unstructured":"Hull, E., Jackson, K., Dick, J.: Requirements Engineering. Springer (2004)"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Daramola, O., St\u00e5lhane, T., Sindre, G., Omoronyia, I.: Enabling Hazard Identification from Requirements and Reuse-Oriented HAZOP Analysis. In: Proceeding of 4th International Workshop on Managing Requirements Knowledge, pp. 3\u201311. IEEE Press (2011)","DOI":"10.1109\/MARK.2011.6046555"},{"key":"28_CR16","unstructured":"Firesmith, D.: A Taxonomy of Security-Related Requirements. In: Proceedings of the International Workshop on High Assurance Systems (RHAS 2005), Paris, France (2005)"},{"key":"28_CR17","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-642-29749-6_7","volume-title":"IS Olympics: Information Systems in a Diverse World","author":"M. Pavlidis","year":"2012","unstructured":"Pavlidis, M., Islam, S., Mouratidis, H.: A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos. In: Nurcan, S. (ed.) CAiSE Forum 2011. LNBIP, vol.\u00a0107, pp. 95\u2013109. Springer, Heidelberg (2012)"},{"key":"28_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/11429760_33","volume-title":"Trust Management","author":"P. Giorgini","year":"2005","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Siena, A., Zannone, N.: ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 415\u2013419. Springer, Heidelberg (2005)"},{"key":"28_CR19","unstructured":"Bizhanzadeh, Y., Karpati, P.: jMUCMNav: an Editor for Misuse Case Maps. In: First Int. Workshop on Alignment of Business Process and Security Modelling (ABPSM 2011), Riga, Latvia (2011)"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"T\u00f8ndel, I.A., Jensen, J., R\u00f8stad, L.: Combining misuse cases with attack trees and security activity models. In: Proc. ARES 2010, pp. 438\u2013445 (2010)","DOI":"10.1109\/ARES.2010.101"},{"key":"28_CR21","unstructured":"http:\/\/sourceforge.net\/apps\/mediawiki\/seamonster\/"},{"key":"28_CR22","unstructured":"Maurya, S., Jangam, E., Talukder, M., Pais, A.R.S.: A security designers\u2019 work-bench. In: Proc. Hack. in 2009, pp. 59\u201366 (2009)"},{"key":"28_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-14192-8_20","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"B. Gleich","year":"2010","unstructured":"Gleich, B., Creighton, O., Kof, L.: Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources. In: Wieringa, R., Persson, A. (eds.) REFSQ 2010. LNCS, vol.\u00a06182, pp. 218\u2013232. Springer, Heidelberg (2010)"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Wilson, W., Rosenberg, L., Hyatt, L.: Automated Analysis of Requirement Specifications. In: Proceedings of the International Conference on Software Engineering (ICSE 1997), pp. 161\u2013171 (1997)","DOI":"10.1145\/253228.253258"},{"key":"28_CR25","unstructured":"Fabrini, F., Fussani, M., Gnesi, S., Lami, G.: An Automatic Quality Evaluation for Natural Language Requirements. In: Proceeding of the Seventh International Workshop on Requirements Engineering Foundation for Software REFSQ 2001, Interlaken, Switzerland, pp. 150\u2013164 (2001)"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Farfeleder, S., Moser, T., Krall, A., St\u00e5lhane, T., Zojer, H., Panis, C.: DODT: Increasing Requirements Formalism using Domain Ontologies for Improved Embedded Systems Development. In: Proceedings of 14th IEEE Symposium on Design and Diagnostics of Electronic Circuits and Systems (DDECS 2011), pp. 1\u20134 (2011)","DOI":"10.1109\/DDECS.2011.5783092"},{"key":"28_CR27","doi-asserted-by":"crossref","unstructured":"Nielsen, J., Landauer, T.: A mathematical model of the finding of usability problems. In: Proceedings of ACM INTERCHI 1993 Conference, pp. 206\u2013213 (1993)","DOI":"10.1145\/169059.169166"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2012 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33618-8_28.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:16:18Z","timestamp":1620130578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33618-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336171","9783642336188"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33618-8_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}