{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:19:18Z","timestamp":1725898758884},"publisher-location":"Berlin, Heidelberg","reference-count":4,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642339981"},{"type":"electronic","value":"9783642339998"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33999-8_48","type":"book-chapter","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T15:27:25Z","timestamp":1350487645000},"page":"396-399","source":"Crossref","is-referenced-by-count":6,"title":["STS-Tool: Using Commitments to Specify Socio-Technical Security Requirements"],"prefix":"10.1007","author":[{"given":"Elda","family":"Paja","sequence":"first","affiliation":[]},{"given":"Fabiano","family":"Dalpiaz","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Poggianella","sequence":"additional","affiliation":[]},{"given":"Pierluigi","family":"Roberti","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Giorgini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Dalpiaz, F., Paja, E., Giorgini, P.: Security requirements engineering via commitments. In: Proceedings of the First Workshop on Socio-Technical Aspects in Security and Trust (STAST 2011), pp. 1\u20138 (2011)","DOI":"10.1109\/STAST.2011.6059249"},{"key":"48_CR2","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation. In: Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE 2005), pp. 167\u2013176 (2005)","DOI":"10.1109\/RE.2005.43"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting. In: Proceedings of the 11th IEEE International Conference on Requirements Engineering (RE 2003), pp. 151\u2013161. IEEE Computer Society (2003)","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"48_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1023\/A:1008319631231","volume":"7","author":"M.P. Singh","year":"1999","unstructured":"Singh, M.P.: An Ontology for Commitments in Multiagent Systems: Toward a Unification of Normative Concepts. Artificial Intelligence and Law\u00a07, 97\u2013113 (1999)","journal-title":"Artificial Intelligence and Law"}],"container-title":["Lecture Notes in Computer Science","Advances in Conceptual Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33999-8_48.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:40:13Z","timestamp":1620132013000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33999-8_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642339981","9783642339998"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33999-8_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}