{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:18:58Z","timestamp":1764173938704,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362842"},{"type":"electronic","value":"9783642362859"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36285-9_68","type":"book-chapter","created":{"date-parts":[[2013,1,24]],"date-time":"2013-01-24T08:26:30Z","timestamp":1359015990000},"page":"689-700","source":"Crossref","is-referenced-by-count":10,"title":["Towards Security Risk-Oriented Misuse Cases"],"prefix":"10.1007","author":[{"given":"Inam","family":"Soomro","sequence":"first","affiliation":[]},{"given":"Naved","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"68_CR1","unstructured":"Ahmed, N., Matulevi\u010dius, R., Mouratidis, H.: A Model Transformation from Misuse Cases to Secure Tropos. In: Proc of the CAiSE 2012 Forum at the 24th Int. Conf. (CAiSE), pp. 7\u201314. CEUR-WS (2012)"},{"issue":"1","key":"68_CR2","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2003.1159030","volume":"20","author":"I. Alexander","year":"2003","unstructured":"Alexander, I.: Misuse cases: Use cases with Hostile Intent. IEEE Soft.\u00a020(1), 58\u201366 (2003)","journal-title":"IEEE Soft."},{"key":"68_CR3","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-31069-0_1","volume-title":"Advanced Information Systems Engineering Workshops","author":"O. Altuhhova","year":"2012","unstructured":"Altuhhova, O., Matulevi\u010dius, R., Ahmed, N.: Towards Definition of Secure Business Processes. In: Bajec, M., Eder, J. (eds.) CAiSE Workshops 2012. LNBIP, vol.\u00a0112, pp. 1\u201315. Springer, Heidelberg (2012)"},{"key":"68_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-28714-5_11","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"M.J.M. Chowdhury","year":"2012","unstructured":"Chowdhury, M.J.M., Matulevi\u010dius, R., Sindre, G., Karpati, P.: Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol.\u00a07195, pp. 132\u2013139. Springer, Heidelberg (2012)"},{"key":"68_CR5","unstructured":"Ekelhart, A., Fenz, S., Neubauer, T.: AURUM: A Framework for Information Security Risk Management. In: HICSS 2009, pp. 1\u201310. IEEE Computer Society (2009)"},{"issue":"3","key":"68_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.5381\/jot.2003.2.3.c6","volume":"2","author":"D. Firesmith","year":"2003","unstructured":"Firesmith, D.: Security Use Cases. Journal of Object Technology\u00a02(3), 53\u201364 (2003)","journal-title":"Journal of Object Technology"},{"key":"68_CR7","unstructured":"Herrmann, A., Morali, A., Etalle, S., Wieringa, R.J.: RiskREP: Risk-based Security Requirements Elicitation and Prioritization. In: Perspectives in Business Informatics Research, Riga, pp. 155\u2013162. Riga Technical University (2011)"},{"key":"68_CR8","doi-asserted-by":"crossref","unstructured":"van Lamsweerde, A.: Elaborating Security Requirements by Construction of Intentional Anti-Models. In: Proceedings of the 26th International Conference on Software Engineering, ICSE 2004, pp. 148\u2013157. IEEE Computer Society (2004)","DOI":"10.1109\/ICSE.2004.1317437"},{"key":"68_CR9","doi-asserted-by":"crossref","unstructured":"Matulevi\u010dius, R., Mayer, N., Heymans, P.: Alignment of Misuse Cases with Security Risk Management. In: Proceedings of 3rd International Conf. on Availability, Reliability and Security, pp. 1397\u20131404. IEEE Computer Society (2008)","DOI":"10.1109\/ARES.2008.88"},{"issue":"6","key":"68_CR10","first-page":"816","volume":"18","author":"R. Matulevi\u010dius","year":"2012","unstructured":"Matulevi\u010dius, R., Mouratidis, H., Mayer, N., Dubois, E., Heymans, P.: Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management. J. UCS\u00a018(6), 816\u2013844 (2012)","journal-title":"J. UCS"},{"key":"68_CR11","unstructured":"Mayer, N.: Model-based Management of Information System Security Risk. Ph.D. thesis, University of Namur (2009)"},{"key":"68_CR12","unstructured":"Mayer, N., Heymans, P., Matulevi\u010dius, R.: Design of a Modelling Language for Information System Security Risk Management. In: Proceedings of the First International Conference on Research Challenges in Information Science, RCIS 2007, pp. 121\u2013132 (2007)"},{"key":"68_CR13","doi-asserted-by":"crossref","unstructured":"McDermott, J.: Abuse-Case-Based Assurance Arguments. In: Proc. of the 17th Annual Comp. Security Applications Conf., ACSAC 2001, pp. 366. IEEE Computer Society (2001)","DOI":"10.1109\/ACSAC.2001.991553"},{"key":"68_CR14","doi-asserted-by":"crossref","unstructured":"McDermott, J., Fox, C.: Using Abuse Case Models for Security Requirements Analysis. In: Proceedings of ACSAC 1999, pp. 55\u201366. IEEE Computer Society (1999)","DOI":"10.1109\/CSAC.1999.816013"},{"key":"68_CR15","doi-asserted-by":"crossref","unstructured":"Pauli, J.J., Xu, D.: Trade-off Analysis of Misuse Case-based Secure Software Architec-tures: A Case Study. In: Proc. of MSVVEIS Workshop, pp. 89\u201395. INSTICC Press (2005)","DOI":"10.5220\/0002560100890095"},{"key":"68_CR16","unstructured":"R\u00f8stad, L.: An Extended Misuse Case Notation: Including Vulnerabilities and The Insider Threat. In: Proc. 12th Working Conf. REFSQ 2006 (2006)"},{"key":"68_CR17","unstructured":"Sindre, G., Opdahl, A.L.: Templates for Misuse Case Description. In: Proc. of the 7th International Workshop on REFSQ 2001 (2001)"},{"issue":"1","key":"68_CR18","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G. Sindre","year":"2005","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting Security Requirements with Misuse Cases. Requir. Eng.\u00a010(1), 34\u201344 (2005)","journal-title":"Requir. Eng."}],"container-title":["Lecture Notes in Business Information Processing","Business Process Management Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36285-9_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T18:22:06Z","timestamp":1745950926000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36285-9_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362842","9783642362859"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36285-9_68","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2013]]}}}