{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:58:08Z","timestamp":1743062288023,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642384899"},{"type":"electronic","value":"9783642384905"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38490-5_43","type":"book-chapter","created":{"date-parts":[[2013,6,20]],"date-time":"2013-06-20T08:50:35Z","timestamp":1371718235000},"page":"478-489","source":"Crossref","is-referenced-by-count":3,"title":["Goal-Oriented Security Requirements Analysis for a System Used in Several Different Activities"],"prefix":"10.1007","author":[{"given":"Haruhiko","family":"Kaiya","sequence":"first","affiliation":[]},{"given":"Takao","family":"Okubo","sequence":"additional","affiliation":[]},{"given":"Nobuyuki","family":"Kanaya","sequence":"additional","affiliation":[]},{"given":"Yuji","family":"Suzuki","sequence":"additional","affiliation":[]},{"given":"Shinpei","family":"Ogata","sequence":"additional","affiliation":[]},{"given":"Kenji","family":"Kaijiri","sequence":"additional","affiliation":[]},{"given":"Nobukazu","family":"Yoshioka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","unstructured":"Yu, E.S.K.: Towards modeling and reasoning support for early-phase requirements engineering. In: RE, pp. 226\u2013235 (1997)"},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Yu, E., Giorgini, P., Maiden, N., Mylopoulos, J.: Social Modeling for Requirements Engineering. The MIT Press (2010) ISBN 0262240556","DOI":"10.7551\/mitpress\/7549.001.0001"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation. In: RE, pp. 167\u2013176 (2005)","DOI":"10.1109\/RE.2005.43"},{"issue":"2","key":"43_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H. Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. International Journal of Software Engineering and Knowledge Engineering\u00a017(2), 285\u2013309 (2007)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"43_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/11767138_1","volume-title":"Advanced Information Systems Engineering","author":"A.G. Sutcliffe","year":"2006","unstructured":"Sutcliffe, A.G.: Trust: From cognition to conceptual models and design. In: Martinez, F.H., Pohl, K. (eds.) CAiSE 2006. LNCS, vol.\u00a04001, pp. 3\u201317. Springer, Heidelberg (2006)"},{"key":"43_CR6","unstructured":"Liu, L., Yu, E.S.K., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: RE, pp. 151\u2013161 (2003)"},{"issue":"1","key":"43_CR7","first-page":"89","volume":"3","author":"L. Liu","year":"2009","unstructured":"Liu, L., Yu, E.S.K., Mylopoulos, J.: Secure-i*: Engineering secure software systems through social analysis. Int. J. Software and Informatics\u00a03(1), 89\u2013120 (2009)","journal-title":"Int. J. Software and Informatics"},{"issue":"3","key":"43_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P. Bresciani","year":"2004","unstructured":"Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi-Agent Systems\u00a08(3), 203\u2013236 (2004)","journal-title":"Autonomous Agents and Multi-Agent Systems"},{"issue":"2","key":"43_CR9","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MS.2008.46","volume":"25","author":"J.D. Blaine","year":"2008","unstructured":"Blaine, J.D., Cleland-Huang, J.: Software Quality Requirements: How to Balance Competing Priorities. IEEE Software\u00a025(2), 22\u201324 (2008)","journal-title":"IEEE Software"},{"key":"43_CR10","doi-asserted-by":"crossref","unstructured":"Kaiya, H., Morita, S., Ogata, S., Kaijiri, K., Hayashi, S., Saeki, M.: Model Transformation Patterns for Introducing Suitable Information Systems. In: 19th Asia Pacific Software Engineering Conference, APSEC 2012, Hong Kong, pp. 434\u2013439. IEEE CS (December 2012)","DOI":"10.1109\/APSEC.2012.52"},{"key":"43_CR11","unstructured":"Frank Swiderski and Window Snyder. Threat Modeling. Microsoft Press (2004)"},{"key":"43_CR12","unstructured":"Yu, E., Castro, J., Perini, A.: Strategic Actors Modeling with i*. In: RE 2008, Tutorial (August 2008)"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Chin, E., Hanna, S., Song, D., Wagner, D.: Android permissions demystified. In: ACM Conference on Computer and Communications Security, pp. 627\u2013638 (2011)","DOI":"10.1145\/2046707.2046779"},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Shibaoka, M., Kaiya, H., Saeki, M.: Goore: Goal-oriented and ontology driven requirements elicitation method. In: ER Workshops, pp. 225\u2013234 (2007)","DOI":"10.1007\/978-3-540-76292-8_28"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"Honiden, S., Tahara, Y., Yoshioka, N., Taguchi, K., Washizaki, H.: Top se: Educating superarchitects who can apply software engineering tools to practical development in japan. In: ICSE, pp. 708\u2013718 (2007)","DOI":"10.1109\/ICSE.2007.89"},{"key":"43_CR16","unstructured":"Kaiya, H., Morita, S., Kaijiri, K., Hayashi, S., Saeki, M.: Facilitating business improvement by information systems using model transformation and metrics. In: CAiSE Forum, pp. 106\u2013113 (2012)"}],"container-title":["Lecture Notes in Business Information Processing","Advanced Information Systems Engineering Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38490-5_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:15:26Z","timestamp":1558379726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38490-5_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642384899","9783642384905"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38490-5_43","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2013]]}}}