{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:11:03Z","timestamp":1746115863979,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642386398"},{"type":"electronic","value":"9783642386404"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38640-4_9","type":"book-chapter","created":{"date-parts":[[2013,11,19]],"date-time":"2013-11-19T12:56:38Z","timestamp":1384865798000},"page":"167-181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Maintaining Security Requirements of Software Systems Using Evolving Crosscutting Dependencies"],"prefix":"10.1007","author":[{"given":"Saad bin","family":"Saleem","sequence":"first","affiliation":[]},{"given":"Lionel","family":"Montrieux","sequence":"additional","affiliation":[]},{"given":"Yijun","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Thein Than","family":"Tun","sequence":"additional","affiliation":[]},{"given":"Bashar","family":"Nuseibeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,27]]},"reference":[{"key":"9_CR00091","doi-asserted-by":"crossref","unstructured":"C.B. Haley, R.C. Laney, B. Nuseibeh, Deriving security requirements from crosscutting threat descriptions, in Proceedings of the 3rd International Conference on Aspect-Oriented Software Development (ACM, New York, NY, 2004), pp. 112\u2013121","DOI":"10.1145\/976270.976285"},{"key":"9_CR00092","doi-asserted-by":"crossref","unstructured":"A. Rashid, P. Sawyer, A. Moreira, J. Araujo, Early aspects: a model for aspect-oriented requirements engineering, in Proceedings of the IEEE Joint International Conference on Requirements Engineering, 2002, 2002, pp. 199\u2013202","DOI":"10.1109\/ICRE.2002.1048526"},{"key":"9_CR00093","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.csi.2010.01.006","volume":"32","author":"D Mellado","year":"2010","unstructured":"D. Mellado, C. Blanco, L.E. S\u00e1nchez, E. Fern\u00e1ndez-Medina, A systematic review of security requirements engineering. Comput. Stand. Interface 32, 153\u2013165 (2010)","journal-title":"Comput. Stand. Interface"},{"key":"9_CR00094","doi-asserted-by":"crossref","unstructured":"C.B. Haley, R. Laney, J.D. Moffett, B. Nuseibeh, Security requirements engineering: a framework for representation and analysis, in IEEE Transactions on Software Engineering, vol. 34, 2008, pp. 133\u2013153","DOI":"10.1109\/TSE.2007.70754"},{"key":"9_CR00095","series-title":"Aspect-Oriented Software Development","first-page":"633","volume-title":"Developing Secure Applications through Aspect-Oriented Programming","author":"BD Win","year":"2002","unstructured":"B.D. Win, W. Joosen, F. Piessens, Developing Secure Applications through Aspect-Oriented Programming. Aspect-Oriented Software Development (Addison-Wesley, New York, NY, 2002), pp. 633\u2013650"},{"key":"9_CR00096","first-page":"31","volume":"14","author":"J Viega","year":"2001","unstructured":"J. Viega, J.T. Bloch, P. Ch, Applying aspect-oriented programming to security. Cutter IT J. 14, 31\u201339 (2001)","journal-title":"Cutter IT J."},{"key":"9_CR00097","unstructured":"Y. Yu, J.C.S. do Prado Leite, J. Mylopoulos, From goals to aspects: discovering aspects from requirements goal models, in Proceedings of the Requirements Engineering Conference, 12th IEEE International (IEEE Computer Society, Washington, DC, 2004), pp. 38\u201347"},{"key":"9_CR00098","unstructured":"V.N.L. Franqueira, T.T. Tun, Y. Yu, R. Wieringa, B. Nuseibeh, Risk and argument: a risk-based argumentation method for practical security, http:\/\/re11.fbk.eu\/accepted"},{"key":"9_CR00099","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/978-3-642-03764-1_3","volume-title":"Transactions on Aspect-Oriented Software Development","author":"N Niu","year":"2009","unstructured":"N. Niu, Y. Yu, B. Gonz\u00e1lez-Baixauli, N. Ernst, J.C.S. do Prado Leite, J. Mylopoulos, Aspects across software life cycle: a goal-driven approach, in Transactions on Aspect-Oriented Software Development, ed. by S. Katz, H. Ossher, R. France, J.-M. J\u00e9z\u00e9quel, vol. VI (Springer, Berlin, 2009), pp. 83\u2013110"},{"key":"9_CR000910","doi-asserted-by":"crossref","unstructured":"M. Salifu, Y. Yu, B. Nuseibeh, Specifying monitoring and switching problems in context, in Requirements Engineering Conference, 2007. RE \u201907. 15th IEEE International, 2007, pp. 211\u2013220","DOI":"10.1109\/RE.2007.21"},{"key":"9_CR000911","doi-asserted-by":"publisher","first-page":"54","DOI":"10.4018\/jsse.2010102004","volume":"1","author":"A Nhlabatsi","year":"2010","unstructured":"A. Nhlabatsi, B. Nuseibeh, Y. Yu, Security requirements engineering for evolving software systems. Int. J. Secure Softw. Eng. 1, 54\u201373 (2010)","journal-title":"Int. J. Secure Softw. Eng."},{"key":"9_CR000912","unstructured":"N. Wilde, Understanding program dependencies, Carnegie Mellon University, Software Engineering Institute SEI-CM-26, 1990 (26 pages) (University of West Florida)"},{"key":"9_CR000913","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J Ferrante","year":"1987","unstructured":"J. Ferrante, K.J. Ottenstein, J.D. Warren, The program dependence graph and its use in optimization. ACM Trans. Prog. Lang. Syst. 9, 319\u2013349 (1987)","journal-title":"ACM Trans. Prog. Lang. Syst."},{"key":"9_CR000914","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1145\/143103.143129","volume":"27","author":"W Pugh","year":"1992","unstructured":"W. Pugh, D. Wonnacott, Eliminating false data dependences using the Omega test. SIGPLAN Not. 27, 140\u2013151 (1992)","journal-title":"SIGPLAN Not."},{"key":"9_CR000915","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1109\/71.342135","volume":"6","author":"W Pugh","year":"1995","unstructured":"W. Pugh, D. Wonnacott, Going beyond integer programming with the Omega test to eliminate false data dependences. IEEE Trans. Parallel Distribut. Syst. 6, 204\u2013211 (1995)","journal-title":"IEEE Trans. Parallel Distribut. Syst."},{"key":"9_CR000916","doi-asserted-by":"crossref","unstructured":"S.S. Yau, X. Zhang, Computer network intrusion detection, assessment and prevention based on security dependency relation, in 23rd International Computer Software and Applications Conference (IEEE Computer Society, Washington, DC, 1999), p. 86","DOI":"10.1109\/CMPSAC.1999.812681"},{"key":"9_CR000917","unstructured":"Island Hopping: Mitigating Undesirable Dependencies \u2013 TechNet Magazine Blog \u2013 Site Home \u2013 TechNet Blogs, http:\/\/blogs.technet.com\/b\/tnmag\/archive\/2008\/02\/27\/island-hopping-mitigating-undesirable-dependencies.aspx"},{"key":"9_CR000918","doi-asserted-by":"crossref","unstructured":"M. Weiser, Program slicing, in IEEE Transactions on Software Engineering. SE-10, 1984, pp. 352\u2013357","DOI":"10.1109\/TSE.1984.5010248"},{"key":"9_CR000919","doi-asserted-by":"crossref","unstructured":"A. Van Lamsweerde, R. Darimont, P. Massonet, Goal-directed elaboration of requirements for a meeting scheduler: problems and lessons learnt, in Proceedings of the Second IEEE International Symposium on Requirements Engineering (IEEE Computer Society, Washington, DC, 1995), p. 194","DOI":"10.1109\/ISRE.1995.512561"}],"container-title":["Aspect-Oriented Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38640-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T21:22:13Z","timestamp":1746048133000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-38640-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642386398","9783642386404"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38640-4_9","relation":{},"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"27 August 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}