{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:51:10Z","timestamp":1725745870277},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405105"},{"type":"electronic","value":"9783642405112"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40511-2_13","type":"book-chapter","created":{"date-parts":[[2013,8,18]],"date-time":"2013-08-18T21:53:28Z","timestamp":1376862808000},"page":"178-194","source":"Crossref","is-referenced-by-count":4,"title":["Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods"],"prefix":"10.1007","author":[{"given":"Kristian","family":"Beckers","sequence":"first","affiliation":[]},{"given":"Stephan","family":"Fa\u00dfbender","sequence":"additional","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]},{"given":"Federica","family":"Paci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Alebrahim, A., Hatebur, D., Heisel, M.: A method to derive software architectures from quality requirements. In: Thu, T.D., Leung, K. (eds.) Proceedings of the 18th Asia-Pacific Software Engineering Conference (APSEC), pp. 322\u2013330. IEEE Computer Society Press (2011)","DOI":"10.1109\/APSEC.2011.29"},{"key":"13_CR2","unstructured":"Beckers, K., Fa\u00dfbender, S., Heisel, M., Meis, R.: A problem-based approach for computer aided privacy threat identification. In: Privacy Forum. LNCS. Springer (2012) (to appear)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1007\/978-3-642-28714-5_23","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"K. Beckers","year":"2012","unstructured":"Beckers, K., Fa\u00dfbender, S., K\u00fcster, J.-C., Schmidt, H.: A pattern-based method for identifying and analyzing laws. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol.\u00a07195, pp. 256\u2013262. Springer, Heidelberg (2012)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Choppy, C., Hatebur, D., Heisel, M.: Systematic architectural design based on problem patterns. In: Avgeriou, P., Grundy, J., Hall, J., Lago, P., Mistrik, I. (eds.) Relating Software Requirements and Architectures, ch. 9, pp. 133\u2013159. Springer (2011)","DOI":"10.1007\/978-3-642-21001-3_9"},{"key":"13_CR5","unstructured":"Classen, A., Heymans, P., Laney, R., Nuseibeh, B., Tun, T.T.: On the structure of problem variability: From feature diagrams to problem frames. In: Proceedings of International Workshop on Variability Modeling of Software-Intensive Systems, Limerick, Ireland, pp. 109\u2013118 (January 2007)"},{"key":"13_CR6","unstructured":"C\u00f4t\u00e9, I.: A Systematic Approach to Software Evolution. Deutscher Wissenschafts-Verlag (DWV) Baden-Baden (2012) (to appear)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"C\u00f4t\u00e9, I., Hatebur, D., Heisel, M., Schmidt, H.: UML4PF \u2013 a tool for problem-oriented requirements analysis. In: Proceedings of the International Conference on Requirements Engineering (RE), pp. 349\u2013350. IEEE Computer Society Press (2011)","DOI":"10.1109\/RE.2011.6051670"},{"issue":"1","key":"13_CR8","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s00766-009-0092-x","volume":"15","author":"B. Fabian","year":"2010","unstructured":"Fabian, B., G\u00fcrses, S., Heisel, M., Santen, T., Schmidt, H.: A comparison of security requirements engineering methods. Requirements Engineering \u2013 Special Issue on Security Requirements Engineering\u00a015(1), 7\u201340 (2010)","journal-title":"Requirements Engineering \u2013 Special Issue on Security Requirements Engineering"},{"key":"13_CR9","unstructured":"Hatebur, D.: Pattern and Component-based Development of Dependable Systems. Deutscher Wissenschafts-Verlag (DWV) Baden-Baden (September 2012)"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-04468-7_25","volume-title":"Computer Safety, Reliability, and Security","author":"D. Hatebur","year":"2009","unstructured":"Hatebur, D., Heisel, M.: A foundation for requirements analysis of dependable software. In: Buth, B., Rabe, G., Seyfarth, T. (eds.) SAFECOMP 2009. LNCS, vol.\u00a05775, pp. 311\u2013325. Springer, Heidelberg (2009)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Hatebur, D., Heisel, M.: A UML profile for requirements analysis of dependable software. In: SAFECOMP, pp. 317\u2013331 (2010)","DOI":"10.1007\/978-3-642-15651-9_24"},{"key":"13_CR12","unstructured":"Jackson, M.: Problem Frames. Analyzing and structuring software development problems. Addison-Wesley (2001)"},{"key":"13_CR13","first-page":"15","volume-title":"Proceedings 17th Int. Conf. on Software Engineering","author":"M. Jackson","year":"1995","unstructured":"Jackson, M., Zave, P.: Deriving specifications from requirements: an example. In: Proceedings 17th Int. Conf. on Software Engineering, pp. 15\u201324. ACM Press, Seattle (1995)"},{"issue":"6","key":"13_CR14","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1145\/605466.605485","volume":"27","author":"E. Letier","year":"2002","unstructured":"Letier, E., van Lamsweerde, A.: Deriving operational software specifications from system goals. SIGSOFT Softw. Eng. Notes\u00a027(6), 119\u2013128 (2002)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Liu, L., Jin, Z.: Integrating goals and problem frames in requirements analysis. In: 14th IEEE International Conference Requirements Engineering, pp. 349\u2013350 (2006)","DOI":"10.1109\/RE.2006.34"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis: The CORAS Approach, 1st edn. Springer (2010)","DOI":"10.1007\/978-3-642-12323-8"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Massacci, F., Mylopoulos, J., Paci, F., Tun, T., Yu, Y.: An extended ontology for security requirements. In: Advanced Information Systems Engineering Workshops, vol.\u00a083, pp. 622\u2013636 (June 2011)","DOI":"10.1007\/978-3-642-22056-2_64"},{"key":"13_CR18","series-title":"SCI","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-642-05183-8_6","volume-title":"Advances in Intelligent Information Systems","author":"F. Massacci","year":"2010","unstructured":"Massacci, F., Mylopoulos, J., Zannone, N.: Security requirements engineering: The SI* modeling language and the secure tropos methodology. In: Ras, Z.W., Tsay, L.-S. (eds.) Advances in Intelligent Information Systems. SCI, vol.\u00a0265, pp. 147\u2013174. Springer, Heidelberg (2010)"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Supakkul, S., Chung, L.: Extending problem frames to deal with stakeholder problems: An agent- and goal-oriented approach. In: Jacobson Jr., M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol.\u00a05867, pp. 389\u2013394. Springer, Heidelberg (2009)","DOI":"10.1145\/1529282.1529366"},{"key":"13_CR20","unstructured":"van Lamsweerde, A.: Requirements Engineering: From System Goals to UML Models to Software Specifications, 1st edn. John Wiley & Sons (2009)"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems and HCI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40511-2_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T18:57:56Z","timestamp":1688410676000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40511-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405105","9783642405112"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40511-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}