{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:56:57Z","timestamp":1725793017445},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662436097"},{"type":"electronic","value":"9783662436103"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-43610-3_2","type":"book-chapter","created":{"date-parts":[[2014,4,23]],"date-time":"2014-04-23T09:00:22Z","timestamp":1398243622000},"page":"16-30","source":"Crossref","is-referenced-by-count":5,"title":["Capturing Security Requirements Using Essential Use Cases (EUCs)"],"prefix":"10.1007","author":[{"given":"Syazwani","family":"Yahya","sequence":"first","affiliation":[]},{"given":"Massila","family":"Kamalrudin","sequence":"additional","affiliation":[]},{"given":"Safiah","family":"Sidek","sequence":"additional","affiliation":[]},{"given":"John","family":"Grundy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"2_CR1","first-page":"53","volume":"3","author":"M. Alam","year":"2010","unstructured":"Alam, M.: Software Security Requirements Checklist. International Journal of Software Engineering, IJSE\u00a03(1), 53\u201362 (2010)","journal-title":"International Journal of Software Engineering, IJSE"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"McGraw, G.: Building Security. In: Software Security. IEEE Security and Privacy, pp. 80\u201383 (2004)","DOI":"10.1109\/MSECP.2004.1281254"},{"issue":"1","key":"2_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s00766-011-0141-0","volume":"17","author":"K. Schneider","year":"2011","unstructured":"Schneider, K., Knauss, E., Houmb, S., Islam, S., J\u00fcrjens, J.: Enhancing security requirements engineering by organizational learning. Requirements Engineering\u00a017(1), 35\u201356 (2011)","journal-title":"Requirements Engineering"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Paja, E., Dalpiaz, F., Poggianella, M., Roberti, P., Giorgini, P.: STS-tool: Socio-technical Security Requirements through social commitments. In: Conference on IEEE International Requirements Engineering, pp. 331\u2013332 (2012)","DOI":"10.1109\/RE.2012.6345830"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Hosking, J., Grundy, J.: Improving requirements quality using essential use case interaction patterns. In: Proceeding of the 33rd International Conference on Software Engineering - ICSE 2011, p. 531 (2011)","DOI":"10.1145\/1985793.1985866"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Elahi, G., Yu, E.: A Semi-automated Decision Support Tool for Requirements Trade-Off Analysis. In: IEEE 35th Annual Computer Software and Applications Conference, pp. 466\u2013475 (2011)","DOI":"10.1109\/COMPSAC.2011.67"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Grundy, J., Hosking, J.: Tool Support for Essential Use Cases to Better Capture Software Requirements, pp. 327\u2013336 (2010)","DOI":"10.1145\/1858996.1859047"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Mellado., D., et al.: A systematic review of security requirements engineering. Computer Standards and Interfaces (2010)","DOI":"10.1016\/j.csi.2010.01.006"},{"key":"2_CR9","unstructured":"Ding, W., Marchionini, G.: A Study on Video Browsing Strategies. Technical Report, University of Maryland (1997)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Fr\u00f6hlich, B., Plate, J.: The cubic mouse: A new device for three-dimensional input. In: Proceedings of the SIGCHI (2000)","DOI":"10.1145\/332040.332491"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Firesmith, D.: Specifying reusable security requirements. Journal of Object Technology (2004)","DOI":"10.21236\/ADA612733"},{"key":"2_CR12","unstructured":"Salini, P.: Survey and analysis on Security Requirements Engineering. Journal Computers and Electrical Electrical Engineering, \n                  \n                    http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790612001644\n                  \n                  \n                 (accessed October 1, 2012)"},{"key":"2_CR13","unstructured":"Corporation, M.: Simplified Implementation of the SDL. pp. 1\u201317 (2010)"},{"key":"2_CR14","unstructured":"Wiegers, K.E.: Software Requirements. O\u2019Reilly (2009)"},{"key":"2_CR15","series-title":"LNBIP","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-31069-0_5","volume-title":"Advanced Information Systems Engineering Workshops","author":"A. Souag","year":"2012","unstructured":"Souag, A., Salinesi, C., Comyn-Wattiau, I.: Ontologies for Security Requirements: A Literature Survey and Classification. In: Bajec, M., Eder, J. (eds.) CAiSE Workshops 2012. LNBIP, vol.\u00a0112, pp. 61\u201369. Springer, Heidelberg (2012)"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/11824633_6","volume-title":"Trust and Privacy in Digital Business","author":"A. Rodr\u00edguez","year":"2006","unstructured":"Rodr\u00edguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: Towards a UML 2.0 extension for the modeling of security requirements in business processes. In: Fischer-H\u00fcbner, S., Furnell, S., Lambrinoudakis, C. (eds.) TrustBus 2006. LNCS, vol.\u00a04083, pp. 51\u201361. Springer, Heidelberg (2006)"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/3-540-44895-0_12","volume-title":"Business Process Management","author":"M. Backes","year":"2003","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: Security in Business Process Engineering. In: van der Aalst, W.M.P., Weske, M. (eds.) BPM 2003. LNCS, vol.\u00a02678, pp. 168\u2013183. Springer, Heidelberg (2003)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Herrmann, G., et al.: Viewing Business Process Security from Different Perspectives. In: 11th International Bled Electronic Commerce Conference, Slovenia, pp. 89\u2013103 (1998)","DOI":"10.1080\/10864415.1999.11518343"},{"key":"2_CR19","unstructured":"The SANS Institute, Determining the Role of the IA \/ Security Engineer, InfoSec Reading Room (2010)"},{"key":"2_CR20","unstructured":"Kamalrudin, M.: Automated Support for Consistency Management and Validation of Requirements\u201d. PhD thesis. The University of Auckland (2011)"},{"key":"2_CR21","unstructured":"Myagmar.: Threat Modeling as a Basis for Security Requirements. In: Proceedings of the ACM Workshop on Storage Security and Survivability, pp. 94\u2013102 (2005)"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Viega, J.: Building Security Requirements with CLASP. In: Proceedings of the Workshop on Software Engineering for Secure Systems Building Trustworthy Applications, SESS 2005, pp. 1\u20137 (2010)","DOI":"10.1145\/1083200.1083207"},{"issue":"5","key":"2_CR23","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1016\/j.jss.2006.08.017","volume":"80","author":"M. Hussein","year":"2007","unstructured":"Hussein, M., Zulkernine, M.: Intrusion detection aware component-based systems: A specification-based framework. Journal of Systems and Software\u00a080(5), 700\u2013710 (2007)","journal-title":"Journal of Systems and Software"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Du, J., et al.: An Analysis for Understanding Software Security Requirement Methodologies. In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, pp. 141\u2013149 (2009)","DOI":"10.1109\/SSIRI.2009.14"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Giorgini, P., et al.: Modeling security requirements through ownership, permission and delegation. In: 13th IEEE International Conference on Requirements Engineering (RE 2005), pp. 167\u2013176 (2005)","DOI":"10.1109\/RE.2005.43"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Yahya, S., Kamalrudin, M., Sidek, S.: A Review on Tool Supports for Security Requirements Engineering. In: IEEE Conference on Open Systems, Sarawak, Malaysia (2013)","DOI":"10.1109\/ICOS.2013.6735072"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Paja, E., et al.: STS-tool: Socio-technical Security Requirements through social commitments. In: 2012 20th IEEE International Requirements Engineering Conference (RE), pp. 331\u2013332. IEEE (2012)","DOI":"10.1109\/RE.2012.6345830"},{"key":"2_CR28","unstructured":"Pavlidis, M., Islam, S.: SecTro: A CASE Tool for Modelling Security in Requirements Engineering using Secure Tropos. In: Proceedings of the CAiSE forum, CAiSE 2011, pp. 89\u201396 (2011)"},{"issue":"1","key":"2_CR29","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s00766-009-0093-9","volume":"15","author":"S.H. Houmb","year":"2010","unstructured":"Houmb, S.H., Islam, S., Knauss, E., J\u00fcrjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: An integration of Common Criteria, heuristics, and UMLsec. Requirements Engineering\u00a015(1), 63\u201393 (2010)","journal-title":"Requirements Engineering"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Mellado, D., Fern\u00e1ndez-medina, E., Piattini, M.: Security Requirements Engineering Process for Software Product Lines: A Case Study and Technologies SREPPLine. pp. 1\u20136 (2008)","DOI":"10.1109\/ICSEA.2008.14"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: ST-Tool: A CASE tool for security requirements engineering. In: Proceedings of 13th IEEE International Conference on Requirements Engineering, pp. 451\u2013452 (2005)","DOI":"10.1109\/RE.2005.67"},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Hosking, J.G., Grundy, J.C.: Improving Requirements Quality using Essential Use Case Interaction Patterns. In: ICSE 2011, Honolulu, Hawaii, USA (2011)","DOI":"10.1145\/1985793.1985866"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Kaindl, H., Constantine, L., Pastor, O., Sutcliffe, A., Zowghi, D.: How to Combine Requirements Engineering and Interaction Design? In: 16th IEEE International Requirements Engineering, RE 2008, Barcelona, Catalunya, Spain, pp. 299\u2013301 (2008)","DOI":"10.1109\/RE.2008.59"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Grundy, J., Hosking, J.: Managing Consistency between Textual Requirements. Abstract Interactions and Essential Use Cases, 327\u2013336 (2010)","DOI":"10.1109\/COMPSAC.2010.40"},{"key":"2_CR35","unstructured":"Yahya, S., Kamalrudin, M., Sidek, S.: The Use of Essential Use Cases (EUCs) to enhance the Process of Capturing Security Requirements for Accurate Secure Software. In: Proceeding of Software Engineering Postgraduates Workshop, SEPoW (2013)"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M.: Automated Software Tool Support for Checking the Inconsistency of Requirements. In: 24th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2009. IEEE (2009)","DOI":"10.1109\/ASE.2009.38"},{"key":"2_CR37","unstructured":"Constantine, L.L., Lockwood, A.D.L.: Software for Use: A Practical Guide to the Models and Methods of Usage-Centered Design. ACM Press\/Addison Wesley Longman, Inc. (1999)"},{"key":"2_CR38","unstructured":"Develop functional security requirements in Document security-relevant requirements retrieve, \n                  \n                    https:\/\/www.owasp.org\/index.php\/Document_security-relevant_requirements\n                  \n                  \n                 (accessed July 15, 2013)"},{"key":"2_CR39","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/3-540-44617-6_31","volume-title":"Cognitive Technology: Instruments of Mind","author":"A.F. Blackwell","year":"2001","unstructured":"Blackwell, A.F., et al.: Cognitive Dimensions of Notations: Design Tools for Cognitive Technology. In: Beynon, M., Nehaniv, C.L., Dautenhahn, K. (eds.) CT 2001. LNCS (LNAI), vol.\u00a02117, pp. 325\u2013341. Springer, Heidelberg (2001)"},{"key":"2_CR40","unstructured":"What is the Common Criteria (CC) in Common Criteria and Mutual Recognition retrieve from, \n                  \n                    http:\/\/www.cybersecurity.my\/myc\n                  \n                  \n                 (accessed August 5, 2013)"},{"key":"2_CR41","unstructured":"Biddle, R., Noble, J., Tempero, E.: Essential use cases and responsibility in object-oriented development. In: Proceeding of the Twenty-Fifth Australasian Conference on Computer Science, Melbourne, Victoria, Australia, pp. 7\u201316. ACM (2002)"},{"key":"2_CR42","first-page":"85","volume-title":"Proceedings of the 2002 Conference on Pattern languages of programs, CRPIT 2002","author":"R. Biddle","year":"2002","unstructured":"Biddle, R., Noble, J., Tempero, E.: Patterns for Essential Use Case Bodies. In: Proceedings of the 2002 Conference on Pattern languages of programs, CRPIT 2002, vol.\u00a013, pp. 85\u201398. Computer Society, Australian (2002)"}],"container-title":["Communications in Computer and Information Science","Requirements Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-43610-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T13:23:58Z","timestamp":1558877038000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-43610-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662436097","9783662436103"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-43610-3_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}