{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:55:41Z","timestamp":1742918141389,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":28,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811032554"},{"type":"electronic","value":"9789811032561"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-981-10-3256-1_7","type":"book-chapter","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T06:27:04Z","timestamp":1478500024000},"page":"97-112","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Automated Support to Capture and Validate Security Requirements for Mobile Apps"],"prefix":"10.1007","author":[{"given":"Noorrezam","family":"Yusop","sequence":"first","affiliation":[]},{"given":"Massila","family":"Kamalrudin","sequence":"additional","affiliation":[]},{"given":"Safiah","family":"Sidek","sequence":"additional","affiliation":[]},{"given":"John","family":"Grundy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,8]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s00766-011-0141-0","volume":"17","author":"K Schneider","year":"2011","unstructured":"Schneider, K., Knauss, E., Houmb, S., Islam, S., Jurjens, J.: Enhancing security requirements engineering by organizational learning. Requirements Eng. 17(1), 35\u201356 (2011)","journal-title":"Requirements Eng."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Grundy, J.: Generating essential user interface prototypes to validate requirements. In: Proceedings of the 2011 26th IEEE\/ACM International Conference on Automated Software Engineering, pp. 564\u2013567 (2011)","DOI":"10.1109\/ASE.2011.6100126"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Paja, E., Dalpiaz, F., Poggianella, M., Roberti, P.: STS-tool: socio-technical security requirements through social commitments. In: Proceeding of the Conference 21st IEEE International Requirements Engineering Conference (RE), pp. 331\u2013332 (2012)","DOI":"10.1109\/RE.2012.6345830"},{"key":"7_CR4","unstructured":"Yusop, N., Kamalrudin, M., Yusof, M.M., Sidek, S.: Challenges in eliciting security attributes for mobile application development. In: Proceeding of the Conference KSII The 7th International Conference on Internet (ICONI), Kuala Lumpur, Malaysia (2015)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Yahya, S., Kamalrudin, M., Safiah, S., Grundy, J.: Capturing security requirements using essential use cases (EUCs). In: First Asia Pacific Requirements Engineering Symposium, APRES 2014, pp. 16\u201330. Auckland, New Zealand, 28\u201329 April 2014","DOI":"10.1007\/978-3-662-43610-3_2"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Paja, E., Dalpiaz, F., Poggianella, M., Roberti, P.: STS-tool: socio-technical security requirements through social commitments. In: Proceeding of the Conference 21st IEEE International Requirements Engineering Conference (RE), pp. 331\u2013332 (2012)","DOI":"10.1109\/RE.2012.6345830"},{"key":"7_CR7","unstructured":"SANS Institute, Determining the Role of the IA\/Security Engineer, InfoSec Reading (2010)"},{"key":"7_CR8","volume-title":"Software for Use: A Practical Guide to the Models and Methods of Usage-Centered Design","author":"LL Constantine","year":"1999","unstructured":"Constantine, L.L., Lockwood, L.A.: Software for Use: A Practical Guide to the Models and Methods of Usage-Centered Design. Pearson Education, Upper Saddle River (1999)"},{"key":"7_CR9","unstructured":"Biddle, R., Noble, J., Tempero, E.: Essential use cases and responsibility in object oriented development. In: Proceeding of the 25th Australasian Computer Science Conference. Australian Computer Society, Inc., Chicago (2002). vol. 24(1), 7\u201316 (2002)"},{"key":"7_CR10","unstructured":"Constantine, L.L., Lockwood, A.D.L.: Structure and style in use cases for user interface design. In: Object Modeling and User Interface Design: Designing Interactive Systems. Addison-Wesley, Longman Publishing Co. Inc., pp. 245\u2013279 (2001)"},{"key":"7_CR11","unstructured":"Ambler, S.W.: Essential (Low Fidelity) User Interface prototypes (2016). \n                    www.agilemodeling.com\/artifacts\/essentialUI.htm"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Constantine, L.L., Lockwood, A.D.L.: Usage-centered software engineering: an agile approach to integrating users, user interfaces, and usability into software engineering practice. In: Proceeding of 25th International Conference on Software Engineering (ICSE 2003). IEEE Computer Society, Portland, Oregon (2003)","DOI":"10.1109\/ICSE.2003.1201267"},{"key":"7_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511584077","volume-title":"The Object Primer: Agile Model-Driven Development with UML 2.0","author":"SW Ambler","year":"2004","unstructured":"Ambler, S.W.: The Object Primer: Agile Model-Driven Development with UML 2.0, 3rd edn. Cambridge University Press, New York (2004)","edition":"3"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Grundy, J., Hosking, J.: Tool support for essential use cases to better capture software requirements. In: Proceeding of IEEE\/ACM International Conference on Automated Software Engineering, pp. 327\u2013336 (2010)","DOI":"10.1145\/1858996.1859047"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M.: Automated software tool support for checking the inconsistency of requirements. In: 24th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2009. IEEE (2009)","DOI":"10.1109\/ASE.2009.38"},{"key":"7_CR16","unstructured":"Kamalrudin, M.: Automated support for consistency management and validation of requirements, Ph.D. thesis. The University of Auckland (2011)"},{"key":"7_CR17","unstructured":"Yusop, N., Kamalrudin, M., Sidek, S.: Capturing security requirements of mobile apps using MobiMEReq. In: Proceeding of 3rd Asia Pacific Conference on Advanced Research, Melbourne, Victoria, Australia (2016)"},{"issue":"33","key":"7_CR18","first-page":"123","volume":"77","author":"N Yusop","year":"2015","unstructured":"Yusop, N., Kamalrudin, M., Sidek, S.: Security requirements validation for mobile apps: a systematic literature review. Jurnal Teknologi (Sci. Eng.) 77(33), 123\u2013137 (2015)","journal-title":"Jurnal Teknologi (Sci. Eng.)"},{"key":"7_CR19","first-page":"67","volume":"1","author":"VS Kumar","year":"2010","unstructured":"Kumar, V.S., Kumar, M.: Test case prioritization using fault severity. Int. J. Comput. Sci. Technol. 1, 67\u201371 (2010)","journal-title":"Int. J. Comput. Sci. Technol."},{"key":"7_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5217-8","volume-title":"Mathematical Principles of Fuzzy Logic","author":"V Novak","year":"1999","unstructured":"Novak, V., Perfilieva, I., Mockor, J.: Mathematical Principles of Fuzzy Logic. Kluwer Academic, Dodrecht (1999)"},{"key":"7_CR21","unstructured":"Bhasin, H., Gupta, S., Kathuria, M.: Implementation of regression testing using fuzzy logic. Int. J. Appl. Innov. Eng. Manage. 2(4), (2013)"},{"key":"7_CR22","unstructured":"Rhee, K., Kim, H., Na, H.Y.: Security test methodology for an agent of a mobile device management system. Int. J. Secur. Appl. 6(2), (2012)"},{"key":"7_CR23","first-page":"9","volume":"5","author":"FN Dezfouli","year":"2013","unstructured":"Dezfouli, F.N., Deghantanha, A., Mahmood, R., Sani, N.F.M., Shamsuddin, S.: A data-centric model for smartphone security. IJACT 5, 9\u201317 (2013)","journal-title":"IJACT"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Gilbert, P., Cun, B.: Vision: automated security validation of mobile apps at app markets. In: Proceeding of the 2nd International Workshop on Mobile Cloud Computing and Services (MCS 2011), pp. 21\u201326, New York, USA (2011)","DOI":"10.1145\/1999732.1999740"},{"key":"7_CR25","unstructured":"Singaraju, G., Hoon, B.: Concord: a secure mobile data authorization framework for regulatory compliance. In: Proceeding of the 22nd Large Installation System Administration Conference (LISA 2008), pp. 91\u2013102 (2008)"},{"key":"7_CR26","unstructured":"Ying, L., Dinglong, H., Haiyi, Z., Rau, P.: Users\u2019 perception of mobile information security. Hacker Journals White Papers. Computer Security Knowledge Base Portal (2007)"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Grundy, J., Hosking, J.: Managing consistency between textual requirements. Abstract interactions and essential use cases. In: Proceeding of 2010 IEEE 34th Annual Computer Software and Applications Conference, pp. 327\u2013336 (2010)","DOI":"10.1109\/COMPSAC.2010.40"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Grundy, J., Hosking, J.: Improving requirements quality using essential use case interaction patterns. In: Proceedings of 2011 International Conference Software Engineering, Honolulu, Hawaii, USA (2011)","DOI":"10.1145\/1985793.1985866"}],"container-title":["Communications in Computer and Information Science","Requirements Engineering Toward Sustainable World"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3256-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T08:46:31Z","timestamp":1558514791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3256-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9789811032554","9789811032561"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3256-1_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"8 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APRES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asia Pacific Requirements Engineering Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nagoya","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aprec2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.apres2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}