{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T01:46:00Z","timestamp":1767923160568,"version":"3.49.0"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811077951","type":"print"},{"value":"9789811077968","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7796-8_6","type":"book-chapter","created":{"date-parts":[[2018,1,4]],"date-time":"2018-01-04T01:14:01Z","timestamp":1515028441000},"page":"73-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Template for Writing Security Requirements"],"prefix":"10.1007","author":[{"given":"Massila","family":"Kamalrudin","sequence":"first","affiliation":[]},{"given":"Nuridawati","family":"Mustafa","sequence":"additional","affiliation":[]},{"given":"Safiah","family":"Sidek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,5]]},"reference":[{"issue":"4","key":"6_CR1","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1016\/j.jare.2014.03.001","volume":"5","author":"H El-Hadary","year":"2014","unstructured":"El-Hadary, H., El-Kassas, S.: Capturing security requirements for software systems. J. Adv. Res. 5(4), 463\u2013472 (2014)","journal-title":"J. Adv. Res."},{"issue":"2","key":"6_CR2","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/MSP.2009.56","volume":"2","author":"M Zhivich","year":"2009","unstructured":"Zhivich, M., Cunningham, R.K.: The real cost of software errors. IEEE Secur. Priv. 2(2), 87\u201390 (2009)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR3","doi-asserted-by":"crossref","first-page":"1785","DOI":"10.1016\/j.compeleceng.2012.08.008","volume":"38","author":"P Salini","year":"2012","unstructured":"Salini, P., Kanmani, S.: Survey and analysis on security requirements engineering. Comput. Electr. Eng. 38, 1785\u20131797 (2012)","journal-title":"Comput. Electr. Eng."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Riaz, M., King, J., Slankas, J., Williams, L.: Hidden in plain sight: automatically identifying security requirements from natural language artifacts. In: IEEE 22nd International Requirements Engineering Conference, RE 2014, pp. 183\u2013192 (2014)","DOI":"10.1109\/RE.2014.6912260"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Yu, E.S.K.: Towards modelling and reasoning support for early-phase requirements engineering. In: IEEE 3rd International Symposium on Requirements Engineering, ISRE 1997, pp. 226\u2013235 (1997)","DOI":"10.1109\/ISRE.1997.566873"},{"key":"6_CR6","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.csi.2010.01.006","volume":"32","author":"D Mellado","year":"2010","unstructured":"Mellado, D., Blanco, C., S\u00e1nchez, L.E., Fern\u00e1ndez-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32, 153\u2013165 (2010)","journal-title":"Comput. Stand. Interfaces"},{"issue":"1","key":"6_CR7","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s00766-009-0093-9","volume":"15","author":"SH Houmb","year":"2010","unstructured":"Houmb, S.H., Islam, S., Knauss, E., J\u00fcrjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requir. Eng. 15(1), 63\u201393 (2010).","journal-title":"Requir. Eng."},{"issue":"1","key":"6_CR8","first-page":"32","volume":"3","author":"A Banerjee","year":"2015","unstructured":"Banerjee, A., Sharma, M., Banerjee, C., Pandey, S.K.: Research on security requirements engineering: problems and prospects. MATRIX Acad. Int. Online J. Eng. Technol. 3(1), 32\u201335 (2015)","journal-title":"MATRIX Acad. Int. Online J. Eng. Technol."},{"issue":"1","key":"6_CR9","doi-asserted-by":"crossref","first-page":"53","DOI":"10.5381\/jot.2003.2.1.c6","volume":"2","author":"DG Firesmith","year":"2003","unstructured":"Firesmith, D.G.: Engineering security requirements. J. Object Technol. 2(1), 53\u201368 (2003)","journal-title":"J. Object Technol."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Jindal, R., Malhotra, R., Jain, A.: Automated classification of security requirements. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI 2016), pp. 2027\u20132033 (2016)","DOI":"10.1109\/ICACCI.2016.7732349"},{"issue":"1","key":"6_CR11","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"CB Haley","year":"2008","unstructured":"Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133\u2013153 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"6_CR12","unstructured":"CCRA: Common Criteria for Information Technology Security Evaluation (Part 2: Security Functional Components) (2017)"},{"key":"6_CR13","unstructured":"CCRA: Common Criteria for Information Technology Security Evaluation (Part 1: Introduction and General Model) (2017)"},{"key":"6_CR14","unstructured":"ISO\/IEC: International Standard ISO\/IEC 27000 (Information Technology \u2014 Security Techniques \u2014 Information Security Management Systems \u2014 Overview and Vocabulary) (2016)"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Grundy, J., Hosking, J.: Tool support for essential use cases to better capture software requirements. In: ACM the International Conference on Automated Software Engineering, ASE 2010, pp. 255\u2013264 (2010)","DOI":"10.1145\/1858996.1859047"},{"key":"6_CR16","unstructured":"Chua, F.-F., Ngazizan, S.A., Hassan, M.: Design and implementation of airline reservation web services using service-oriented architecture. In: World Congress on Engineering 2010 (2010)"},{"key":"6_CR17","unstructured":"S.C.P. (SCP): EHR Functional Requirements (2009). https:\/\/nyehealth.org\/wp-content\/uploads\/2012\/07\/Version_2_2_EHR_Functional_Requirements-16_Nov_09.pdf . Accessed 30 Aug 2017"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Riaz, M., Stallings, J., Singh, M.P., Slankas, J., Williams, L.: DIGS \u2013 a framework for discovering goals for security requirements engineering. In: ACM International Symposium on Empirical Software Engineering and Measurement (ESEM 2016) (2016)","DOI":"10.1145\/2961111.2962599"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Riaz, M., Elder, S., Williams, L.: Systematically developing prevention, detection, and response patterns for security requirements. In: The 3rd International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) (2016)","DOI":"10.1109\/REW.2016.025"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Riaz, M., Slankas, J., King, J., Williams, L.: Using templates to elicit implied security requirements from functional requirements - a controlled experiment. In: ACM the 8th International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, p. 22 (2014)","DOI":"10.1145\/2652524.2652532"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Motil, A., Hamid, B., Lanusse, A., Bruel, J.-M., Motii, A., Hamid, B., Lanusse, A., Jean-Michel, B.: Guiding the selection of security patterns based on security requirements and pattern classification. In: ACM the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015, pp. 10:1\u201310:17 (2015)","DOI":"10.1145\/2855321.2855332"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Beckers, K., C\u00f4t\u00e9, I., Goeke, L.: A catalog of security requirements patterns for the domain of cloud computing systems. In: ACM the 29th Symposium on Applied Computing, pp. 337\u2013342 (2014)","DOI":"10.1145\/2554850.2554921"},{"key":"6_CR23","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-662-43610-3_2","volume-title":"Requirements Engineering","author":"S Yahya","year":"2014","unstructured":"Yahya, S., Kamalrudin, M., Sidek, S., Grundy, J.: Capturing security requirements using Essential Use Cases (EUCs). In: Zowghi, D., Jin, Z. (eds.) Requirements Engineering. CCIS, vol. 432, pp. 16\u201330. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43610-3_2"},{"key":"6_CR24","first-page":"97","volume":"671","author":"N Yusop","year":"2016","unstructured":"Yusop, N., Kamalrudin, M., Sidek, S., Grundy, J.: Automated support to capture and validate security requirements for Mobile Apps. Commun. Comput. Inf. Sci. 671, 97\u2013112 (2016)","journal-title":"Commun. Comput. Inf. Sci."},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Salini, P., Kanmani, S.: Elicitation of security requirements for e-health system by applying Model Oriented Security Requirements Engineering (MOSRE) framework. In: ACM the Second International Conference on Computational Science, Engineering and Information Technology, CCSEIT 2012, pp. 126\u2013131 (2012)","DOI":"10.1145\/2393216.2393238"}],"container-title":["Communications in Computer and Information Science","Requirements Engineering for Internet of Things"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7796-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T20:38:26Z","timestamp":1570567106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7796-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811077951","9789811077968"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7796-8_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}