{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T11:06:10Z","timestamp":1707908770737},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2014,2,20]],"date-time":"2014-02-20T00:00:00Z","timestamp":1392854400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Requirements Eng"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s00766-014-0204-0","type":"journal-article","created":{"date-parts":[[2014,2,19]],"date-time":"2014-02-19T18:49:07Z","timestamp":1392835747000},"page":"363-382","source":"Crossref","is-referenced-by-count":3,"title":["Conviviality-driven access control policy"],"prefix":"10.1007","volume":"20","author":[{"given":"Donia","family":"El Kateb","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]},{"given":"Assaad","family":"Moawad","sequence":"additional","affiliation":[]},{"given":"Patrice","family":"Caire","sequence":"additional","affiliation":[]},{"given":"Gr\u00e9gory","family":"Nain","sequence":"additional","affiliation":[]},{"given":"Tejeddine","family":"Mouelhi","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Le Traon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,20]]},"reference":[{"key":"204_CR1","unstructured":"Ackerman M (1999) Usability and security. In: Proceedings of the network and distributed system security symposium. The Internet Society"},{"key":"204_CR2","doi-asserted-by":"crossref","unstructured":"Asnar Y, Li T, Massacci F, Paci F (2011) Computer aided threat identification. In: Proceedings of 13th IEEE conference on commerce and enterprise computing, pp. 145\u2013152. IEEE","DOI":"10.1109\/CEC.2011.13"},{"issue":"1","key":"204_CR3","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D Basin","year":"2006","unstructured":"Basin D, Doser J, Lodderstedt T (2006) Model driven security: from uml models to access control infrastructures. ACM Trans Softw Eng Methodol 15(1):39\u201391","journal-title":"ACM Trans Softw Eng Methodol"},{"issue":"1","key":"204_CR4","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1016\/j.intcom.2010.07.003","volume":"23","author":"G Baxter","year":"2011","unstructured":"Baxter G, Sommerville I (2011) Socio-technical systems: from design methods to systems engineering. Interact Comput 23(1):4\u201317","journal-title":"Interact Comput"},{"issue":"3","key":"204_CR5","doi-asserted-by":"crossref","first-page":"27","DOI":"10.4018\/jwsr.2006070102","volume":"3","author":"E Bertino","year":"2006","unstructured":"Bertino E, Squicciarini AC, Martino L, Paci F (2006) An adaptive access control model for web services. Int J Web Serv Res 3(3):27\u201360","journal-title":"Int J Web Serv Res"},{"key":"204_CR6","doi-asserted-by":"crossref","unstructured":"Boehm B, Egyed A (1998) Software requirements negotiation: some lessons learned. In: Proceedings of the 20th international conference on software engineering. IEEE, pp. 503\u2013506","DOI":"10.1109\/ICSE.1998.671616"},{"key":"204_CR7","unstructured":"Boella G, Sauro L, van der Torre LWN (2004) Social viewpoints on multiagent systems. In: AAMAS. IEEE Computer Society, pp. 1358\u20131359"},{"key":"204_CR8","unstructured":"Boella G, van der Torre L, Villata S (2009) Four ways to change coalitions: agents, dependencies, norms and internal dynamics. In: Proceedings of the 2nd multi-agent logics, languages, and organisations federated workshops, CEUR Workshop Proceedings, vol. 494. CEUR-WS.org"},{"issue":"6","key":"204_CR9","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1016\/j.ijar.2009.02.008","volume":"50","author":"E Bonzon","year":"2009","unstructured":"Bonzon E, Lagasquie-Schiex MC, Lang J (2009) Dependencies between players in boolean games. Int J Approx Reason 50(6):899\u2013914","journal-title":"Int J Approx Reason"},{"key":"204_CR10","doi-asserted-by":"crossref","unstructured":"Braz C, Seffah A, M\u2019Raihi D (2007) Designing a trade-off between usability and security: a metrics based-model. In: Baranauskas C, Palanque P, Abascal J, Diniz Junqueira Barbosa S (eds) Human\u2013computer interaction\u2014INTERACT 2007, LNCS 4663. Springer, Berlin, pp. 114\u2013126","DOI":"10.1007\/978-3-540-74800-7_9"},{"issue":"3","key":"204_CR11","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P Bresciani","year":"2004","unstructured":"Bresciani P, Giorgini P, Giunchiglia F, Mylopoulos J, Perini A (2004) TROPOS: An agent-oriented software development methodology. Auton Agent Multi Agent Syst 8(3):203\u2013236","journal-title":"Auton Agent Multi Agent Syst"},{"key":"204_CR12","doi-asserted-by":"crossref","unstructured":"Bryl V, Massacci F, Mylopoulos J, Zannone N (2006) Designing security requirements models through planning. In: Proceedings of 18th international conference on advanced information systems engineering, LNCS 4001. Springer, Berlin, pp. 33\u201347","DOI":"10.1007\/11767138_4"},{"issue":"1","key":"204_CR13","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s00766-008-0073-5","volume":"14","author":"V Bryl","year":"2009","unstructured":"Bryl V, Giorgini P, Mylopoulos J (2009) Designing socio-technical systems: from stakeholder goals to social networks. Requir Eng 14(1):47\u201370","journal-title":"Requir Eng"},{"key":"204_CR14","unstructured":"Caire P (2010) New tools for conviviality: masks, norms, ontology, requirements and measures. Ph.D. thesis, Luxembourg University, Luxembourg"},{"issue":"8","key":"204_CR15","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1093\/comjnl\/bxp012","volume":"53","author":"P Caire","year":"2009","unstructured":"Caire P, van der Torre L (2009) Convivial ambient technologies: requirements, ontology and design. Comput J 53(8):1229\u20131256","journal-title":"Comput J"},{"key":"204_CR16","unstructured":"Caire P, van der Torre L (2009) A conviviality measure for early requirement phase of multiagent system design. In: Normative multiagent systems, no. 09121 in Dagstuhl seminar proceedings. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany"},{"key":"204_CR17","unstructured":"Caire P, van der Torre L (2009) Temporal dependence networks for the design of convivial multiagent systems. In: Proceedings of the 8th international joint conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp. 1317\u20131318"},{"key":"204_CR18","unstructured":"Caire P, Villata S, Boella G, van der Torre L (2008) Conviviality masks in multiagent systems. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp. 1265\u20131268"},{"key":"204_CR19","unstructured":"Caire P, Villata S, Boella G, van der Torre L (2008) Conviviality masks in multiagent systems. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp. 1265\u20131268"},{"key":"204_CR20","unstructured":"Caire P, Alcade B, van der Torre L, Sombattheera C (2011) Conviviality measures. In: Proceedings of the 10th international joint conference on autonomous agents and multiagent systems. International Foundation for Autonomous Agents and Multiagent Systems, pp. 895\u2013902"},{"key":"204_CR21","unstructured":"Caire P, Bikakis A, Efthymiou V (2012) Conviviality by design. In: Proceedings of symposium on social computing\u2014social cognition\u2014social networks and multiagent systems"},{"key":"204_CR22","doi-asserted-by":"crossref","first-page":"208","DOI":"10.5840\/protosociology200318\/198","volume":"18","author":"C Castelfranchi","year":"2003","unstructured":"Castelfranchi C (2003) The micro-macro constitution of power. Protosociology 18:208\u2013269","journal-title":"Protosociology"},{"key":"204_CR23","volume-title":"Introduction to algorithms","author":"TH Cormen","year":"2001","unstructured":"Cormen TH, Leiserson CE, Rivest RL, Stein C (2001) Introduction to algorithms. 2nd edn. The MIT Press, Cambridge, MA","edition":"2"},{"issue":"14","key":"204_CR24","doi-asserted-by":"crossref","first-page":"979","DOI":"10.1016\/S0950-5849(03)00097-1","volume":"45","author":"R Crook","year":"2003","unstructured":"Crook R, Ince D, Nuseibeh B (2003) Modelling access policies using roles in requirements engineering. Inf Softw Technol 45(14):979\u2013991","journal-title":"Inf Softw Technol"},{"key":"204_CR25","doi-asserted-by":"crossref","unstructured":"Damen S, Zannone N (2013) Privacy implications of privacy settings and tagging in facebook. In: Proceedings of the 10th VLDB workshop on secure data management. Springer, Berlin","DOI":"10.1007\/978-3-319-06811-4_16"},{"key":"204_CR26","doi-asserted-by":"crossref","unstructured":"Damianou N, Dulay N, Lupu E, Sloman M (2001) The ponder policy specification language. In: Proceedings of the international workshop on policies for distributed systems and networks, LNCS 1995. Springer, Berlin, pp. 18\u201338","DOI":"10.1007\/3-540-44569-2_2"},{"key":"204_CR27","doi-asserted-by":"crossref","unstructured":"Dardenne A, van Lamsweerde A, Fickas S (1993) Goal-directed requirements acquisition. In: Proceedings of the 6th international workshop on software specification and design. Elsevier, Amsterdam, pp. 3\u201350","DOI":"10.1016\/0167-6423(93)90021-G"},{"key":"204_CR28","volume-title":"Diagram analysis report: use cases for conviviality and privacy in ambient intelligent systems","author":"V Efthymiou","year":"2012","unstructured":"Efthymiou V, Caire P (2012) Diagram analysis report: use cases for conviviality and privacy in ambient intelligent systems. University of Luxembourg, SnT, Luxembourg"},{"issue":"7","key":"204_CR29","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/j.datak.2009.02.004","volume":"68","author":"G Elahi","year":"2009","unstructured":"Elahi G, Yu ESK (2009) Modeling and analysis of security trade-offs\u2014a goal oriented approach. Data Knowl Eng 68(7):579\u2013598","journal-title":"Data Knowl Eng"},{"issue":"1","key":"204_CR30","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/s00766-009-0090-z","volume":"15","author":"G Elahi","year":"2010","unstructured":"Elahi G, Yu ESK, Zannone N (2010) A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities. Requir Eng 15(1):41\u201362","journal-title":"Requir Eng"},{"key":"204_CR31","doi-asserted-by":"crossref","first-page":"31","DOI":"10.2307\/2089716","volume":"27","author":"R Emerson","year":"1962","unstructured":"Emerson R (1962) Power-dependence relations. Am Sociol Rev 27:31\u201341","journal-title":"Am Sociol Rev"},{"key":"204_CR32","unstructured":"eXtensible Access Control Markup Language (XACML) (2012) Version 3.0. OASIS Standard, OASIS. http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.pdf"},{"key":"204_CR33","doi-asserted-by":"crossref","unstructured":"Flechais I, Sasse MA, Hailes SMV (2003) Bringing security home: a process for developing secure and usable systems. In: Proceedings of the 2003 workshop on new security paradigms. ACM, pp. 49\u201357","DOI":"10.1145\/986655.986664"},{"issue":"1","key":"204_CR34","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1504\/IJESDF.2007.013589","volume":"1","author":"I Flechais","year":"2007","unstructured":"Flechais I, Mascolo C, Sasse MA (2007) Integrating security and usability into the requirements and design process. Int J Electron Secur Digit Forensic 1(1):12\u201326","journal-title":"Int J Electron Secur Digit Forensic"},{"issue":"3","key":"204_CR35","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/S0164-1212(00)00018-2","volume":"53","author":"PG Frankl","year":"2000","unstructured":"Frankl PG, Weyuker EJ (2000) Testing software to detect and reduce risk. J Syst Softw 53(3):275\u2013286","journal-title":"J Syst Softw"},{"issue":"2","key":"204_CR36","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1007\/s00766-004-0191-7","volume":"9","author":"A Fuxman","year":"2004","unstructured":"Fuxman A, Liu L, Mylopoulos J, Roveri M, Traverso P (2004) Specifying and analyzing early requirements in Tropos. Requir Eng 9(2):132\u2013150","journal-title":"Requir Eng"},{"key":"204_CR37","doi-asserted-by":"crossref","unstructured":"Giorgini P, Massacci F, Mylopoulos J, Zannone N (2005) Modeling security requirements through ownership, permission and delegation. In: Proceedings of the 13th IEEE international conference on requirements engineering. IEEE Computer Society, pp. 167\u2013176","DOI":"10.1109\/RE.2005.43"},{"issue":"4","key":"204_CR38","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/s10207-006-0005-7","volume":"5","author":"P Giorgini","year":"2006","unstructured":"Giorgini P, Massacci F, Mylopoulos J, Zannone N (2006) Requirements engineering for trust management: model, methodology, and reasoning. Int J Inf Secur 5(4):257\u2013274","journal-title":"Int J Inf Secur"},{"issue":"4","key":"204_CR39","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MSP.2005.104","volume":"3","author":"P Gutmann","year":"2005","unstructured":"Gutmann P, Grigg I (2005) Security usability. Secur Priv IEEE 3(4):56\u201358","journal-title":"Secur Priv IEEE"},{"key":"204_CR40","unstructured":"Healthcare Information Technology Standards Panel (HITSP) (2008) Emergency responder electronic health record interoperability specification (IS04), Version 2.0"},{"key":"204_CR41","volume-title":"Tools for conviviality","author":"I Illich","year":"1974","unstructured":"Illich I (1974) Tools for conviviality. Marion Boyars Publishers, London"},{"key":"204_CR42","unstructured":"Jureta IJ, Mylopoulos J, Faulkner S, Schobbens PY (2007) Core ontology for requirements engineering. Technical report, Information Management Research Unit, University of Namur"},{"key":"204_CR43","doi-asserted-by":"crossref","unstructured":"Kazman R, Klein M, Barbacci M, Longstaff T, Lipson H, Carriere J (1998) The architecture tradeoff analysis method. In: Proceedings of the 4th IEEE international conference on engineering of complex computer systems. IEEE Computer Society, pp. 68\u201378","DOI":"10.1109\/ICECCS.1998.706657"},{"issue":"1","key":"204_CR44","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/S0899-8256(02)00544-4","volume":"45","author":"D Koller","year":"2003","unstructured":"Koller D, Milch B (2003) Multi-agent influence diagrams for representing and solving games. Games Econ Behav 45(1):181\u2013221","journal-title":"Games Econ Behav"},{"key":"204_CR45","doi-asserted-by":"crossref","unstructured":"Liu L, Yu ESK, Mylopoulos J (2003) Security and privacy requirements analysis within a social setting. In: Proceedings of 11th IEEE international requirements engineering conference. IEEE Computer Society, pp. 151\u2013161","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"204_CR46","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1023\/A:1025719407427","volume":"11","author":"L Lymberopoulos","year":"2003","unstructured":"Lymberopoulos L, Lupu E, Sloman M (2003) An adaptive policy-based framework for network services management. J Netw Syst Manag 11:277\u2013303","journal-title":"J Netw Syst Manag"},{"key":"204_CR47","doi-asserted-by":"crossref","unstructured":"Massacci F, Zannone N (2008) A model-driven approach for the specification and analysis of access control policies. In: Proceedings of OTM confederated international conferences, LNCS 5332. Springer, Berlin, pp. 1087\u20131103","DOI":"10.1007\/978-3-540-88873-4_11"},{"issue":"4","key":"204_CR48","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1007\/s00778-006-0009-y","volume":"15","author":"F Massacci","year":"2006","unstructured":"Massacci F, Mylopoulos J, Zannone N (2006) Hierarchical hippocratic databases with minimal disclosure for virtual organizations. VLDB J 15(4):370\u2013387","journal-title":"VLDB J"},{"issue":"3","key":"204_CR49","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1007\/s10515-007-0013-5","volume":"14","author":"F Massacci","year":"2007","unstructured":"Massacci F, Mylopoulos J, Zannone N (2007) Computer-aided support for secure tropos. Autom Softw Eng 14(3):341\u2013364","journal-title":"Autom Softw Eng"},{"key":"204_CR50","doi-asserted-by":"crossref","unstructured":"Massacci F, Mylopoulos J, Zannone N (2007) An ontology for secure socio-technical systems. In: Rittgen P (ed) Handbook of ontologies for business interaction. IDEA Group, USA, pp. 188\u2013207","DOI":"10.4018\/978-1-59904-660-0.ch011"},{"key":"204_CR51","unstructured":"Massacci F, Mylopoulos J, Zannone N (2009) Minimal disclosure in hierarchical hippocratic databases with delegation. In: Proceedings of 10th European symposium on research in computer security, LNCS 3679. Springer, Berlin, pp. 438\u2013454"},{"key":"204_CR52","doi-asserted-by":"crossref","unstructured":"Massacci F, Mylopoulos J, Zannone N (2010) Security requirements engineering: the SI* modeling language and the secure tropos methodology. In: Ras ZW, Tsay LS (eds) Advances in intelligent information systems, studies in computational intelligence, vol. 265. Springer, Berlin, pp. 147\u2013174","DOI":"10.1007\/978-3-642-05183-8_6"},{"issue":"2","key":"204_CR53","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/s10458-010-9135-4","volume":"23","author":"M Montali","year":"2011","unstructured":"Montali M, Torroni P, Zannone N, Mello P, Bryl V (2011) Engineering and verifying agent-oriented requirements augmented by business constraints with B-Tropos. Auton Agent Multi Agent Syst 23(2):193\u2013223","journal-title":"Auton Agent Multi Agent Syst"},{"key":"204_CR54","doi-asserted-by":"crossref","unstructured":"Morin B, Mouelhi T, Fleurey F, Le Traon Y, Barais O, J\u00e9z\u00e9quel JM (2010) Security-driven model-based dynamic adaptation. In: Proceedings of the IEEE\/ACM international conference on automated software engineering. ACM, pp. 205\u2013214","DOI":"10.1145\/1858996.1859040"},{"key":"204_CR55","unstructured":"NeOn: NeOn Toolkit. http:\/\/neon-toolkit.org\/"},{"issue":"6","key":"204_CR56","doi-asserted-by":"crossref","first-page":"844","DOI":"10.1109\/TKDE.2005.88","volume":"17","author":"I Ray","year":"2005","unstructured":"Ray I (2005) Applying semantic knowledge to real-time update of access control policies. IEEE Trans Knowl Data Eng 17(6):844\u2013858","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"204_CR57","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1016\/j.infsof.2003.10.007","volume":"46","author":"I Ray","year":"2004","unstructured":"Ray I, France R, Li N, Georg G (2004) An aspect-based approach to modeling access control concerns. Inf Softw Technol 46:575\u2013587","journal-title":"Inf Softw Technol"},{"key":"204_CR58","doi-asserted-by":"crossref","unstructured":"Rinderle-Ma S, Reichert M (2007) A formal framework for adaptive access control models. J Data Semant IX, 82\u2013112","DOI":"10.1007\/978-3-540-74987-5_3"},{"key":"204_CR59","doi-asserted-by":"crossref","unstructured":"Ruscio DD, Muccini H, Pierantonio A, Pelliccione P (2006) Towards weaving software architecture models. In: Proceedings of international workshop on model-based development of computer-based systems and model-based methodologies for pervasive and embedded software. IEEE Computer Society, pp. 103\u2013112","DOI":"10.1109\/MBD-MOMPES.2006.24"},{"key":"204_CR60","doi-asserted-by":"crossref","unstructured":"Ryutov T, Zhou L, Neuman C et\u00a0al (2005) Adaptive trust negotiation and access control. In: Proceedings of the 10th ACM symposium on access control models and technologies. ACM, pp. 139\u2013146","DOI":"10.1145\/1063979.1064004"},{"issue":"9","key":"204_CR61","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J Saltzer","year":"1975","unstructured":"Saltzer J, Schroeder M (1975) The protection of information in computer systems. Proc IEEE 63(9):1278\u20131308","journal-title":"Proc IEEE"},{"key":"204_CR62","unstructured":"Sasse MA, Flechais I (2005) Usable security: Why do we need it? how do we get it? In: Faith Cranor L, Garfinkel S (eds) Security and usability: designing secure systems that people can use. O\u2019Reilly, Sebastopol, CA, pp. 13\u201330"},{"key":"204_CR63","unstructured":"Sauro L (2006) Formalizing admissibility criteria in coalition formation among goal directed agents. Ph.D. thesis, University of Turin, Italy"},{"issue":"2\u20133","key":"204_CR64","first-page":"147","volume":"12","author":"L Sauro","year":"2006","unstructured":"Sauro L (2006) Qualitative criteria of admissibility for enforced agreements. CMOT 12(2\u20133):147\u2013168","journal-title":"CMOT"},{"key":"204_CR65","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1093\/logcom\/exr030","volume":"23","author":"L Sauro","year":"2013","unstructured":"Sauro L, Villata S (2013) Dependency in cooperative boolean games. J Log Comp 23:425\u2013444","journal-title":"J Log Comp"},{"key":"204_CR66","volume-title":"Secrets and lies: digital security in a networked world","author":"B Schneier","year":"2004","unstructured":"Schneier B (2004) Secrets and lies: digital security in a networked world. Wiley, New York"},{"key":"204_CR67","volume-title":"Ontologies: a handbook of principles, concepts and applications in information systems (integrated series in information systems)","author":"R Sharman","year":"2006","unstructured":"Sharman R, Kishore R, Ramesh R (2006) Ontologies: a handbook of principles, concepts and applications in information systems (integrated series in information systems). Springer, Secaucus, NJ"},{"key":"204_CR68","unstructured":"Sichman JS (1998) DEPINT: Dependence-based coalition formation in an open multi-agent scenario. J Artif Soc Soc Simul 1(2):1998"},{"key":"204_CR69","doi-asserted-by":"crossref","unstructured":"Sichman JS, Conte R (2002) Multi-agent dependence by dependence graphs. In: Proceedings of the 1st international joint conference on autonomous agents and multiagent systems. ACM, pp. 483\u2013490","DOI":"10.1145\/544741.544855"},{"key":"204_CR70","first-page":"68","volume":"13","author":"JS Sichman","year":"2001","unstructured":"Sichman JS, Demazeau Y (2001) On social reasoning in multi-agent systems. Revista Iberoamericana de Inteligencia Artificial 13:68\u201384","journal-title":"Revista Iberoamericana de Inteligencia Artificial"},{"key":"204_CR71","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MSP.2010.139","volume":"8","author":"S Sinclair","year":"2010","unstructured":"Sinclair S, Smith SW (2010) What\u2019s wrong with access control in the real world?. IEEE Secur Priv 8:74\u201377","journal-title":"IEEE Secur Priv"},{"issue":"5","key":"204_CR72","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MSP.2004.64","volume":"2","author":"KP Yee","year":"2004","unstructured":"Yee KP (2004) Aligning security and usability. Secur Priv IEEE 2(5):48\u201355","journal-title":"Secur Priv IEEE"},{"key":"204_CR73","unstructured":"Yu E (1995) Modelling strategic relationships for process reengineering. Ph.D. thesis, University of Toronto, Canada"}],"container-title":["Requirements Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-014-0204-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00766-014-0204-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00766-014-0204-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T19:44:58Z","timestamp":1565207098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00766-014-0204-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,20]]},"references-count":73,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["204"],"URL":"https:\/\/doi.org\/10.1007\/s00766-014-0204-0","relation":{},"ISSN":["0947-3602","1432-010X"],"issn-type":[{"value":"0947-3602","type":"print"},{"value":"1432-010X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,20]]}}}