{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T05:41:54Z","timestamp":1772775714220,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,11,21]],"date-time":"2015-11-21T00:00:00Z","timestamp":1448064000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10207-015-0305-x","type":"journal-article","created":{"date-parts":[[2015,11,21]],"date-time":"2015-11-21T10:27:28Z","timestamp":1448101648000},"page":"319-334","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Effectiveness and performance analysis of model-oriented security requirements engineering to elicit security requirements: a systematic solution for developing secure software systems"],"prefix":"10.1007","volume":"15","author":[{"given":"P.","family":"Salini","sequence":"first","affiliation":[]},{"given":"S.","family":"Kanmani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,21]]},"reference":[{"key":"305_CR1","doi-asserted-by":"crossref","unstructured":"Balzarotti, D., Banks, G., Cova, M., Felmetsger, V., Kemmerer, R., Robertson, W., Valeur, F., Vigna, G.: Are your votes really counted? Testing the security of real-world electronic voting systems. In: ACM Proceedings of the international symposium on Software testing and analysis, pp. 237\u2013248 (2008)","DOI":"10.1145\/1390630.1390660"},{"key":"305_CR2","unstructured":"Prosser, A., Kofler, R., Krimmer, R., Unger, M.K.: Security assets in E-voting. In: Proceedings of the 1st international workshop on electronic voting, pp. 171\u2013180 (2004)"},{"key":"305_CR3","unstructured":"Sindre, G., Firesmith, D.G., Opdahl, A.L.: A reuse-based approach to determining security requirements. In: Proceedings of 9th international workshop on requirements engineering: foundation for software quality, pp. 16\u201317 (2003)"},{"key":"305_CR4","volume-title":"Building secure software","author":"J Viega","year":"2001","unstructured":"Viega, J., McGraw, G.: Building secure software. Addison-Wesley, Boston (2001)"},{"key":"305_CR5","unstructured":"Lipner, S., Howard, M.: The trustworthy computing security development life cycle. Microsoft Corporation. http:\/\/msdn.microsoft.com\/en-us\/library\/ms995349.aspx (2005)"},{"key":"305_CR6","unstructured":"Graham, D.: Introduction to the CLASP process. Build security. https:\/\/buildsecurityin.us-cert.gov\/daisy\/bsi\/articles\/best-practices\/requirements\/548.html (2006)"},{"key":"305_CR7","doi-asserted-by":"crossref","unstructured":"Mead, N.R., Houg, E.D., Stehney, T.R.: Security quality requirements engineering (SQUARE) methodology. Technical Report CMU\/SEI-2005-TR-009, Software Engineering Institute, Carnegie Mellon University (2005)","DOI":"10.1145\/1082983.1083214"},{"issue":"1","key":"305_CR8","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"CB Haley","year":"2008","unstructured":"Haley, C.B., Laney, R., Moffett, J.D., Nuseibeh, B.: Security requirements engineering: a framework for representation and analysis. IEEE Trans. Softw. Eng. 34(1), 133\u2013152 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"305_CR9","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.csi.2006.04.002","volume":"29","author":"D Mellado","year":"2007","unstructured":"Mellado, D., Fernndez-Medina, E., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Comput. Stand. Interfaces 29(2), 244\u2013253 (2007)","journal-title":"Comput. Stand. Interfaces"},{"issue":"8","key":"305_CR10","doi-asserted-by":"crossref","first-page":"609","DOI":"10.1016\/j.is.2004.06.002","volume":"30","author":"H Mouratidis","year":"2005","unstructured":"Mouratidis, H., Giorgini, P., Manson, G.: When security meets software engineering: a case of modeling secure information systems. J. Inf. Syst. 30(8), 609\u2013629 (2005)","journal-title":"J. Inf. Syst."},{"key":"305_CR11","series-title":"Integrating security and software engineering: advances and future visions","volume-title":"Modeling security and trust with secure tropos","author":"P Giorgini","year":"2007","unstructured":"Giorgini, P., Mouratidis, H., Zannone, N.: Modeling security and trust with secure tropos. Integrating security and software engineering: advances and future visions. IGI Global, Pennsylvania (2007)"},{"issue":"1","key":"305_CR12","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MS.2008.19","volume":"25","author":"IA Tndel","year":"2008","unstructured":"Tndel, I.A., Jaatun, M.G., Meland, P.H.: Security requirements for the rest of US: a survey. IEEE Softw. 25(1), 20\u201327 (2008)","journal-title":"IEEE Softw."},{"key":"305_CR13","unstructured":"Fernandez, E.B.: A methodology for secure software design. In: Proceedings of the international symposium, web services and applications. www.cse.fau.edu\/~ed\/EFLVSecSysDes1 (2004)"},{"issue":"5","key":"305_CR14","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1108\/10662240610710996","volume":"16","author":"DG Rosado","year":"2006","unstructured":"Rosado, D.G., Gutirrez, C., Fernndez-Medina, E., Piattini, M.: Security patterns and requirements for internet-based applications. Internet Res. 16(5), 519\u2013536 (2006)","journal-title":"Internet Res."},{"key":"305_CR15","unstructured":"Appel, A.W., Ginsburg, M., Hursti, H., Kernighan, B.W., Richards, C.D., Tan, G., Venetis, P.: The New Jersey voting-machine law suit and the AVC advantage DRE voting machine. EVT\/WOTE09, Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (2009)"},{"key":"305_CR16","unstructured":"Hursti, H.: Diebold TSx evaluation: critical security issues with diebold TSx. Black Box Voting. http:\/\/www.blackboxvoting.org\/BBVtsxstudy.pdf (2006)"},{"key":"305_CR17","doi-asserted-by":"crossref","unstructured":"Kohno, T., Stubbleeld, A., Rubin, A.D., Wallach, D.S.: Analysis of an electronic voting system. In: IEEE symposium on security and privacy. IEEE Computer Society, pp. 27\u201348 (2004)","DOI":"10.1109\/SECPRI.2004.1301313"},{"key":"305_CR18","unstructured":"http:\/\/www.emarketer.com"},{"key":"305_CR19","unstructured":"Mainichi newspaper. http:\/\/www.mainichi.co.jp (Japanese), June 24 (2002)"},{"key":"305_CR20","unstructured":"A NASSCOM eGovernance study on issues, challenges and recommendations. www.egovreach.in\/social\/content\/karnanataka-proposing-e-vote"},{"key":"305_CR21","volume-title":"E-voting handbook: key steps in the implementation of E-enabled elections","author":"S Caarls","year":"2010","unstructured":"Caarls, S.: E-voting handbook: key steps in the implementation of E-enabled elections. Council of Europe, Strasbourg (2010)"},{"key":"305_CR22","unstructured":"Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: A security analysis of the secure electronic registration and voting experiment (SERVE). http:\/\/www.servesecurityreport.org\/paper.pdf (2004)"},{"key":"305_CR23","unstructured":"Feldman, A., Halderman, J., Felten, E.: Security analysis of the diebold AccuVote-TS voting machine. In: Proceedings of the USENIX\/ACCURATE Electronic Voting Technology Workshop (2007)"},{"key":"305_CR24","series-title":"LNCS","first-page":"467","volume-title":"DEXA2003","author":"C Lambrinoudakis","year":"2003","unstructured":"Lambrinoudakis, C., Kokolakis, S., Karyda, M., Tsoumas, V., Gritzalis, D., Katsikas, S.: Electronic voting systems: security implications of the administrative workow. In: Mark, V., Stepankova, O., Retschitzegger, W. (eds.) DEXA2003. LNCS, vol. 2736, p. 467. Springer, Heidelberg (2003)"},{"key":"305_CR25","series-title":"LNCS","volume-title":"ICEC2004","author":"A Xenakis","year":"2004","unstructured":"Xenakis, A., Macintosh, A.: Procedural security analysis of electronic voting. In: Rauterberg, M. (ed.) ICEC2004. LNCS. Springer, Heidelberg (2004)"},{"key":"305_CR26","doi-asserted-by":"crossref","unstructured":"Xenakis, A., Macintosh, A.: Procedural security and social acceptance in E-voting. In: HICSS2005: Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS2005)-Track5, p. 118.1. IEEE Computer Society, Washington, DC, USA (2005)","DOI":"10.1109\/HICSS.2005.508"},{"key":"305_CR27","doi-asserted-by":"crossref","unstructured":"Manadhata, P., Wing, J., Flynn, M., McQueen, M.: Measuring the attack surfaces of two FTP daemons. In: QoP2006: Proceedings of the 2nd ACM workshop on Quality of protection, pp. 3\u201310. ACM Press, New York (2006)","DOI":"10.1145\/1179494.1179497"},{"key":"305_CR28","doi-asserted-by":"crossref","unstructured":"Howard, M., Pincus, J., Wing, J.: Measuring relative attack surfaces. Computer Security in the 21st Century, pp. 109\u2013137, Springer, US (2005)","DOI":"10.1007\/0-387-24006-3_8"},{"key":"305_CR29","unstructured":"Swiderski, F., Snyder, W.: Threat modeling. Microsoft Press, US (2004)"},{"key":"305_CR30","series-title":"Requirements engineering","volume-title":"Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure","author":"H Suleiman","year":"2012","unstructured":"Suleiman, H., Svetinovic, D.: Evaluating the effectiveness of the security quality requirements engineering (SQUARE) method: a case study using smart grid advanced metering infrastructure. Requirements engineering. Springer, Berlin (2012)"},{"issue":"3","key":"305_CR31","doi-asserted-by":"crossref","first-page":"1785","DOI":"10.1016\/j.compeleceng.2012.08.008","volume":"38","author":"P Salini","year":"2012","unstructured":"Salini, P., Kanmani, S.: Survey and analysis on security requirements engineering. Int. J. Comput. Electr. Eng. 38(3), 1785\u20131797 (2012)","journal-title":"Int. J. Comput. Electr. Eng."},{"issue":"1","key":"305_CR32","first-page":"180","volume":"1","author":"P Salini","year":"2010","unstructured":"Salini, P., Kanmani, S.: A model based security requirements engineering framework. Int. J. Comput. Eng. Technol. 1(1), 180\u2013195 (2010)","journal-title":"Int. J. Comput. Eng. Technol."},{"key":"305_CR33","doi-asserted-by":"crossref","unstructured":"Salini, P., Kanmani, S.: A model based security requirements engineering framework applied for online trading system. In: Proceedings of IEEE international conference on recent trends in information technology, pp. 1195\u20131202 (2011)","DOI":"10.1109\/ICRTIT.2011.5972266"},{"key":"305_CR34","doi-asserted-by":"crossref","unstructured":"Salini, P., Kanmani, S.: Application of model oriented security requirements engineering framework for secure E-voting. In: Proceedings of CSI 6th international conference on software engineering, IEEE, pp. 1\u20136 (2012)","DOI":"10.1109\/CONSEG.2012.6349489"},{"issue":"4","key":"305_CR35","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1504\/IJWMC.2014.063083","volume":"7","author":"P Salini","year":"2014","unstructured":"Salini, P., Kanmani, S.: Security requirements engineering for specifying security requirements of an e-voting system as a legitimate solution to e-governance. Int. J. Wirel. Mobile Comput. 7(4), 400\u2013413 (2014)","journal-title":"Int. J. Wirel. Mobile Comput."},{"key":"305_CR36","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/585597.585599","volume":"45","author":"AD Rubin","year":"2002","unstructured":"Rubin, A.D.: Security considerations for remote electronic voting. Commun. ACM 45, 39\u201344 (2002)","journal-title":"Commun. ACM"},{"key":"305_CR37","unstructured":"Smith, R.G.: The risks and benefits of electronic voting. In: 15th Australian Forum\u2014Melbourne (2001)"},{"key":"305_CR38","series-title":"Information security and ethics: concepts, methodologies, tools, and applications","volume-title":"Modeling security patterns using NFR analysis","author":"M Weiss","year":"2008","unstructured":"Weiss, M.: Modeling security patterns using NFR analysis. Information security and ethics: concepts, methodologies, tools, and applications. Idea Group Publishing, Pennsylvania (2008)"},{"key":"305_CR39","unstructured":"OWASP. https:\/\/www.owasp.org"},{"key":"305_CR40","unstructured":"NVD. http:\/\/nvd.nist.gov\/scap.cfm"},{"key":"305_CR41","unstructured":"WASC. http:\/\/www.webappsec.org\/"},{"key":"305_CR42","unstructured":"CVSS. http:\/\/www.rst.org\/cvss"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0305-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-015-0305-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0305-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T19:35:30Z","timestamp":1567366530000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-015-0305-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,21]]},"references-count":42,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["305"],"URL":"https:\/\/doi.org\/10.1007\/s10207-015-0305-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,21]]}}}