{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T07:10:10Z","timestamp":1738221010776,"version":"3.34.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,5,13]],"date-time":"2008-05-13T00:00:00Z","timestamp":1210636800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1007\/s10515-008-0028-6","type":"journal-article","created":{"date-parts":[[2008,5,12]],"date-time":"2008-05-12T19:43:59Z","timestamp":1210621439000},"page":"149-173","source":"Crossref","is-referenced-by-count":14,"title":["Requirements model generation to support requirements elicitation: the Secure Tropos experience"],"prefix":"10.1007","volume":"15","author":[{"given":"Nadzeya","family":"Kiyavitskaya","sequence":"first","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,5,13]]},"reference":[{"issue":"1","key":"28_CR1","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s10515-006-5468-2","volume":"13","author":"V. Ambriola","year":"2006","unstructured":"Ambriola, V., Gervasi, V.: On the systematic analysis of natural language requirements with Circe. Autom. Softw. Eng. 13(1), 107\u2013167 (2006)","journal-title":"Autom. Softw. Eng."},{"key":"28_CR2","unstructured":"Asnar, Y., Bonato, R., Bryl, V., Compagna, L., Dolinar, K., Giorgini, P., Holtmanns, S., Klobucar, T., Lanzi, P., Latanicki, J., Massacci, F., Meduri, V., Porekar, J., Riccucci, C., Saidane, A., Seguran, M., Yautsiukhin, A., Zannone, N.: Security and privacy requirements at organizational level. Research report A1.D2.1, SERENITY consortium (2006)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Baniassad, E., Clarke, S.: Theme: An Approach for Aspect-Oriented Analysis and Design. In: Proc. of the Int. Conf. on Software Engineering (2004)","DOI":"10.1109\/ICSE.2004.1317438"},{"key":"28_CR4","first-page":"46","volume-title":"Proc. of RE\u201906","author":"T.D. Breaux","year":"2006","unstructured":"Breaux, T.D., Vail, M.W., Ant\u00f3n, A.I.: Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations. In: Proc. of RE\u201906, pp. 46\u201355. IEEE, New York (2006)"},{"issue":"3","key":"28_CR5","first-page":"203","volume":"8","author":"P. Bresciani","year":"2004","unstructured":"Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: TROPOS: An Agent-Oriented Software Development Methodology. JAAMAS 8(3), 203\u2013236 (2004)","journal-title":"JAAMAS"},{"key":"28_CR6","unstructured":"Burg, J.F.M.: Linguistic Instruments in Requirements Engineering. IOS Press (1996)"},{"key":"28_CR7","unstructured":"Campadello, S., Compagna, L., Gidoin, D., Giorgini, P., Holtmanns, S., Latanicki, J., Meduri, V., Pazzaglia, J.-C., Seguran, M., Thomas, R., Zannone, N.: S&D Requirements Specification. Research report A7.D2.1, SERENITY consortium (2006a)"},{"key":"28_CR8","unstructured":"Campadello, S., Compagna, L., Gidoin, D., Holtmanns, S., Meduri, V., Pazzaglia, J.-C., Seguran, M., Thomas, R.: Scenario selection and definition. Research report A7.D1.1, SERENITY consortium (2006b)"},{"key":"28_CR9","first-page":"59","volume-title":"Proc. of RE\u201906","author":"F. Chantree","year":"2006","unstructured":"Chantree, F., Nuseibeh, B., de Roeck, A., Willis, A.: Identifying nocuous ambiguities in natural language requirements. In: Proc. of RE\u201906, pp. 59\u201368. IEEE, New York (2006)"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Cole, S.V., Royal, M.D., Valtorta, M.G., Huhns, M.N., Bowles, J.B.: A lightweight tool for automatically extracting causal relationships from text. In: Proc. of IEEE Southeastcon 2006, pp. 125\u2013129 (2006)","DOI":"10.1109\/second.2006.1629336"},{"issue":"1","key":"28_CR11","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1002\/(SICI)1097-4571(199201)43:1<62::AID-ASI6>3.0.CO;2-C","volume":"43","author":"D.W. Cordes","year":"1992","unstructured":"Cordes, D.W., Carver, D.L.: An Object-Based Requirements Modeling Method. Journal of the American Society for Information Science 43(1), 62\u201371 (1992)","journal-title":"Journal of the American Society for Information Science"},{"issue":"3","key":"28_CR12","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.scico.2006.04.002","volume":"61","author":"J.R. Cordy","year":"2006","unstructured":"Cordy, J.R.: The TXL source transformation language. Sci. Comput. Program. 61(3), 190\u2013210 (2006)","journal-title":"Sci. Comput. Program."},{"key":"28_CR13","series-title":"LNCS","first-page":"1","volume-title":"Proc. of LOPSTR\u201998","author":"N.E. Fuchs","year":"1998","unstructured":"Fuchs, N.E., Schwertel, U., Schwitter, R.: Attempto Controlled English\u2013not just another logic specification language. In: Proc. of LOPSTR\u201998. LNCS, vol. 1559, pp. 1\u201320. Springer, Berlin (1998)"},{"key":"28_CR14","series-title":"LNCS","first-page":"237","volume-title":"FOSAD 2004\/2005","author":"P. Giorgini","year":"2005","unstructured":"Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: FOSAD 2004\/2005. LNCS, vol. 3655, pp. 237\u2013272. Springer, Berlin (2005)"},{"issue":"4","key":"28_CR15","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1023\/A:1008617922496","volume":"4","author":"L. Goldin","year":"1997","unstructured":"Goldin, L., Berry, D.: AbstFinder, A prototype natural language text abstraction finder for use in requirements elicitation. Autom. Softw. Eng. 4(4), 375\u2013412 (1997)","journal-title":"Autom. Softw. Eng."},{"key":"28_CR16","series-title":"LNCS","first-page":"358","volume-title":"Proc. of EKAW\u201902","author":"S. Handschuh","year":"2002","unstructured":"Handschuh, S., Staab, S., Ciravegna, F.: S-CREAM\u2014Semi-automatic CREAtion of Metadata. In: Proc. of EKAW\u201902. LNCS, vol. 2473, pp. 358\u2013372. Springer, Berlin (2002)"},{"key":"28_CR17","series-title":"LNCS","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-10858-0","volume-title":"Anaphora in Natural Language Understanding: A Survey","author":"G. Hirst","year":"1981","unstructured":"Hirst, G.: Anaphora in Natural Language Understanding: A Survey. LNCS, vol. 119. Springer, Berlin (1981)"},{"key":"28_CR18","unstructured":"IBM: IBM Rational RequisitePro. http:\/\/www-306.ibm.com\/software\/awdtools\/reqpro\/ (2007). Accessed 21-Dec-2007"},{"key":"28_CR19","first-page":"223","volume-title":"Proc. of The 5th Int. Conf. on Quality Software","author":"H. Kaiya","year":"2005","unstructured":"Kaiya, H., Saeki, M.: Ontology based requirements analysis: lightweight semantic processing approach. In: Proc. of The 5th Int. Conf. on Quality Software, pp. 223\u2013230. IEEE, New York (2005)"},{"key":"28_CR20","unstructured":"Kamsties, E., Berry, D., Paech, B.: Detecting ambiguities in requirements documents using inspections. In: Proc. of WISE\u201901, pp. 68\u201380 (2001)"},{"key":"28_CR21","first-page":"429","volume-title":"Proc. of ASE\u201907","author":"N. Kiyavitskaya","year":"2007","unstructured":"Kiyavitskaya, N., Zeni, N., Mich, L., Breaux, T.D., Anton, A.I., Mylopoulos, J.: Extracting rights and obligations from regulations: towards a tool-supported process. In: Proc. of ASE\u201907, pp. 429\u2013432. ACM, New York (2007a)"},{"key":"28_CR22","series-title":"LNCS","first-page":"143","volume-title":"Proc. of PAKM\u201906","author":"N. Kiyavitskaya","year":"2006","unstructured":"Kiyavitskaya, N., Zeni, N., Mich, L., Cordy, J.R., Mylopoulos, J.: Text mining through semi automatic semantic annotation. In: Proc. of PAKM\u201906. LNCS, vol. 4333, pp. 143\u2013154. Springer, Berlin (2006)"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Kiyavitskaya, N., Zeni, N., Mich, L., Cordy, J.R., Mylopoulos, J.: Text mining through semi automatic semantic annotation. In: Proc. of ENTER 2007 (2007b)","DOI":"10.1007\/11944935_13"},{"key":"28_CR24","doi-asserted-by":"crossref","unstructured":"Massacci, F., Mylopoulos, J., Zannone, N.: An ontology for secure socio-technical systems. In: Handbook of Ontologies for Business Interaction. The IDEA Group (2007)","DOI":"10.4018\/978-1-59904-660-0.ch011"},{"issue":"5","key":"28_CR25","first-page":"445","volume":"27","author":"F. Massacci","year":"2005","unstructured":"Massacci, F., Prest, M., Zannone, N.: Using a security requirements engineering methodology in practice: the compliance with the Italian Data Protection Legislation. CSI 27(5), 445\u2013455 (2005)","journal-title":"CSI"},{"key":"28_CR26","unstructured":"Massacci, F., Zannone, N.: Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. In: Social Modeling for Requirements Engineering. MIT Press, Cambridge (2008, to appear)"},{"key":"28_CR27","unstructured":"Mich, L., Garigliano, R.: NL-OOPS: A Requirements Analysis tool based on natural language Processing. In: Proc. of 3rd Int. Conf. on Data Mining, pp. 321\u2013330 (2002)"},{"key":"28_CR28","unstructured":"Nobata, C., Sekine, S.: Towards Automatic Acquisition of Patterns for Information Extraction. In: Proc. of Int. Conf. of Computer Processing of Oriental Languages (1999)"},{"issue":"1","key":"28_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0950-7051(02)00027-8","volume":"16","author":"S.M. Ratchev","year":"2003","unstructured":"Ratchev, S.M., Urwin, E., Muller, D., Pawar, K.S., Moulek, I.: Knowledge based requirement engineering for one-of-a-kind complex systems. Knowl.-Based Syst. 16(1), 1\u20135 (2003)","journal-title":"Knowl.-Based Syst."},{"key":"28_CR30","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1613\/jair.514","volume":"11","author":"P. Resnik","year":"1999","unstructured":"Resnik, P.: Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language. Journal of Artificial Intelligence Research 11, 95\u2013130 (1999)","journal-title":"Journal of Artificial Intelligence Research"},{"key":"28_CR31","volume-title":"Mastering the requirements process","author":"S. Robertson","year":"1999","unstructured":"Robertson, S., Robertson, J.: In: Mastering the requirements process. ACM\/Addison-Wesley, New York\/Reading (1999)"},{"key":"28_CR32","first-page":"352","volume-title":"Proc. of ASE\u201905","author":"A. Sampaio","year":"2005","unstructured":"Sampaio, A., Chitchyan, R., Rashid, A., Rayson, P.: EA-Miner: a tool for automating aspect-oriented requirements identification. In: Proc. of ASE\u201905, pp. 352\u2013355. ACM, New York (2005)"},{"key":"28_CR33","unstructured":"Sampson, G., Babarczy, A.: Limits to annotation precision. In: Proc. of EACL\u201903 (2003)"},{"issue":"6","key":"28_CR34","first-page":"211","volume":"153","author":"A. Stone","year":"2006","unstructured":"Stone, A., Sawyer, P.: Identifying tacit knowledge-based requirements. Software 153(6), 211\u2013218 (2006a). (IEE Proceedings)","journal-title":"Software"},{"key":"28_CR35","doi-asserted-by":"crossref","unstructured":"Stone, A., Sawyer, P.: Using pre-requirements tracing to investigate requirements based on tacit knowledge. In: Proc. of ICSOFT \u201906, vol.\u00a01, pp.\u00a0139\u2013144. INSTICC Press (2006b)","DOI":"10.5220\/0001311701390144"},{"key":"28_CR36","unstructured":"van Lamsweerde, A., Dardenne, A., Delcourt, B., Dubisy, F.: The KAOS project: knowledge acquisition in automated specification of software. In: Proc. of the AAAI Spring Symposium Series, pp. 59\u201362 (1991)"},{"issue":"12","key":"28_CR37","first-page":"1089","volume":"24","author":"A. Lamsweerde van","year":"1998","unstructured":"van Lamsweerde, A., Willemet, L.: Inferring Declarative Requirements Specifications from Operational Scenarios. TSE 24(12), 1089\u20131114 (1998)","journal-title":"TSE"},{"key":"28_CR38","first-page":"379","volume-title":"Proc. of EKAW\u201902","author":"M. Vargas-Vera","year":"2002","unstructured":"Vargas-Vera, M., Motta, E., Domingue, J., Lanzoni, M., Stutt, A., Ciravegna, F.: MnM: Ontology driven semi-automatic and automatic support for semantic markup. In: Proc. of EKAW\u201902, vol. 2473, pp.\u00a0379\u2013391. Springer, Berlin (2002)"},{"issue":"1\u20132","key":"28_CR39","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1023\/A:1009982220290","volume":"1","author":"Y. Yang","year":"1999","unstructured":"Yang, Y.: An evaluation of statistical approaches to text categorization. Inf. Retr. 1(1\u20132), 69\u201390 (1999)","journal-title":"Inf. Retr."},{"key":"28_CR40","unstructured":"Yu, E.S.K.: Modelling strategic relationships for process reengineering. Ph.D. thesis, University of Toronto (1995)"},{"key":"28_CR41","first-page":"1437","volume-title":"Proc. of SREIS 2008","author":"N. Zeni","year":"2008","unstructured":"Zeni, N., Kiyavitskaya, N., Cordy, J.R., Mich, L., Mylopoulos, J.: Annotating Regulations Using Cerno: An Application to Italian Documents. In: Proc. of SREIS 2008, pp. 1437\u20131442. IEEE, New York (2008)"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-008-0028-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10515-008-0028-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-008-0028-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T06:52:57Z","timestamp":1738219977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10515-008-0028-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,5,13]]},"references-count":41,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2008,6]]}},"alternative-id":["28"],"URL":"https:\/\/doi.org\/10.1007\/s10515-008-0028-6","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"type":"print","value":"0928-8910"},{"type":"electronic","value":"1573-7535"}],"subject":[],"published":{"date-parts":[[2008,5,13]]}}}