{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:17:47Z","timestamp":1648772267082},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,5,31]],"date-time":"2013-05-31T00:00:00Z","timestamp":1369958400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s11432-013-4865-y","type":"journal-article","created":{"date-parts":[[2013,5,20]],"date-time":"2013-05-20T19:47:59Z","timestamp":1369079279000},"page":"1-15","source":"Crossref","is-referenced-by-count":1,"title":["Eliciting dependability requirements: a control cases based approach"],"prefix":"10.1007","volume":"57","author":[{"given":"Chun","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,31]]},"reference":[{"key":"4865_CR1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie J C, Randell B, et al. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secur Comput, 2004, 1: 11\u201333","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"4865_CR2","volume-title":"Proceedings of the 4th International Workshop on Requirements for High Assurance Systems, Paris","author":"G Despotou","year":"2005","unstructured":"Despotou G, Kelly T. The need for flexible requirements in dependable systems. In: Proceedings of the 4th International Workshop on Requirements for High Assurance Systems, Paris, 2005"},{"key":"4865_CR3","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1049\/cp:20060200","volume-title":"Proceedings of the 1st IEE International Conference on System Safety, London","author":"G Despoton","year":"2006","unstructured":"Despoton G, Kelly T. Extending safety deviation analysis techniques to elicit flexible dependability requirements. In: Proceedings of the 1st IEE International Conference on System Safety, London, 2006. 29\u201338"},{"key":"4865_CR4","doi-asserted-by":"crossref","first-page":"1492","DOI":"10.1016\/j.ress.2006.10.002","volume":"92","author":"B A Gran","year":"2007","unstructured":"Gran B A, Fredriksen R, Thunem A P J. Addressing dependability by applying an approach for model-based risk assessment. Reliab Eng Syst Safety, 2007, 92: 1492\u20131502","journal-title":"Reliab Eng Syst Safety"},{"key":"4865_CR5","first-page":"40","volume-title":"Proceedings of 13th IEEE International Conference on Requirements Engineering, Workshop on Requirements Engineering for High-Availability Systems, Paris","author":"S W Lee","year":"2005","unstructured":"Lee S W, Gandhi R. Engineering dependability requirements for software-intensive systems through the definition of a common language. In: Proceedings of 13th IEEE International Conference on Requirements Engineering, Workshop on Requirements Engineering for High-Availability Systems, Paris, 2005. 40\u201348"},{"key":"4865_CR6","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jss.2005.03.011","volume":"79","author":"P Donzelli","year":"2006","unstructured":"Donzelli P, Basili V. A practical framework for eliciting and modeling system dependability requirements: experience from the NASA high dependability computing project. J Syst Softw, 2006, 79: 107\u2013119","journal-title":"J Syst Softw"},{"key":"4865_CR7","first-page":"3","volume-title":"Proceedings of the 11th Safety-Critical Systems Symposium, Bristol","author":"I Sommerville","year":"2003","unstructured":"Sommerville I. An integrated approach to dependability requirements engineering. In: Proceedings of the 11th Safety-Critical Systems Symposium, Bristol, 2003. 3\u201315"},{"key":"4865_CR8","first-page":"77","volume-title":"Proceedings of the 11th Annual International Workshop on Software Technology and Engineering Practices, Amsterdam","author":"K Cai","year":"2003","unstructured":"Cai K, Cangussu J W, Decarlo R A, et al. An overview of software cybernetics. In: Proceedings of the 11th Annual International Workshop on Software Technology and Engineering Practices, Amsterdam, 2003. 77\u201386"},{"key":"4865_CR9","volume-title":"Control System Design","author":"G C Goodwin","year":"2001","unstructured":"Goodwin G C, Graebe S F, Salgado M E. Control System Design. New Jersey: Prentice Hall, 2001"},{"key":"4865_CR10","volume-title":"The unified modeling language reference manual","author":"J Rumbaugh","year":"2004","unstructured":"Rumbaugh J, Jacobson I, Booch G. The unified modeling language reference manual. 2nd ed. New Jersey: Pearson Higher Education, 2004","edition":"2nd ed"},{"key":"4865_CR11","unstructured":"Environment, health and safety committee. Note on: hazard and operability studies (HAZOP). Version 2, 2007"},{"key":"4865_CR12","volume-title":"The principled design of computer system safety analysis. Dissertation of Doctoral Degree","author":"D J Pumfrey","year":"1999","unstructured":"Pumfrey D J. The principled design of computer system safety analysis. Dissertation of Doctoral Degree. York: University of York, 1999"},{"key":"4865_CR13","first-page":"2","volume-title":"Proceedings of the 15th Annual International Symposium on Fault-Tolerant Computing, Munich","author":"J C Laprie","year":"1985","unstructured":"Laprie J C. Dependability computing and fault tolerance: concepts and terminology. In: Proceedings of the 15th Annual International Symposium on Fault-Tolerant Computing, Munich, 1985. 2\u201311"},{"key":"4865_CR14","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1498765.1498787","volume":"52","author":"D Jackson","year":"2009","unstructured":"Jackson D. A direct path to dependable software. Commun ACM, 2009, 52: 78\u201388","journal-title":"Commun ACM"},{"key":"4865_CR15","series-title":"Lecture Notes on Computer Sciences","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/978-3-642-02463-4_19","volume-title":"On non-functional requirements in software engineering","author":"L Chung","year":"2009","unstructured":"Chung L, do Prado Leite J C S. On non-functional requirements in software engineering. In: Lecture Notes on Computer Sciences 5600, 2009. 363\u2013379"},{"key":"4865_CR16","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/291469.293165","volume":"42","author":"J Mylopoulos","year":"1999","unstructured":"Mylopoulos J, Chung L, Yu E. From object-oriented to goal-oriented requirements analysis. Commun ACM, 1999, 42: 31\u201337","journal-title":"Commun ACM"},{"key":"4865_CR17","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1109\/TSE.2004.10","volume":"30","author":"L M Cysneiros","year":"2004","unstructured":"Cysneiros L M, do Prado Leite J C S. Nonfunctional requirements: from elicitation to conceptual models. IEEE Trans Softw Eng, 2004, 30: 328\u2013350","journal-title":"IEEE Trans Softw Eng"},{"key":"4865_CR18","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/s00766-007-0058-9","volume":"13","author":"A Herrmann","year":"2008","unstructured":"Herrmann A, Paech B. MOQARE: misuse-oriented quality requirements engineering. Requir Eng, 2008, 13: 73\u201386","journal-title":"Requir Eng"},{"key":"4865_CR19","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1007\/s00766-004-0194-4","volume":"10","author":"G Sindre","year":"2005","unstructured":"Sindre G, Opdahl A L. Eliciting security requirements with misuse cases. Requir Eng, 2005, 10: 34\u201344","journal-title":"Requir Eng"},{"key":"4865_CR20","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MS.2003.1159030","volume":"20","author":"I Alexander","year":"2003","unstructured":"Alexander I. Misuse case: use case with hostile intent. IEEE Softw, 2003, 20: 58\u201366","journal-title":"IEEE Softw"},{"key":"4865_CR21","volume-title":"Proceedings of the 4th International Workshop on Requirements for High Assurance Systems, Paris","author":"L Laibinis","year":"2005","unstructured":"Laibinis L, Troubitsyna E. Fault tolerance in use-case modeling. In: Proceedings of the 4th International Workshop on Requirements for High Assurance Systems, Paris, 2005"},{"key":"4865_CR22","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/s10257-007-0057-x","volume":"6","author":"J Zou","year":"2008","unstructured":"Zou J, Pavlovski C J. Control case approach to record and model non-functional requirements. Inf Syst E-Bus Manag, 2008, 6: 49\u201367","journal-title":"Inf Syst E-Bus Manag"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-013-4865-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-013-4865-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-013-4865-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:37:52Z","timestamp":1559403472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-013-4865-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,31]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["4865"],"URL":"https:\/\/doi.org\/10.1007\/s11432-013-4865-y","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,31]]}}}