{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:07:44Z","timestamp":1772064464558,"version":"3.50.1"},"reference-count":21,"publisher":"Institution of Engineering and Technology (IET)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Softw."],"published-print":{"date-parts":[[2010,4,8]]},"DOI":"10.1049\/iet-sen.2009.0059","type":"journal-article","created":{"date-parts":[[2010,3,30]],"date-time":"2010-03-30T13:03:43Z","timestamp":1269954223000},"page":"149-160","source":"Crossref","is-referenced-by-count":5,"title":["Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements"],"prefix":"10.1049","volume":"4","author":[{"given":"R.","family":"Hassan","sequence":"first","affiliation":[{"name":"Assistant Professor of Computer Science and Information Technology, Arab Academy for Science and Technology (AAST),"}]},{"given":"M.","family":"Eltoweissy","sequence":"additional","affiliation":[{"name":"Associate Professor of Electrical and Computer Engineering, Virginia Tech,"}]},{"given":"S.","family":"Bohner","sequence":"additional","affiliation":[{"name":"Professor of Computer Science, Rose-Hulman University,"}]},{"given":"S.","family":"El-Kassas","sequence":"additional","affiliation":[{"name":"Associate Professor of Computer Science, The American University in Cairo,"}]}],"member":"265","reference":[{"key":"10.1049\/iet-sen.2009.0059_r1","author":"Wilander","year":"2005","journal-title":"Symp. on Requirement Engineering for Information Security (SREIS\u2019 2005)"},{"key":"10.1049\/iet-sen.2009.0059_r2","author":"Brandozzi","year":"2001","journal-title":"First Int. Workshop from Software Requirements to Architectures (STRAW\u201901)"},{"key":"10.1049\/iet-sen.2009.0059_r3","unstructured":"Hassan, R.: \u2018Formal analysis and design for engineering security (FADES)\u2019, 2009, PhD, Virginia Tech"},{"key":"10.1049\/iet-sen.2009.0059_r4","author":"van Lamsweerde","year":"2004","journal-title":"Proc. 26th Int. Conf. on Software Engineering, ICSE\u201904"},{"key":"10.1049\/iet-sen.2009.0059_r5","first-page":"978","volume":"26","author":"van Lamsweerde","year":"2000"},{"key":"10.1049\/iet-sen.2009.0059_r6","author":"Nakagawa","year":"2007","journal-title":"Proc. Int. Conf. on Automated Software Engineering (ASE\u201907)"},{"key":"10.1049\/iet-sen.2009.0059_r7","doi-asserted-by":"crossref","unstructured":"Van Lamsweerde, A.: \u2018From system goals to software architecture\u2019, Bernardo, M., Inverardi, P., Formal methods for software architectures, (Springer 2003) p. 25\u201343","DOI":"10.1007\/978-3-540-39800-4_2"},{"key":"10.1049\/iet-sen.2009.0059_r8","first-page":"2.13","author":"Dromey","year":"2003","journal-title":"SEFM 2003. Int. Conf. on Software Engineering and Formal Methods. The University of Queensland School of Information Technology and Electrical Engineering"},{"key":"10.1049\/iet-sen.2009.0059_r9","unstructured":"\u2018Requirements to design to code: towards a fully formal approach to automatic code generation\u2019, NASA Technical Report, January, 2005"},{"key":"10.1049\/iet-sen.2009.0059_r10","author":"Mylopoulos","year":"2001","journal-title":"Proc. Fourth Int. Conf. on the Unified Modeling Language UML\u201901"},{"key":"10.1049\/iet-sen.2009.0059_r11","first-page":"176","author":"Giorgini","journal-title":"Proc. iTrust-04, 2004, ("},{"key":"10.1049\/iet-sen.2009.0059_r12","author":"Hassan","year":"2008","journal-title":"Symp. on Requirements Engineering for Information Security"},{"key":"10.1049\/iet-sen.2009.0059_r13","author":"Hassan","year":"2009","journal-title":"Proc. HAWAII Int. Conf. on System Sciences"},{"key":"10.1049\/iet-sen.2009.0059_r14","author":"Hassan","year":"2009","journal-title":"Proc. Int. Symp. on Secure Computing (SecureCom-09) with the IEEE Int. Conf. on Privacy, Security, Risk and Trust (PASSAT-09)"},{"key":"10.1049\/iet-sen.2009.0059_r15","unstructured":"Abrial, J.-R.: \u2018The B book: assigning programs to meanings\u2019, (Prentice-Hall)"},{"key":"10.1049\/iet-sen.2009.0059_r16","author":"Blackburn","year":"2001","journal-title":"Software Productivity Consortium"},{"key":"10.1049\/iet-sen.2009.0059_r17","unstructured":"www.objectiver.com"},{"key":"10.1049\/iet-sen.2009.0059_r18","unstructured":"http:\/\/www.atelierb.eu"},{"key":"10.1049\/iet-sen.2009.0059_r19","unstructured":"http:\/\/www.b-core.com"},{"key":"10.1049\/iet-sen.2009.0059_r20","first-page":"1264","volume":"307","author":"Stone","year":"1993"},{"key":"10.1049\/iet-sen.2009.0059_r21","unstructured":"Krosnick, J.A.: \u2018Maximizing questionnaire quality\u2019, Robinson, J.P., Shaver, P.R., Wrightsman, L.S., Measures of political attitudes, (Academic Press, San Diego 1999),2, p. 37\u201358"}],"container-title":["IET Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-sen.2009.0059?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T18:18:10Z","timestamp":1731435490000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-sen.2009.0059"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,8]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,4,8]]}},"alternative-id":["10.1049\/iet-sen.2009.0059"],"URL":"https:\/\/doi.org\/10.1049\/iet-sen.2009.0059","relation":{},"ISSN":["1751-8806","1751-8814"],"issn-type":[{"value":"1751-8806","type":"print"},{"value":"1751-8814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4,8]]}}}