{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:48:42Z","timestamp":1730220522444,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/espre.2014.6890525","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T15:52:33Z","timestamp":1410364353000},"page":"31-36","source":"Crossref","is-referenced-by-count":7,"title":["Supporting evolving security models for an agile security evaluation"],"prefix":"10.1109","author":[{"given":"Wolfgang","family":"Raschke","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Zilli","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Baumgartner","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Loinig","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Steger","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Kreiner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Succeeding with Agile","year":"2009","author":"cohn","key":"3"},{"journal-title":"Agile Software Development","year":"2006","author":"cockburn","key":"2"},{"key":"10","first-page":"29","article-title":"Model differences in the eclipse modeling framework","volume":"9","author":"brun","year":"2008","journal-title":"Upgrade The European Journal for the Informatics Professional"},{"journal-title":"Common Criteria for Information Technology Security Evaluation -Part 1-3","year":"2009","key":"1"},{"key":"7","first-page":"175","article-title":"Extending software change impact analysis into COTS components","author":"bohner","year":"2002","journal-title":"Software Engineering Workshop 2002 Proceedings 27th Annual NASA Goddard\/IEEE"},{"journal-title":"Reuse of Evaluation Results and Evidenc","year":"2002","key":"6"},{"key":"5","article-title":"Why model versioning research is needed!? An experience report","author":"altmanninger","year":"2009","journal-title":"Proceedings of the MoDSE-MCCM"},{"key":"4","first-page":"47","article-title":"Towards agile security assurance","author":"beznosov","year":"2004","journal-title":"NSPW"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-012-0311-7"},{"key":"8","article-title":"The emergence of change at the interface of system and embedded software design","author":"kilpinen","year":"2007","journal-title":"Conference on Systems Engineering Research Hoboeken NJ"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21470-7_5"}],"event":{"name":"2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)","start":{"date-parts":[[2014,8,25]]},"location":"Karlskrona, Sweden","end":{"date-parts":[[2014,8,25]]}},"container-title":["2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883269\/6890516\/06890525.pdf?arnumber=6890525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T17:39:19Z","timestamp":1490290759000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/espre.2014.6890525","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}