{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:37:27Z","timestamp":1729615047722,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icitcs.2016.7740336","type":"proceedings-article","created":{"date-parts":[[2016,11,10]],"date-time":"2016-11-10T21:40:55Z","timestamp":1478814055000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Framework for Engineering Complex Security Requirements Patterns"],"prefix":"10.1109","author":[{"given":"Raul","family":"Mazo","sequence":"first","affiliation":[]},{"given":"Christophe","family":"Feltus","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194006002823"},{"key":"ref11","article-title":"Model-Driven Security with Modularity and Reusability for Secure Systems Development","author":"nguyen","year":"2014","journal-title":"STAF-DS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2631675.2631683"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.79"},{"key":"ref14","first-page":"175","article-title":"A Pattern-Based Method for Building Requirements Documents in Call-for-Tender Processes","author":"renault","year":"2009","journal-title":"International Journal on Computational Science &amp; Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RCIS.2009.5089271"},{"journal-title":"Security Patterns Integrating Security and Systems Engineering","year":"2013","author":"schumacher","key":"ref16"},{"key":"ref17","article-title":"Reusable knowledge in security requirements engineering: a systematic mapping study","author":"souag","year":"2015","journal-title":"Journal of Requirements Engineering Springer London"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15618-7_13"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT.2004.1266117"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61520-837-1.ch002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICTTA.2008.4529912"},{"key":"ref6","article-title":"Attack Patterns for Security Requirements Engineering","author":"hermoye","year":"2006","journal-title":"Requirements Engineering"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34419-0_5"},{"key":"ref8","article-title":"Using security patterns to model and analyze security requirements","author":"konrad","year":"2003","journal-title":"IEEE Joint International Conference on Requirements Engineering (RE)"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"75","DOI":"10.2307\/25148625","article-title":"2004 Design science in information systems research","volume":"1","author":"hevner","year":"2004","journal-title":"MIS Quarterly 28 4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2004.11.002"},{"key":"ref1","volume":"1","author":"alexander","year":"1979","journal-title":"The Timeless Way of Building"},{"key":"ref9","first-page":"147","article-title":"A Method based on Association Rules to Construct Product Line Models","author":"lora-michiels","year":"2010","journal-title":"4th International Workshop on Variability Modelling of Software-intensive Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.81"}],"event":{"name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","start":{"date-parts":[[2016,9,26]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2016,9,26]]}},"container-title":["2016 6th International Conference on IT Convergence and Security (ICITCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7740253\/7740293\/07740336.pdf?arnumber=7740336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T13:18:36Z","timestamp":1568553516000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7740336\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icitcs.2016.7740336","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}