{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:38:05Z","timestamp":1761676685015,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icmcs.2018.8525939","type":"proceedings-article","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T23:42:06Z","timestamp":1541720526000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Modeling telemedicine security requirements using a SysML security extension"],"prefix":"10.1109","author":[{"given":"Ilham","family":"Maskani","sequence":"first","affiliation":[]},{"given":"Jaouad","family":"Boutahar","sequence":"additional","affiliation":[]},{"given":"Souhail","family":"El Ghazi El Houssaini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2015.07.007"},{"journal-title":"Secure Systems Development with UML","year":"2010","author":"jurjens","key":"ref11"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","article-title":"SecureUML: A UML-based modeling language for model-driven security","author":"lodderstedt","year":"2002","journal-title":"&#x00AB;UML&#x00BB; 2002&#x2014; Unified Model Lang"},{"year":"0","key":"ref13","article-title":"About the OMG System Modeling Language Specification Version 1.5"},{"year":"0","key":"ref14","article-title":"ISO\/IEC 19514:2017 - Information technology -- Object management group systems modeling language (OMG SysML)"},{"key":"ref15","first-page":"981","article-title":"Privacy and Security Concerns in Telehealth","volume":"16","author":"hale","year":"2014","journal-title":"Virtual Mentor"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/193229681100500331"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-009-0119-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5120\/ijais2017451731"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.3.6.57-68"},{"key":"ref5","first-page":"8","article-title":"SysML-Sec: A SysML environment for the design and development of secure embedded systems","author":"apvrille","year":"2013","journal-title":"APCOSEC Asia-Pac Counc Syst Eng"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317437"},{"year":"0","key":"ref7","article-title":"ISO\/IEC 27000:2016 - Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary"},{"year":"0","key":"ref2","article-title":"What is SysML?"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.071106"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0005-7"}],"event":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","start":{"date-parts":[[2018,5,10]]},"location":"Rabat","end":{"date-parts":[[2018,5,12]]}},"container-title":["2018 6th International Conference on Multimedia Computing and Systems (ICMCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488380\/8525492\/08525939.pdf?arnumber=8525939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:11:38Z","timestamp":1643217098000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8525939\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icmcs.2018.8525939","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}