{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T20:34:09Z","timestamp":1761510849672,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icre.2002.1048527","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T19:45:08Z","timestamp":1056570308000},"page":"203-205","source":"Crossref","is-referenced-by-count":46,"title":["Security requirements engineering: when anti-requirements hit the fan"],"prefix":"10.1109","author":[{"given":"R.","family":"Crook","sequence":"first","affiliation":[]},{"given":"D.","family":"Ince","sequence":"additional","affiliation":[]},{"family":"Luncheng Lin","sequence":"additional","affiliation":[]},{"given":"B.","family":"Nuseibeh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1997.646186"},{"year":"2001","key":"ref11","article-title":"Pierre Jean-Fontaine Goal Oriented Elaboration of Security Requirements"},{"key":"ref12","article-title":"Security Models","author":"mclean","year":"1994","journal-title":"Encyclopaedia of Software Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816013"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/319171.319186"},{"key":"ref15","article-title":"Requirements and Policies","author":"moffett","year":"1999","journal-title":"Proc Policy Workshop HP-Laboratories Bristol"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref17","article-title":"Templates for Misuse Case Description","author":"sindre","year":"2001","journal-title":"Proceedings of the 7th International Workshop on Requirements Engineering Foundation for Software Quality (REFSQ'2001)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1994.315946"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/32.879820"},{"journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems","year":"2001","author":"anderson","key":"ref4"},{"key":"ref3","article-title":"Misuse Cases","author":"alexander","year":"2002","journal-title":"Proc of Int Requirements Eng Conference (RE)"},{"journal-title":"Information Security Management Part 1 Code of Practice for Information Security Management","year":"1999","key":"ref6"},{"key":"ref5","article-title":"Secure Computer Systems: A Mathematical Model","volume":"ii","author":"bell","year":"1973","journal-title":"MITRE Technical Report 2547"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-56777-1_13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"ref2","article-title":"The Role of Policy and Stakeholder Privacy Values in Requirements Engineering","author":"anton","year":"2001","journal-title":"Proceeding of Symposium on Requirements Engineering for Information Security"},{"key":"ref9","article-title":"Ponder, A Language for specifying Management and Security Policies for Distributed Systems","author":"damianou","year":"2001","journal-title":"Imperial College Research Report"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1467-1_5"},{"key":"ref20","article-title":"Modelling Trust in the i* Strategic Actors Framework","author":"yu","year":"2000","journal-title":"Proc of the 3rd Workshop on Deception Fraud and Trust in Agent Societies"}],"event":{"name":"IEEE Joint International Conference on Requirements Engineering","acronym":"ICRE-02","location":"Essen, Germany"},"container-title":["Proceedings IEEE Joint International Conference on Requirements Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8115\/22462\/01048527.pdf?arnumber=1048527","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T17:27:23Z","timestamp":1489426043000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1048527\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icre.2002.1048527","relation":{},"subject":[]}}