{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T11:16:44Z","timestamp":1771672604093,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icre.2003.1232746","type":"proceedings-article","created":{"date-parts":[[2004,4,23]],"date-time":"2004-04-23T18:38:15Z","timestamp":1082745495000},"page":"151-161","source":"Crossref","is-referenced-by-count":198,"title":["Security and privacy requirements analysis within a social setting"],"prefix":"10.1109","author":[{"given":"L.","family":"Liu","sequence":"first","affiliation":[]},{"given":"E.","family":"Yu","sequence":"additional","affiliation":[]},{"given":"J.","family":"Mylopoulos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232743"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1145\/505145.505149","article-title":"A Lightweight Object Modeling Notation","volume":"11","author":"alloy","year":"2002","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"ref12","author":"leveson","year":"1995","journal-title":"Safeware System Safety and Computers"},{"key":"ref13","article-title":"Analyzing Security Requirements as Relationships Among Strategic Actors","author":"liu","year":"2002","journal-title":"2nd Symposium on Requirements Engineering for Information Security (SREIS'02)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816013"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/102675.102676"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067733"},{"key":"ref18","article-title":"Attack Trees Modeling Security Threats","author":"schneier","year":"1999","journal-title":"Dr Dobb's Journal"},{"key":"ref19","article-title":"Templates for Misuse Case Description","author":"sindre","year":"2001","journal-title":"Proceedings of the 7th International Workshop on Requirements Engineering Foundation for Software Quality (REFSQ'2001)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/3-540-56777-1_13","article-title":"Dealing with Security Requirements During the Development of Information Systems","author":"chung","year":"1993","journal-title":"Proceedings of the 5 Int Conf on Advanced Information Systems Engineering - CAISE'93"},{"key":"ref6","article-title":"Authentic Data publication over the Internet","author":"devanbu","year":"0","journal-title":"Journal of Computer Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048527"},{"key":"ref8","first-page":"232","article-title":"Reasoning with Goal Models","author":"giorgini","year":"2002","journal-title":"21th International Conference on Conceptual Modeling (ER'02)"},{"key":"ref7","first-page":"174","article-title":"Model Checking Early Requirements Specifications in Tropos","author":"fuxman","year":"2001","journal-title":"5th IEEE lnt Symposium on Requirements Engineering (RE'01)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048502"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502667"},{"key":"ref20","article-title":"Guardian Angel: Patient-Centered Health Information Systems","author":"szolovits","year":"0","journal-title":"MIT\/LCS Technical Report"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1997.566873"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/32.879820"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1007\/3-540-45547-7_11","article-title":"Modeling Trust for System Design Using the i* Strategic Actors Framework","author":"yu","year":"2001","journal-title":"Trust in Cyber-Societies Integrating the Human and Artificial Perspectives"},{"key":"ref23","article-title":"Designing for Privacy and Other Competing Requirements","author":"yu","year":"2002","journal-title":"2nd Symposium on Requirements Engineering for Information Security (SREIS'02)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45581-7_14"}],"event":{"name":"11th IEEE International Requirements Engineering Conference","location":"Monterey Bay, CA, USA","acronym":"ICRE-03"},"container-title":["Journal of Lightwave Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8725\/27626\/01232746.pdf?arnumber=1232746","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T06:22:29Z","timestamp":1497594149000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1232746\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icre.2003.1232746","relation":{},"subject":[]}}