{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T02:53:57Z","timestamp":1730256837659,"version":"3.28.0"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/icsecs58457.2023.10256374","type":"proceedings-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T17:36:02Z","timestamp":1695749762000},"page":"78-83","source":"Crossref","is-referenced-by-count":0,"title":["Security Requirements Assurance: An Assurance Case Perspective"],"prefix":"10.1109","author":[{"given":"Aftab Alam","family":"Janisar","sequence":"first","affiliation":[{"name":"Universiti Teknologi Petronas,Department of computer and information science,Seri Iskandar Perak,Malaysia,32610"}]},{"given":"Khairul Shafee bin","family":"Kalid","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Petronas,Department of computer and information science,Seri Iskandar Perak,Malaysia,32610"}]},{"given":"Aliza Bt","family":"Sarlan","sequence":"additional","affiliation":[{"name":"Universiti Teknologi Petronas,Department of computer and information science,Seri Iskandar Perak,Malaysia,32610"}]},{"given":"Abdul Rehman","family":"Gilal","sequence":"additional","affiliation":[{"name":"School of Computing, University of Portsmouth,UK"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.jksuci.2018.12.005"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s13369-019-04067-3"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.5121\/ijsea.2016.7102"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.5815\/ijieeb.2022.02.03"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1504\/IJICS.2020.107451"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICSC52841.2022.00031"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1080\/03772063.2017.1313140"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-981-10-7796-8_6"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/FIT.2018.00062"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.32628\/ijsrst196215"},{"issue":"01","key":"ref11","article-title":"SECURITY REQUIREMENTS TEMPLATE-BASED APPROACH TO IMPROVE THE WRITING OF COMPLETE SECURITY REQUIREMENTS","volume":"99","author":"MUSTAFA","year":"2021","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"16","key":"ref12","article-title":"SECURITY REQUIREMENTS ELICITATION AND CONSISTENCY VALIDATION: A SYSTEMATIC","volume":"96","author":"MUSTAFA","year":"2018","journal-title":"Journal of Theoretical and Applied Information Technology"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/access.2021.3052311"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.3390\/app10144981"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1080\/02522667.2021.1972618"},{"key":"ref16","first-page":"2016","volume":"7","author":"Harris","year":"2016","journal-title":"California data breach report"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1002\/9781119644682"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.cosrev.2022.100496"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.cosrev.2022.100496"},{"key":"ref20","first-page":"137","article-title":"A preliminary structure of software security assurance model","volume-title":"Proceedings of the 13th International Conference on Global Software Engineering","author":"Khan"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/FAS-W.2019.00045"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/s10664-021-09971-7"},{"key":"ref23","article-title":"Using Complementary Risk Acceptance Criteria to Structure Assurance Cases for Safety-Critical AI Components","author":"Kl\u00e4s","year":"2021","journal-title":"AISafety@ IJCAI"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/3342481"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1145\/3195836.3195838","article-title":"How do practitioners perceive assurance cases in safety-critical software systems?","volume-title":"Proceedings of the 11th International Workshop on Cooperative and Human Aspects of Software Engineering","author":"Cheng","year":"2018"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.4018\/978-1-5225-6313-6.ch002"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.3390\/jcp2030030"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.23919\/INDIACom49435.2020.9083691"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.3390\/app13042465"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/SysCon48628.2021.9447113"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/j.cose.2020.101852"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.15282\/ijsecs.8.1.2022.5.0095"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/j.egyr.2021.08.126"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.compeleceng.2022.107997"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.iot.2019.100129"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.11591\/ijeecs.v18.i3.pp1520-1530"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech52372.2021.00022"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/3365438.3410952"},{"key":"ref39","doi-asserted-by":"crossref","DOI":"10.1145\/3196369.3196385","article-title":"A preliminary structure of software security assurance model","volume-title":"Proceedings of the 13th International Conference on Global Software Engineering","author":"Khan","year":"2018"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/iotm.0001.2000062"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1145\/3241403.3241464"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.24251\/HICSS.2019.878"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1016\/j.future.2020.03.031"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.24251\/HICSS.2020.778"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1109\/TSE.2017.2738640"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1007\/978-3-319-66284-8_3"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1007\/s00766-022-00382-8"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/QRS.2017.45"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1109\/SEAA.2018.00080"}],"event":{"name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","start":{"date-parts":[[2023,8,25]]},"location":"Penang, Malaysia","end":{"date-parts":[[2023,8,27]]}},"container-title":["2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10256260\/10256269\/10256374.pdf?arnumber=10256374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T03:26:18Z","timestamp":1709349978000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10256374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/icsecs58457.2023.10256374","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}