{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:11:22Z","timestamp":1729635082562,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/iwsess.2009.5068452","type":"proceedings-article","created":{"date-parts":[[2009,6,10]],"date-time":"2009-06-10T14:55:45Z","timestamp":1244645745000},"page":"1-8","source":"Crossref","is-referenced-by-count":11,"title":["Reusable security use cases for mobile grid environments"],"prefix":"10.1109","author":[{"given":"David G.","family":"Rosado","sequence":"first","affiliation":[]},{"given":"Eduardo","family":"Fernandez-Medina","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"35","article-title":"obtaining security requirements for a mobile grid system","author":"rosado","year":"2008","journal-title":"International Journal of Grid and High Performance Computing"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.842776"},{"year":"2008","key":"36","article-title":"software & systems process engineering meta-model specification (spem) 2.0"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.12"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.52"},{"key":"15","first-page":"932","article-title":"mobile-to-grid middleware: bridging the gap between mobile and grid environments","author":"jameel","year":"2005","journal-title":"European Grid Conference EGC"},{"key":"34","first-page":"146","article-title":"engineering process based on grid use cases for mobile grid systems","author":"rosado","year":"2008","journal-title":"Third International Conference on Software and Data Technologies- ICSOFT"},{"key":"16","article-title":"disconnected operation service in mobile grid computing","author":"park","year":"2003","journal-title":"presented at International Conference on Service Oriented Computing (ICSOC"},{"key":"13","article-title":"mobile grid computing: changes and challenges of resourse management in a mobile grid environment","author":"litke","year":"2004","journal-title":"5th International Conference on Practical Aspects of Knowledge Management (PAKM"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SKG.2005.10"},{"key":"37","article-title":"capturing security requirements by misuse cases","author":"sindre","year":"2001","journal-title":"presented at 14th Norwegian Informatics Conference (NIK"},{"key":"11","first-page":"83","article-title":"a security architecture for computational grids","author":"foster","year":"1998","journal-title":"5th Conference on Computer and Communications Security"},{"year":"2006","key":"38"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2003.1199431"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.58"},{"key":"20","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1007\/978-1-4615-0509-9_6","article-title":"scheduling in the grid application development software project","author":"dail","year":"2004","journal-title":"Grid Resource Management State of the Art and Future Trends"},{"journal-title":"The Rational Unified Process An Introduction","year":"2000","author":"kruchten","key":"22"},{"journal-title":"The Unified Software Development Process","year":"1999","author":"jacobson","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/986655.986664"},{"key":"25","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45314-8_14","article-title":"towards development of secure systems using umlsec","author":"jurjens","year":"2001","journal-title":"Fundamental Approaches to Software Engineering (FASE\/ETAPS)"},{"key":"26","first-page":"1","article-title":"umlsec: extending uml for secure systems development","author":"jurjens","year":"2002","journal-title":"5th International Conference on the Unified Modeling Language (UML)"},{"key":"27","first-page":"1088","article-title":".the alchemy of security design methodology, patterns, and reality checks","author":"steel","year":"2005","journal-title":"Core Security Patterns Best Practices and Strategies for J2EECore Security Patterns Best Practices and Strategies for J2EE? Web Services and Identity Management Prentice Hall PTR\/Sun Micros"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2003.1254403"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/GRID.2004.44"},{"journal-title":"Secure Systems Development with UML","year":"2004","author":"ju?rjens","key":"3"},{"year":"0","key":"2"},{"journal-title":"The Grid2 Blueprint for a Future Computing Infrastructure","year":"2004","author":"foster","key":"10"},{"key":"1","first-page":"97","article-title":"grid interactive service-oriented programming environment","author":"kolonay","year":"2004","journal-title":"Concurrent Engineering The Worldwide Engineering Grid"},{"key":"30","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/978-3-540-24591-9_4","article-title":"enhancing grid security infrastructure to support mobile computing nodes","volume":"2908","author":"kwok-yan","year":"2004","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Integrating Security and Software Engineering Advances and Future Vision IGI Global","year":"2006","author":"mouratidis","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1137627.1137634"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2002.1016594"},{"key":"5","article-title":"key issues of a formally based process model for security engineering","author":"breu","year":"2003","journal-title":"International Conference on Software and Systems Engineering and their Applications"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/570677.570679"},{"key":"4","first-page":"426","author":"lodderstedt","year":"2002","journal-title":"SecureUML A UML-Based Modeling Language for Model-Driven Security"},{"key":"9","first-page":"100","article-title":"model driven security for process-oriented systems","author":"basin","year":"2003","journal-title":"ACM Symposium on Access Control Models and Technologies"},{"key":"8","article-title":"towards a security engineering process","author":"artelsmair","year":"2003","journal-title":"Proceedings of the World Multiconference on Systemics Cybernetics and Informatics"}],"event":{"name":"2009 ICSE Workshop on Software Engineering for Secure Systems (SESS)","start":{"date-parts":[[2009,5,19]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2009,5,19]]}},"container-title":["2009 ICSE Workshop on Software Engineering for Secure Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5054533\/5068439\/05068452.pdf?arnumber=5068452","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T20:54:07Z","timestamp":1558385647000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5068452\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/iwsess.2009.5068452","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}