{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:52:04Z","timestamp":1729619524176,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/modre.2013.6597264","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T16:20:11Z","timestamp":1379607611000},"page":"55-64","source":"Crossref","is-referenced-by-count":6,"title":["Towards the model-driven engineering of security requirements for embedded systems"],"prefix":"10.1109","author":[{"given":"Yves","family":"Roudier","sequence":"first","affiliation":[]},{"given":"Muhammad Sabir","family":"Idrees","sequence":"additional","affiliation":[]},{"given":"Ludovic","family":"Apvrille","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","article-title":"Intra-vehicle information security framework","author":"bar-el","year":"2009","journal-title":"Design"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/2.910904"},{"key":"17","first-page":"196","article-title":"Engineering requirements for system reliability and security","volume":"9","author":"van lamsweerde","year":"2007","journal-title":"Software System Reliability and Security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6093061"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/AURE.2006.2"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/NOTERE.2011.5957992"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1772643.1772647"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70754"},{"journal-title":"TTool Website","year":"2013","author":"apvrille","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2006.379694"},{"journal-title":"SysML Systems Modeling Language","year":"2012","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1193228"},{"journal-title":"Security Requirements Engineering for Evolving Software Systems A Survey","year":"2010","author":"nhlabatsi","key":"21"},{"key":"20","article-title":"Secure on-board architecture specification","volume":"2","author":"weyl","year":"2010","journal-title":"EVITA Project Tech Rep D3"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345794"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2012.6224403"},{"key":"24","first-page":"412","article-title":"Umlsec: Extending uml for secure systems development","author":"ju?rjens","year":"2002","journal-title":"5th International Conference on the Unified Modeling Language"},{"key":"25","doi-asserted-by":"crossref","first-page":"363","DOI":"10.3233\/JCS-2009-0339","article-title":"Automatic verification of correspondences for security protocols","volume":"17","author":"blanchet","year":"2009","journal-title":"Journal of Computer Security"},{"key":"26","article-title":"A goal oriented approach for modeling and analyzing security trade-offs","author":"elahi","year":"2007","journal-title":"Proceedings of the 26th International Conference on Conceptual Modeling"},{"key":"27","first-page":"190","author":"houmb","year":"2007","journal-title":"An Integrated Security Verification and Security Solution Design Trade-off Analysis Approach"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2011.12"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0112-x"},{"journal-title":"IOS Kernel Exploitation","year":"2011","author":"esser","key":"3"},{"journal-title":"The Tale of One Thousand and One DSL Modems Kaspersky Lab","year":"2012","author":"assolini","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090662"},{"key":"1","article-title":"Keeping secrets in hardware: The microsoft xbox case study","author":"huang","year":"0","journal-title":"AI Memo 2002-008 Massachusetts Institute of Technology Artificial Intelligence Laboratory Tech Rep"},{"key":"30","article-title":"Prototyping an embedded automotive system from its uml\/sysml models","author":"apvrille","year":"2012","journal-title":"ERTSS'2012"},{"key":"7","article-title":"Security requirements for automotive on-board networks","author":"henniger","year":"0","journal-title":"Proceedings of the 9th International Conference on Intelligent Transport System Telecommunications (ITST 2009)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048510"},{"journal-title":"Aircraft Hacking","year":"2013","author":"teso","key":"5"},{"key":"31","article-title":"Requirements engineering for embedded systems","author":"broy","year":"0","journal-title":"Proceedings of the Workshop on Formal Design of Safety Critical Embedded Systems (FemSys'97) Apr"},{"key":"4","article-title":"Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices","author":"costin","year":"2012","journal-title":"BlackHat"},{"journal-title":"SPT Profile for Scheduling Performance and Time","year":"2005","key":"9"},{"journal-title":"Security Requirements for Automotive On-board Networks Based on Dark-side Scenarios","year":"2009","author":"ruddle","key":"8"}],"event":{"name":"2013 International Model-Driven Requirements Engineering Workshop (MoDRE)","start":{"date-parts":[[2013,7,15]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2013,7,15]]}},"container-title":["2013 3rd International Workshop on Model-Driven Requirements Engineering (MoDRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589046\/6597254\/06597264.pdf?arnumber=6597264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T07:25:18Z","timestamp":1563953118000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6597264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/modre.2013.6597264","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}