{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T21:27:09Z","timestamp":1761514029824,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/rcis.2017.7956571","type":"proceedings-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T16:35:56Z","timestamp":1498494956000},"page":"427-432","source":"Crossref","is-referenced-by-count":10,"title":["A framework managing conflicts between security and privacy requirements"],"prefix":"10.1109","author":[{"given":"Duaa","family":"Alkubaisy","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"212","article-title":"Designing Privacy Aware Information Systems","author":"kalloniatis","year":"2010","journal-title":"Software Engineering for Secure Systems Industrial and ResearchPerspectives Industrial and ResearchPerspectives"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336523"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267581"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11767138_4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23276-8_29"},{"key":"ref15","article-title":"A framework for security requirements engineering","author":"moffett","year":"2003","journal-title":"University of York - Department of Computer Science Report YCS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1504\/IJIPSI.2011.043733"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.55"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4018\/jsse.2012070101"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70754"},{"journal-title":"(20\/01\/2017) Requirements Engineering","year":"0","author":"welland","key":"ref6"},{"key":"ref5","first-page":"1585","article-title":"Linkage control-integrating the essence of privacy protection into identity management","author":"hansen","year":"2008","journal-title":"Proceedings of eChallenges"},{"journal-title":"Threat vulnerability risk - commonly mixed up terms","year":"2016","key":"ref8"},{"key":"ref7","first-page":"137","article-title":"A framework for modeling privacy requirements in role engineering","volume":"3","author":"he","year":"2003","journal-title":"Proc of REFSQ"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5120\/2218-2827"},{"journal-title":"Non-Functional Requirements in Software Engineering","year":"2012","author":"chung","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-008-0067-3"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1017\/S0026749X09990394"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/32.730542"},{"key":"ref21","first-page":"41","article-title":"Resolving requirements conflicts with computer-supported negotiation","volume":"1","author":"easterbrook","year":"1994","journal-title":"Requirements Engineering Social and Technical Issues"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41924-9_23"}],"event":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2017,5,10]]},"location":"Brighton, United Kingdom","end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 11th International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951529\/7956506\/07956571.pdf?arnumber=7956571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T00:23:20Z","timestamp":1499819000000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7956571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/rcis.2017.7956571","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}