{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:36:53Z","timestamp":1729669013359,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/re.2013.6636717","type":"proceedings-article","created":{"date-parts":[[2013,10,29]],"date-time":"2013-10-29T23:25:31Z","timestamp":1383089131000},"page":"175-184","source":"Crossref","is-referenced-by-count":1,"title":["Assumption-based risk identification method (ARM) in dynamic service provisioning"],"prefix":"10.1109","author":[{"given":"Alireza","family":"Zarghami","sequence":"first","affiliation":[]},{"given":"Eelco","family":"Vriezekolk","sequence":"additional","affiliation":[]},{"given":"Mohammad Zarifi","family":"Eslami","sequence":"additional","affiliation":[]},{"given":"Marten","family":"van Sinderen","sequence":"additional","affiliation":[]},{"given":"Roel","family":"Wieringa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2011.6166222"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2008.02.001"},{"journal-title":"Human Reliability Analysis Context and Control","year":"1993","author":"hollnagel","key":"17"},{"key":"18","first-page":"40","article-title":"Risk identification of tailorable contextaware systems: A case study and lessons learned","volume":"855","author":"zarifi eslami","year":"2012","journal-title":"Proceedings of the CAiSE'12 Forum at the 24th International Conference on Advanced Information Systems Engineering (CAiSE) Ser CEUR Workshop Proceedings"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(96)00099-3"},{"key":"16","first-page":"239","article-title":"Risk and argument: A risk-based argumentation method for practical security","author":"nunes leal franqueira","year":"2011","journal-title":"Proceedings of the 19th IEEE International Requirements Engineering Conference Trento Italy USA IEEE Computer Society"},{"key":"13","article-title":"Arguing security: Validating security requirements using structured argumentation","author":"haley","year":"2005","journal-title":"Third Symposium on Requirements Engineering for Information Security (SREIS'05) Held in Conjunction with the 13th International Requirements Engineering Conference (RE'05"},{"key":"14","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/S0925-7535(98)00025-3","article-title":"Development of a Hazard and Operabilitybased method for identifying safety management vulnerabilities in high risk systems","volume":"30","author":"kennedy","year":"1998","journal-title":"Safety Science"},{"key":"11","article-title":"A system-Theoretic hazard analysis methodology for a non-Advocate safety assessment of the ballistic missile defense system","author":"pereira","year":"2006","journal-title":"DTIC Document Tech Rep"},{"key":"12","article-title":"Modeling and hazard analysis using stpa","author":"ishimatsu","year":"2010","journal-title":"Conference of the International Association for the Advancement of Space Safety"},{"journal-title":"Problem Frames Analysing and Structuring Software Development Problems","year":"2000","author":"jackson","key":"21"},{"journal-title":"Int Std","article-title":"Information technology, Security techniques, Guidelines for the management of IT Security: Concepts and models","year":"2004","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2012.21"},{"journal-title":"Terminology of disaster risk reduction","year":"2009","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/0951-8320(95)00068-D"},{"key":"1","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1093\/intqhc\/mzm068","article-title":"Safety in home care: A broadened perspective of patient safety,\" Int","volume":"20","author":"lang","year":"2008","journal-title":"Journal for Quality in Health Care"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/52.469757"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-007-0048-y"},{"journal-title":"And Specifications A Lexicon of Practice Principles and Prejudices","year":"1995","author":"jackson","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1351\/pac199365092003"},{"key":"9","first-page":"249","article-title":"Goal-oriented requirements engineering: A guided tour requirements engineering 2001","author":"van lamsweerde","year":"2001","journal-title":"Proceedings Fifth IEEE International Symposium On IEEE"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.86"}],"event":{"name":"2013 IEEE 21st International Requirements Engineering Conference (RE)","start":{"date-parts":[[2013,7,15]]},"location":"Rio de Janeiro-RJ, Brazil","end":{"date-parts":[[2013,7,19]]}},"container-title":["2013 21st IEEE International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6621629\/6636689\/06636717.pdf?arnumber=6636717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:02:12Z","timestamp":1498093332000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6636717\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/re.2013.6636717","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}