{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:47:02Z","timestamp":1729666022689,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/re.2014.6912261","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T20:37:18Z","timestamp":1412109438000},"page":"193-202","source":"Crossref","is-referenced-by-count":9,"title":["Managing security requirements patterns using feature diagram hierarchies"],"prefix":"10.1109","author":[{"given":"Rocky","family":"Slavin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jean-Michel","family":"Lehker","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianwei","family":"Niu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Travis D.","family":"Breaux","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/11554844_3","article-title":"Feature models, grammars, and propositional formulas","author":"batory","year":"2005","journal-title":"9th International Conference on Software Product Lines"},{"journal-title":"Payment Card Industry (PCI) Data Security Standard","year":"2010","author":"council","key":"35"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.21236\/ADA235785","author":"kang","year":"1990","journal-title":"Feature-Oriented Domain Analysis (FODA) Feasibility Study"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/1415472.1415485"},{"journal-title":"FAQ Sheet on Feature Interaction","year":"2004","author":"zave","key":"18"},{"journal-title":"Security patterns repository","year":"2014","author":"lehker","key":"33"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/RePa.2012.6359975"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2014.6912261"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/2384592.2384607"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.080128"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.32"},{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1994","author":"gamma","key":"14"},{"journal-title":"Case Study Research","year":"2009","author":"yin","key":"37"},{"key":"11","article-title":"The difficulties of using design patterns among novices: An exploratory study","author":"jalil","year":"2007","journal-title":"ICCSA'07"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029140"},{"journal-title":"Security Patterns Integrating Security and Systems Engineering","year":"2006","author":"schumacher","key":"12"},{"key":"21","first-page":"417","article-title":"Protection-principles and practice","author":"graham","year":"1972","journal-title":"AFIPS Spring Joint Computer Conference"},{"journal-title":"Computer Security Model Unified Exposition and Multics Interpretation","year":"1975","author":"bell","key":"20"},{"journal-title":"Security Design Patterns Part 1","year":"2001","author":"romanosky","key":"43"},{"key":"42","first-page":"1","article-title":"Architectural patterns for enabling application security","author":"yoder","year":"1997","journal-title":"PLoP '97"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"key":"40","article-title":"How to detect and handle outliers","volume":"16","author":"iglewicz","year":"1993","journal-title":"The ASQC Basic References in Quality Control Statistical Techniques"},{"key":"48","first-page":"244","article-title":"A comparison of goal-oriented approaches to model SPLs variability","author":"borba","year":"2009","journal-title":"ER Workshops '09"},{"journal-title":"Security Patterns for Web Application Development Final Technical Report","year":"2003","author":"kienzle","key":"45"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.2007.4"},{"key":"47","first-page":"167","article-title":"Reasoning with goal models","author":"giorgini","year":"2002","journal-title":"ER'02"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.45"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/52.268952"},{"key":"23","first-page":"261","article-title":"Tropos: A framework for requirements-driven software development","author":"mylopoulos","year":"2000","journal-title":"Information Systems Engineering State of the Art and Research Themes"},{"journal-title":"Problem Frames Analyzing and Structuring Software Develoment Problems","year":"2001","author":"jackson","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/RePa.2012.6359969"},{"key":"26","first-page":"1","article-title":"A pattern for structuring the behavioral requirements of features of an embedded system","author":"dietrich","year":"2012","journal-title":"RePa'12"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/RePa.2012.6359974"},{"key":"28","first-page":"1","article-title":"Information security in a multi-user computer environment","author":"anderson","year":"1973","journal-title":"Advances in Computers"},{"journal-title":"Software Requirements Styles and Techniques","year":"2002","author":"lauesen","key":"29"},{"key":"3","first-page":"248","article-title":"Present situation and development of single sign-on tehnology","author":"lin","year":"2001","journal-title":"Journal of Computer Applications"},{"journal-title":"A Pattern Language","year":"1977","author":"alexander","key":"2"},{"key":"10","article-title":"Security patterns repository version 1.0","author":"kienzle","year":"2002","journal-title":"DARPA"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1211541"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.48"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010193"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CMPASS.1997.613270"},{"key":"32","article-title":"Rethinking security requirements in RE research","author":"hibshi","year":"2014","journal-title":"Tech Rep Report CSTR-2014-001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1996.493406"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1035429.1035437"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"journal-title":"Software Requirements Patterns","year":"2007","author":"withall","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.2201\/NiiPi.2008.5.5"}],"event":{"name":"2014 IEEE 22nd International Requirements Engineering Conference (RE)","start":{"date-parts":[[2014,8,25]]},"location":"Karlskrona, Sweden","end":{"date-parts":[[2014,8,29]]}},"container-title":["2014 IEEE 22nd International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6903646\/6912234\/06912261.pdf?arnumber=6912261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T17:25:33Z","timestamp":1565889933000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6912261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/re.2014.6912261","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}