{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:46:28Z","timestamp":1729665988014,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/re.2015.7320458","type":"proceedings-article","created":{"date-parts":[[2015,11,5]],"date-time":"2015-11-05T22:57:15Z","timestamp":1446764235000},"page":"398-399","source":"Crossref","is-referenced-by-count":2,"title":["Security Assurance Requirements Engineering (STARE) for trustworthy service level agreements"],"prefix":"10.1109","author":[{"given":"Yudhistira","family":"Nugraha","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"21","article-title":"Empirical validation of a requirements engineering process guide","author":"leuser","year":"0","journal-title":"Proceedings of the 13th International Conference on Evaluation and Assessment in Software Engineering EASE'09"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/335169.335194"},{"key":"ref10","first-page":"23","article-title":"Requirements engineering for service-oriented computing: A position paper","author":"van eck","year":"0","journal-title":"First International Workshop on e-Services at ICEC'03 Pittsburgh Pennsylvania USA"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.21236\/ADA443493","volume":"30","author":"mead","year":"2005","journal-title":"Security Quality Requirements Engineering (SQUARE) Methodology"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2011.76"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2010.19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336523"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2389661"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/EUROMICRO.2005.49","article-title":"QoSOnt: a QoS ontology for service-centric systems","author":"dobson","year":"2005","journal-title":"Software Engineering and Advanced Applications 2005 31st EUROMICRO Conference on"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-012-0153-4"},{"key":"ref1","first-page":"14","article-title":"Lawful interception capability requirements","volume":"24","author":"brown","year":"2013","journal-title":"Computer Law"}],"event":{"name":"2015 IEEE 23rd International Requirements Engineering Conference (RE)","start":{"date-parts":[[2015,8,24]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 IEEE 23rd International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7310793\/7320393\/07320458.pdf?arnumber=7320458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T08:56:21Z","timestamp":1567328181000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7320458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/re.2015.7320458","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}