{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T13:55:40Z","timestamp":1725630940595},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/repa.2011.6046726","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T15:34:48Z","timestamp":1318952088000},"page":"11-20","source":"Crossref","is-referenced-by-count":4,"title":["Analysing security requirements patterns based on problems decomposition and composition"],"prefix":"10.1109","author":[{"given":"Yuhong","family":"Wen","sequence":"first","affiliation":[]},{"family":"Haihong Zhao","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Information Security Anti-patterns in Software Requirements Engineering","author":"kis","year":"2002","journal-title":"9th Conference on Pattern Language of Programs 2002"},{"key":"ref11","article-title":"Using Security Patterns to Model and Analyze Security Requirements","author":"konrad","year":"2003","journal-title":"RE'03 International Workshop on Requirements for High Assurance Systems"},{"key":"ref12","article-title":"From System Goals to Intruder Anti-Goals: Attack Generation and Resolution for Security Requirements Engineering","author":"van lamsweerde","year":"2003","journal-title":"RHAS-03 Workshop RE'03"},{"key":"ref13","first-page":"354","article-title":"(2004). Using abuse frames to bound the scope of security problems","author":"lin","year":"0","journal-title":"Not Set ed 12th IEEE International Requirements Engineering Conference (RE'04) IEEE Computer Society"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232746"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816013"},{"key":"ref16","article-title":"Security Engineering with Patterns","author":"schumacher","year":"2002","journal-title":"9th Conference on Pattern Language of Programs 2002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref18","article-title":"Templates for misuse case description","author":"sindre","year":"2001","journal-title":"Proceedings of Seventh International Workshop on Requirements Engineering Foundation of Software Quality (REFSQ&#x2018;2001)"},{"key":"ref19","first-page":"239","article-title":"Modelling Requirements Patterns with a Goal and PF Integrated Analysis Approach, Computer Software and Applications, 2008 COMPSAC '08","author":"yang","year":"2008","journal-title":"32nd Annual IEEE International"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.31"},{"key":"ref6","article-title":"Analyzing and Specifying Reusable Security Requirements","author":"firesmith","year":"2003","journal-title":"RE'03 International Workshop on Requirements for High Assurance Systems"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/ICRE.2002.1048527","article-title":"Security Requirements Engineering: When Anti-requirements Hit the Fan","author":"crook","year":"2002","journal-title":"IEEE Joint International Requirements Engineering Conference (RE'02)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45116-1_11"},{"key":"ref7","article-title":"Using Trust Assumptions in Security Requirements Engineering","author":"haley","year":"2003","journal-title":"Second Internal iTrust Workshop On Trust Management In Dynamic Open Systems"},{"key":"ref2","article-title":"The Role of Policy and Privacy Values in Requirements Engineering","author":"anton","year":"2001","journal-title":"Proc 5th IEEE Int'l Symp Requirements Eng (RE 01)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1159030"},{"journal-title":"Problem Frames Analysing and Structuring Software Development Problems","year":"2001","author":"jackson","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1997.566873"},{"journal-title":"Security Patterns Integrating Security and Systems Engineering","year":"2006","author":"schumacher","key":"ref21"}],"event":{"name":"2011 The First International Workshop On Requirements Patterns (RePa) (Part Of Re 2011 Conference)","start":{"date-parts":[[2011,8,29]]},"location":"Trento, Italy","end":{"date-parts":[[2011,8,29]]}},"container-title":["2011 First International Workshop On Requirements Patterns"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6036076\/6046719\/06046726.pdf?arnumber=6046726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:12:36Z","timestamp":1497946356000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6046726\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/repa.2011.6046726","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}