{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:08:20Z","timestamp":1748750900558,"version":"3.41.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:00:00Z","timestamp":1743984000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T00:00:00Z","timestamp":1743984000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,7]]},"DOI":"10.1109\/syscon64521.2025.11014840","type":"proceedings-article","created":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T17:43:30Z","timestamp":1748627010000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Structured Requirements for DomainKey Identified Mail (DKIM) Standard Verification"],"prefix":"10.1109","author":[{"given":"Brian","family":"Mooney","sequence":"first","affiliation":[{"name":"Colorado State University,Systems Engineering,Fort Collins,Colorado,USA"}]},{"given":"Sarah","family":"Rudder","sequence":"additional","affiliation":[{"name":"Colorado State University,Systems Engineering,Fort Collins,Colorado,USA"}]},{"given":"Jeremy","family":"Daily","sequence":"additional","affiliation":[{"name":"Colorado State University,Systems Engineering,Fort Collins,Colorado,USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"DomainKeys Identified Mail (DKIM) Service Overview","author":"Crocker","year":"2009","journal-title":"Internet Engineering Task Force, Request for Comments RFC 5585"},{"key":"ref2","article-title":"Model-based structured requirements in SysML","volume-title":"Request for Comments 3935","author":"Alvestrand","year":"2004"},{"key":"ref3","article-title":"Host Software","author":"Crocker","year":"1969","journal-title":"UCLA, Request for Comments 1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc0822"},{"key":"ref5","article-title":"Internet Protocol on Network Systems HYPERchannel Protocol Specification","volume-title":"Request for Comments 1044","author":"Hardwick","year":"1988"},{"key":"ref6","article-title":"ORIGINAL DomainKeys Identified Mail (DKIM) Signatures","volume-title":"Request for Comments 4871","author":"Allman","year":"2007"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.17487\/rfc5672","article-title":"RFC 4871 DomainKeys Identified Mail (DKIM) Signatures - Update","volume-title":"Request for Comments 5672","author":"Crocker","year":"2009"},{"key":"ref8","article-title":"DomainKeys Identified Mail (DKIM) Signatures","volume-title":"Request for Comments RFC 6376","author":"Kucherawy","year":"2011"},{"issue":"3","key":"ref9","first-page":"243","article-title":"Assisting requirement formalization by means of natural language translation","volume-title":"Request for Comments 8463","volume":"4","author":"Levine","year":"2018"},{"key":"ref10","article-title":"INCOSE Guide to Writing Requirements","volume-title":"INCOSE","author":"Ryan","year":"2023"},{"volume-title":"Natural Language Processing (NLP) for Requirements Engineering: A Systematic Mapping Study","year":"2020","author":"Zhao","key":"ref11"},{"volume-title":"Writing Quality Requirements","year":"1999","author":"Wiegers","key":"ref12"},{"volume-title":"Systems Engineering Handbook","year":"2023","author":"Walden","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3403\/30230210u"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/re.2013.6636709"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/bf01384048"},{"volume-title":"Bridging the Gap Between Requirements and Model Analysis: Evaluation on Ten Cyber-Physical Challenge Problems","author":"Mavridou","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106590"}],"event":{"name":"2025 IEEE International systems Conference (SysCon)","start":{"date-parts":[[2025,4,7]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2025,4,10]]}},"container-title":["2025 IEEE International systems Conference (SysCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11014641\/11014642\/11014840.pdf?arnumber=11014840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:50:45Z","timestamp":1748667045000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11014840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/syscon64521.2025.11014840","relation":{},"subject":[],"published":{"date-parts":[[2025,4,7]]}}}