{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:49:31Z","timestamp":1759092571527,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,9,5]],"date-time":"2005-09-05T00:00:00Z","timestamp":1125878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,9,5]]},"DOI":"10.1145\/1081706.1081715","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"41-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Reasoning about confidentiality at requirements engineering time"],"prefix":"10.1145","author":[{"given":"Renaud","family":"De Landtsheer","sequence":"first","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Belgium"}]},{"given":"Axel","family":"van Lamsweerde","sequence":"additional","affiliation":[{"name":"Universit\u00e9 catholique de Louvain, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2005,9,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"58","article-title":"Bounded model checking","author":"Biere A.","year":"2003","unstructured":"A. Biere , A. Cimatti , E. M. Clarke , O. Strichman , and Y. Zhu , \" Bounded model checking \", Advances in Computers , 58 , 2003 .]] A. Biere, A.Cimatti, E. M. Clarke, O. Strichman, and Y. Zhu, \"Bounded model checking\", Advances in Computers, 58, 2003.]]","journal-title":"Advances in Computers"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/647766.736000"},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/www.cert.org\/stats\/cert_stats.html.]] http:\/\/www.cert.org\/stats\/cert_stats.html.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36532-X_23"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/645879.672066"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of the 2nd Int. Mozart\/Oz Conference","author":"Landtsheer R. De","year":"2004","unstructured":"R. De Landtsheer , \"Solving CSPs including universal quantifications \", Proc. of the 2nd Int. Mozart\/Oz Conference , 2004 .]] R. De Landtsheer, \"Solving CSPs including universal quantifications\", Proc. of the 2nd Int. Mozart\/Oz Conference, 2004.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302672"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622788.1622789"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5803.001.0001","volume-title":"Reasoning About Knowledge","author":"Fagin R.","year":"1995","unstructured":"R. Fagin , J. Y. Halpern , Y. Moses , and M. Y. Vardi . Reasoning About Knowledge . MIT Press , 1995 .]] R. Fagin, J. Y. Halpern, Y. Moses, and M. Y. Vardi. Reasoning About Knowledge. MIT Press, 1995.]]"},{"key":"e_1_3_2_1_10_1","first-page":"476","article-title":"Towards a Theory of Knowledge and Ignorance: Preliminary Report","volume":"459","author":"Halpern J.","year":"1985","unstructured":"J. Halpern and Y. Moses , \" Towards a Theory of Knowledge and Ignorance: Preliminary Report \", In Logics and Models of Concurrent Systems, Springer-Verlag , 1985 , 459 -- 476 .]] J. Halpern and Y. Moses, \"Towards a Theory of Knowledge and Ignorance: Preliminary Report\", In Logics and Models of Concurrent Systems, Springer-Verlag, 1985, 459--476.]]","journal-title":"Logics and Models of Concurrent Systems, Springer-Verlag"},{"key":"e_1_3_2_1_11_1","volume-title":"Complete axiomatizations for reasoning about knowledge and time","author":"Halpern","year":"1997","unstructured":"Halpern J., van der Meyden R., and Vardi. Complete axiomatizations for reasoning about knowledge and time . 1997 .]] Halpern J., van der Meyden R., and Vardi. Complete axiomatizations for reasoning about knowledge and time. 1997.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36298"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/355045.355063"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018410.1018808"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363528"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. IJCAI'01 Workshop on Modeling and Solving Problems with Constraints","author":"Junker U.","year":"2001","unstructured":"U. Junker , \"QUICKXPLAIN : Conflict Detection for Arbitrary Constraint Propagation Algorithms \", Proc. IJCAI'01 Workshop on Modeling and Solving Problems with Constraints , 2001 .]] U. Junker, \"QUICKXPLAIN: Conflict Detection for Arbitrary Constraint Propagation Algorithms\", Proc. IJCAI'01 Workshop on Modeling and Solving Problems with Constraints, 2001.]]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00197942"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc.ICSE'03 - 25th Intl. Conf. on Softw. engineering","author":"Kemmerer R.","year":"2003","unstructured":"R. Kemmerer , \"Cybersecurity\" , Proc.ICSE'03 - 25th Intl. Conf. on Softw. engineering , Portland , 2003 , 705--715.]] R. Kemmerer, \"Cybersecurity\", Proc.ICSE'03 - 25th Intl. Conf. on Softw. engineering, Portland, 2003, 705--715.]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.879820"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc.RE'01 - 5th IEEE International Symposium on Requirements Engineering","author":"van Lamsweerde A.","year":"2001","unstructured":"A. van Lamsweerde , \"Goal-oriented requirements engineering : A guided tour \". Proc.RE'01 - 5th IEEE International Symposium on Requirements Engineering , Toronto , August 2001 , 249--263.]] A. van Lamsweerde, \"Goal-oriented requirements engineering: A guided tour\". Proc.RE'01 - 5th IEEE International Symposium on Requirements Engineering, Toronto, August 2001, 249--263.]]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39800-4_2"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999421"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587070"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/942807.943910"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/646480.693776"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/128869"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. SPIN'98: 4th Intl. SPIN Workshop","author":"Pnueli A.","year":"1998","unstructured":"A. Pnueli , \" Verification by Finitary Abstraction\" , Proc. SPIN'98: 4th Intl. SPIN Workshop , Paris , Nov. 1998 .]] A. Pnueli, \"Verification by Finitary Abstraction\", Proc. SPIN'98: 4th Intl. SPIN Workshop, Paris, Nov. 1998.]]"},{"key":"e_1_3_2_1_28_1","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45945-6","volume-title":"Programming Constraint Services","author":"Schulte Ch.","year":"2002","unstructured":"Ch. Schulte . Programming Constraint Services . Lecture Notes in Artificial Intelligence Vol. 2302 ,. Springer-Verlag , Berlin , 2002 .]] Ch. Schulte. Programming Constraint Services. Lecture Notes in Artificial Intelligence Vol. 2302,. Springer-Verlag, Berlin, 2002.]]"},{"key":"e_1_3_2_1_29_1","volume-title":"Concepts, Techniques, and Models of Computer Programming","author":"Van Roy P.","year":"2004","unstructured":"P. Van Roy and S. Haridi , Concepts, Techniques, and Models of Computer Programming . MIT Press , March 2004 .]] P. Van Roy and S. Haridi, Concepts, Techniques, and Models of Computer Programming. MIT Press, March 2004.]]"},{"key":"e_1_3_2_1_30_1","volume-title":"Building Secure Software: How to Avoid Security Problems the Right Way","author":"Viega J.","year":"2001","unstructured":"J. Viega and G. McGraw . Building Secure Software: How to Avoid Security Problems the Right Way . Addison-Wesley , 2001 .]] J. Viega and G. McGraw. Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley, 2001.]]"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. NSF Workshop on Computer Security, Fault Tolerance, and Software Assurance: From Needs to Solution.","author":"Wing J.","year":"1998","unstructured":"J. Wing , \" A Symbiotic Relationship Between Formal Methods and Security\" , Proc. NSF Workshop on Computer Security, Fault Tolerance, and Software Assurance: From Needs to Solution. December 1998 .]] J. Wing, \"A Symbiotic Relationship Between Formal Methods and Security\", Proc. NSF Workshop on Computer Security, Fault Tolerance, and Software Assurance: From Needs to Solution. December 1998.]]"}],"event":{"name":"ESEC\/FSE05: Joint 10th European Software Engineering Conference 2005","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Lisbon Portugal","acronym":"ESEC\/FSE05"},"container-title":["Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1081706.1081715","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1081706.1081715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:33Z","timestamp":1750262913000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1081706.1081715"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,9,5]]},"references-count":31,"alternative-id":["10.1145\/1081706.1081715","10.1145\/1081706"],"URL":"https:\/\/doi.org\/10.1145\/1081706.1081715","relation":{},"subject":[],"published":{"date-parts":[[2005,9,5]]},"assertion":[{"value":"2005-09-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}