{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:27:39Z","timestamp":1761611259924,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,4]],"date-time":"2007-06-04T00:00:00Z","timestamp":1180915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,4]]},"DOI":"10.1145\/1276318.1276346","type":"proceedings-article","created":{"date-parts":[[2010,4,2]],"date-time":"2010-04-02T14:50:55Z","timestamp":1270219855000},"page":"149-153","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["How to capture, model, and verify the knowledge of legal, security, and privacy experts"],"prefix":"10.1145","author":[{"given":"Luca","family":"Compagna","sequence":"first","affiliation":[{"name":"SAP Research"}]},{"given":"Paul El","family":"Khoury","sequence":"additional","affiliation":[{"name":"SAP Research"}]},{"given":"Fabio","family":"Massacci","sequence":"additional","affiliation":[{"name":"University of Trento"}]},{"given":"Reshma","family":"Thomas","sequence":"additional","affiliation":[{"name":"University of Leuven"}]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[{"name":"University of Trento"}]}],"member":"320","published-online":{"date-parts":[[2007,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/41735.41757"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(03)00108-5"},{"key":"e_1_3_2_1_3_1","volume-title":"Final technical report: Security patterns for web application development. Technical report","author":"K.","year":"2002","unstructured":"K. D. M. and E. M. C. Final technical report: Security patterns for web application development. Technical report , 2002 . Available at http:\/\/www.scrypt.net\/ K. D. M. and E. M. C. Final technical report: Security patterns for web application development. Technical report, 2002. Available at http:\/\/www.scrypt.net\/"},{"key":"e_1_3_2_1_4_1","volume-title":"In Proc. of PLoP'01","author":"Fernandez E.","year":"2001","unstructured":"E. Fernandez and R. Pan . A Pattern Language for Security Models . In In Proc. of PLoP'01 , 2001 . E. Fernandez and R. Pan. A Pattern Language for Security Models. In In Proc. of PLoP'01, 2001."},{"key":"e_1_3_2_1_5_1","volume-title":"Design patterns: Elements of Reusable Object-Oriented Software","author":"Gamma E.","year":"1994","unstructured":"E. Gamma , R. Helm , R. Johnson , and J. Vlissides . Design patterns: Elements of Reusable Object-Oriented Software . Addison-Wesley , 1994 . E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994."},{"key":"e_1_3_2_1_6_1","first-page":"237","volume-title":"Security and Trust Requirements Engineering. In FOSAD 2004\/2005","author":"Giorgini P.","year":"2005","unstructured":"P. Giorgini , F. Massacci , and N. Zannone . Security and Trust Requirements Engineering. In FOSAD 2004\/2005 , LNCS 3655, pages 237 -- 272 . Springer-Verlag , 2005 . P. Giorgini, F. Massacci, and N. Zannone. Security and Trust Requirements Engineering. In FOSAD 2004\/2005, LNCS 3655, pages 237--272. Springer-Verlag, 2005."},{"key":"e_1_3_2_1_7_1","first-page":"2000","volume":"9001","author":"Quality Management Systems ISO.","year":"2000","unstructured":"ISO. Quality Management Systems : Requirements. ISO 9001 : 2000 , 2000 . ISO. Quality Management Systems: Requirements. ISO 9001:2000, 2000.","journal-title":"Requirements. ISO"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1755-2567.1972.tb00928.x"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of RHAS'03","author":"Konrad S.","year":"2003","unstructured":"S. Konrad , B. H. C. Cheng , L. A. Campbell , and R. Wassermann . Using security patterns to model and analyze security requirements . In Proc. of RHAS'03 . IEEE Press , 2003 . S. Konrad, B. H. C. Cheng, L. A. Campbell, and R. Wassermann. Using security patterns to model and analyze security requirements. In Proc. of RHAS'03. IEEE Press, 2003."},{"key":"e_1_3_2_1_10_1","first-page":"1269","volume-title":"Proc. of IJCAI'05","author":"Kowalski R. A.","year":"1985","unstructured":"R. A. Kowalski and M. J. Sergot . Computer Representation of the Law . In Proc. of IJCAI'05 , pages 1269 -- 1270 . Morgan Kaufmann , 1985 . R. A. Kowalski and M. J. Sergot. Computer Representation of the Law. In Proc. of IJCAI'05, pages 1269--1270. Morgan Kaufmann, 1985."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01211870"},{"key":"e_1_3_2_1_12_1","volume-title":"Handbook of Ontologies for Business Interaction","author":"Massacci F.","year":"2007","unstructured":"F. Massacci , J. Mylopoulos , and N. Zannone . An Ontology for Secure Socio-Technical Systems . In Handbook of Ontologies for Business Interaction . The IDEA Group , 2007 . F. Massacci, J. Mylopoulos, and N. Zannone. An Ontology for Secure Socio-Technical Systems. In Handbook of Ontologies for Business Interaction. The IDEA Group, 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11568322_15"},{"key":"e_1_3_2_1_14_1","volume-title":"Theoretical Models, and New Applications","author":"Schumacher M.","year":"2003","unstructured":"M. Schumacher . Security Engineering with Patterns: Origins , Theoretical Models, and New Applications . Springer-Verlag , 2003 . M. Schumacher. Security Engineering with Patterns: Origins, Theoretical Models, and New Applications. Springer-Verlag, 2003."},{"key":"e_1_3_2_1_15_1","volume-title":"Architectural Patterns for Enabling Application Security. In In Proc. of PLoP'97","author":"Yoder J.","year":"1997","unstructured":"J. Yoder and J. Barcalow . Architectural Patterns for Enabling Application Security. In In Proc. of PLoP'97 , 1997 . J. Yoder and J. Barcalow. Architectural Patterns for Enabling Application Security. In In Proc. of PLoP'97, 1997."}],"event":{"name":"ICAIL07: 11th International Conference on Artificial Intelligence and Law","sponsor":["International Association for Artificial Intelligence and Law","SIGAI ACM Special Interest Group on Artificial Intelligence"],"location":"Stanford California","acronym":"ICAIL07"},"container-title":["Proceedings of the 11th international conference on Artificial intelligence and law"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1276318.1276346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1276318.1276346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:26Z","timestamp":1750278146000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1276318.1276346"}},"subtitle":["a pattern-based approach"],"short-title":[],"issued":{"date-parts":[[2007,6,4]]},"references-count":15,"alternative-id":["10.1145\/1276318.1276346","10.1145\/1276318"],"URL":"https:\/\/doi.org\/10.1145\/1276318.1276346","relation":{},"subject":[],"published":{"date-parts":[[2007,6,4]]},"assertion":[{"value":"2007-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}