{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:50Z","timestamp":1750307690864,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1456362.1456366","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"9-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Enforcing a security pattern in stakeholder goal models"],"prefix":"10.1145","author":[{"given":"Yijun","family":"Yu","sequence":"first","affiliation":[{"name":"The Open University, Milton Keynes, United Kngdm"}]},{"given":"Haruhiko","family":"Kaiya","sequence":"additional","affiliation":[{"name":"Shinshu University, Nagano City, Japan"}]},{"given":"Hironori","family":"Washizaki","sequence":"additional","affiliation":[{"name":"Waseda University, Tokyo, Japan"}]},{"given":"Yingfei","family":"Xiong","sequence":"additional","affiliation":[{"name":"University of Tokyo, Tokyo, Japan"}]},{"given":"Zhenjiang","family":"Hu","sequence":"additional","affiliation":[{"name":"NII, Tokyo, Japan"}]},{"given":"Nobukazu","family":"Yoshioka","sequence":"additional","affiliation":[{"name":"NII, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Design patterns: elements of reusable object-oriented software","author":"Gamma E.","year":"1995","unstructured":"E. Gamma , R. Helm , R. Johnson , and J. Vlissides . Design patterns: elements of reusable object-oriented software . Addison-Wesley , 1995 . E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design patterns: elements of reusable object-oriented software. Addison-Wesley, 1995."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of Conference on Pattern Languages of Programs (PLoP)","author":"Fernandez E. B.","year":"2001","unstructured":"E. B. Fernandez and R. Pan . A pattern language for security models . In Proc. of Conference on Pattern Languages of Programs (PLoP) , 2001 . E. B. Fernandez and R. Pan. A pattern language for security models. In Proc. of Conference on Pattern Languages of Programs (PLoP), 2001."},{"key":"e_1_3_2_1_3_1","volume-title":"Software Engineering","author":"Sommerville I.","year":"2006","unstructured":"I. Sommerville . Software Engineering . Addison-Wesley , 2006 . I. Sommerville. Software Engineering. Addison-Wesley, 2006."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/942807.943910"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70754"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.43"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018443.1022098"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999421"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/942807.943895"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2005.01.003"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.19"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AGNT.0000018806.20944.ef"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.06.007"},{"key":"e_1_3_2_1_16_1","volume-title":"Pearson Education","author":"Budinsky F.","year":"2003","unstructured":"F. Budinsky , S.A. Brodsky , and E. Merks . Eclipse Modeling Framework . Pearson Education , 2003 . F. Budinsky, S.A. Brodsky, and E. Merks. Eclipse Modeling Framework. Pearson Education, 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646674.759473"},{"key":"e_1_3_2_1_19_1","first-page":"71","volume-title":"Security Design Based on Social Modeling","author":"Liu L.","year":"2006","unstructured":"L. Liu , E. Yu , and J. Mylopoulos . Security Design Based on Social Modeling . pages 71 -- 78 , 2006 . L. Liu, E. Yu, and J. Mylopoulos. Security Design Based on Social Modeling. pages 71--78, 2006."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018443.1022093"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.71"},{"key":"e_1_3_2_1_22_1","first-page":"513","volume-title":"Proc. of CAiSE","author":"Hugo","year":"2006","unstructured":"Hugo Estrada et al. An empirical evaluation of the i* framework in a model-based software generation environment . In Proc. of CAiSE , pages 513 -- 527 , 2006 . Hugo Estrada et al. An empirical evaluation of the i* framework in a model-based software generation environment. In Proc. of CAiSE, pages 513--527, 2006."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767138_4"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767138_5"},{"key":"e_1_3_2_1_25_1","volume-title":"Theoretical Model, and New Applications. LNCS","author":"Schumacher Markus","year":"2003","unstructured":"Markus Schumacher . Security Engineering with Patterns: Origins , Theoretical Model, and New Applications. LNCS , Vol. 2754 , Springer , 2003 . Markus Schumacher. Security Engineering with Patterns: Origins, Theoretical Model, and New Applications. LNCS, Vol.2754, Springer, 2003."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of International Joint Conference on Computer Science and Software Engineering (JCSSE2007)","author":"Kawin Supaporn Thongchai Rojkangsadan","year":"2007","unstructured":"Thongchai Rojkangsadan Kawin Supaporn , Nakornthip Prompoon . An Approach : Constructing the Grammar from Security Pattern . In Proc. of International Joint Conference on Computer Science and Software Engineering (JCSSE2007) , 2007 . Thongchai Rojkangsadan Kawin Supaporn, Nakornthip Prompoon. An Approach: Constructing the Grammar from Security Pattern. In Proc. of International Joint Conference on Computer Science and Software Engineering (JCSSE2007), 2007."},{"key":"e_1_3_2_1_27_1","volume-title":"Araujo and Michael Weiss. Linking Patterns and Non-Functional Requirements. In Proc. of PLoP","author":"Ivan","year":"2002","unstructured":"Ivan Araujo and Michael Weiss. Linking Patterns and Non-Functional Requirements. In Proc. of PLoP , 2002 . Ivan Araujo and Michael Weiss. Linking Patterns and Non-Functional Requirements. In Proc. of PLoP, 2002."},{"key":"e_1_3_2_1_28_1","volume-title":"Franch Gemma Grau. A Goal-Oriented Approach for the Generation and Evaluation of Alternative Architectures. In Proc. of European Conference on Software Architecture (ECSA)","author":"Xavier","year":"2007","unstructured":"Xavier Franch Gemma Grau. A Goal-Oriented Approach for the Generation and Evaluation of Alternative Architectures. In Proc. of European Conference on Software Architecture (ECSA) , 2007 . Xavier Franch Gemma Grau. A Goal-Oriented Approach for the Generation and Evaluation of Alternative Architectures. In Proc. of European Conference on Software Architecture (ECSA), 2007."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321657"}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 4th ACM workshop on Quality of protection"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456362.1456366","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456362.1456366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:53Z","timestamp":1750253393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456362.1456366"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":28,"alternative-id":["10.1145\/1456362.1456366","10.1145\/1456362"],"URL":"https:\/\/doi.org\/10.1145\/1456362.1456366","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}