{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:17Z","timestamp":1750307537295,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,28]],"date-time":"2008-03-28T00:00:00Z","timestamp":1206662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3,28]]},"DOI":"10.1145\/1593105.1593179","type":"proceedings-article","created":{"date-parts":[[2009,8,11]],"date-time":"2009-08-11T13:29:27Z","timestamp":1249997367000},"page":"278-281","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Tracking requirements and threats for secure software development"],"prefix":"10.1145","author":[{"given":"Brandon","family":"Malone","sequence":"first","affiliation":[{"name":"Tennessee Technological University, Cookeville, TN"}]},{"given":"Ambareen","family":"Siraj","sequence":"additional","affiliation":[{"name":"Tennessee Technological University, Cookeville, TN"}]}],"member":"320","published-online":{"date-parts":[[2008,3,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ambler S. W. \"Agile Models Distilled: Potential Artifacts for Agile Modeling\" Agile Modeling http:\/\/www.agilemodeling.com\/artifacts. Accessed 4\/15\/2007.  Ambler S. W. \"Agile Models Distilled: Potential Artifacts for Agile Modeling\" Agile Modeling http:\/\/www.agilemodeling.com\/artifacts. Accessed 4\/15\/2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/253228.253454"},{"key":"e_1_3_2_1_3_1","unstructured":"Kazman R. Klein M. Barbacci M. Longstaff T. Lipson H. and Carriere J. The Architecture Tradeoff Analysis Method. Int'l Conf. Engineering Complex Computer Systems (ICECCS98). Aug. 98.  Kazman R. Klein M. Barbacci M. Longstaff T. Lipson H. and Carriere J. The Architecture Tradeoff Analysis Method. Int'l Conf. Engineering Complex Computer Systems (ICECCS98). Aug. 98."},{"key":"e_1_3_2_1_4_1","volume-title":"Object-Oriented Software Engineering: Practical Software Development using UML and Java","author":"Lethbridge T. C.","year":"2005","unstructured":"Lethbridge , T. C. and Lagani &amp;#232;re, R. Object-Oriented Software Engineering: Practical Software Development using UML and Java , McGraw-Hill , 2005 , p. 138. Lethbridge, T. C. and Lagani&amp;#232;re, R. Object-Oriented Software Engineering: Practical Software Development using UML and Java, McGraw-Hill, 2005, p. 138."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/62.666831"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.199"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of ICEIS'05","author":"Pauli J.","year":"2005","unstructured":"Pauli , J. and Xu , D . Threat-Driven Architectural Design of Secure Information Systems . In Proc. of ICEIS'05 , Miami , May 2005 . Pauli, J. and Xu, D. Threat-Driven Architectural Design of Secure Information Systems. In Proc. of ICEIS'05, Miami, May 2005."},{"key":"e_1_3_2_1_8_1","first-page":"2001","article-title":"Capturing Security Requirements through Misuse Cases","author":"Sindre G.","year":"2001","unstructured":"Sindre , G. and Opdahl , A . \" Capturing Security Requirements through Misuse Cases \", Norsk Informatikkonferanse 2001 . 2001 . Sindre, G. and Opdahl, A. \"Capturing Security Requirements through Misuse Cases\", Norsk Informatikkonferanse 2001. 2001.","journal-title":"Norsk Informatikkonferanse"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1260984.1261246"},{"key":"e_1_3_2_1_10_1","volume-title":"Germany","author":"Zinnikus I.","year":"2006","unstructured":"Zinnikus , I. , Elves &amp;#230;ter, B., Fischer , K. , Vayssiere , J. , and Benguria , G . 2006. A Model Driven Approach to Agent-Based Service-Oriented Architectures. (Erfurt , Germany , September 2006 ). Zinnikus, I., Elves&amp;#230;ter, B., Fischer, K., Vayssiere, J., and Benguria, G. 2006. A Model Driven Approach to Agent-Based Service-Oriented Architectures. (Erfurt, Germany, September 2006)."}],"event":{"name":"ACM SE08: ACM Southeast Regional Conference","acronym":"ACM SE08","location":"Auburn Alabama"},"container-title":["Proceedings of the 46th Annual Southeast Regional Conference on XX"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1593105.1593179","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1593105.1593179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:19Z","timestamp":1750249399000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1593105.1593179"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3,28]]},"references-count":10,"alternative-id":["10.1145\/1593105.1593179","10.1145\/1593105"],"URL":"https:\/\/doi.org\/10.1145\/1593105.1593179","relation":{},"subject":[],"published":{"date-parts":[[2008,3,28]]},"assertion":[{"value":"2008-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}