{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T17:44:15Z","timestamp":1773683055024,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1145\/1810295.1810444","type":"proceedings-article","created":{"date-parts":[[2010,6,8]],"date-time":"2010-06-08T12:37:34Z","timestamp":1276000654000},"page":"489-490","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Engineering safety- and security-related requirements for software-intensive systems"],"prefix":"10.1145","author":[{"given":"Donald G.","family":"Firesmith","sequence":"first","affiliation":[{"name":"Software Engineering Institute, Pittsburgh, Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2010,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Auerbach","author":"Firesmith Donald","year":"2011","unstructured":"Donald Firesmith , Engineering Safety- and Security-Related Requirements for Software-Intensive Systems , Auerbach , 2011 Donald Firesmith, Engineering Safety- and Security-Related Requirements for Software-Intensive Systems, Auerbach, 2011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2004.3.3.c3"},{"issue":"1","key":"e_1_3_2_1_3_1","article-title":"Specifying Reusable Security Requirements","volume":"3","author":"Firesmith Donald G.","unstructured":"Donald G. Firesmith , \" Specifying Reusable Security Requirements ,\" Journal of Object Technology , Vol. 3 , No. 1 , January -- February 2004, pp. 61--75 Donald G. Firesmith, \"Specifying Reusable Security Requirements,\" Journal of Object Technology, Vol. 3, No. 1, January -- February 2004, pp. 61--75","journal-title":"Journal of Object Technology"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Third International Workshop on Requirements for High Assurance Systems (RHAS'04)","author":"Firesmith Donald","year":"2004","unstructured":"Donald Firesmith , \" A Taxonomy of Safety-Related Requirements ,\" Proceedings of the Third International Workshop on Requirements for High Assurance Systems (RHAS'04) , Kyoto, Japan, 6- -10 September 2004 Donald Firesmith, \"A Taxonomy of Safety-Related Requirements,\" Proceedings of the Third International Workshop on Requirements for High Assurance Systems (RHAS'04), Kyoto, Japan, 6--10 September 2004"},{"key":"e_1_3_2_1_5_1","volume-title":"Technical Note CMU\/SEI-2003-TN-033","author":"Firesmith Donald","year":"2003","unstructured":"Donald Firesmith , Common Concepts Underlying Safety, Security, and Survivability Engineering , Technical Note CMU\/SEI-2003-TN-033 , Software Engineering Institute , Pittsburgh, Pennsylvania , December 2003 Donald Firesmith, Common Concepts Underlying Safety, Security, and Survivability Engineering, Technical Note CMU\/SEI-2003-TN-033, Software Engineering Institute, Pittsburgh, Pennsylvania, December 2003"},{"issue":"5","key":"e_1_3_2_1_6_1","article-title":"Using Quality Models to Engineer Quality Requirements","volume":"2","author":"Firesmith Donald G.","unstructured":"Donald G. Firesmith , \" Using Quality Models to Engineer Quality Requirements ,\" Journal of Object Technology , Vol. 2 , No. 5 , September -- October 2003, pp. 67--75 Donald G. Firesmith, \"Using Quality Models to Engineer Quality Requirements,\" Journal of Object Technology, Vol. 2, No. 5, September -- October 2003, pp. 67--75","journal-title":"Journal of Object Technology"},{"key":"e_1_3_2_1_7_1","first-page":"7","volume-title":"Proceedings of the Second International Workshop on Requirements for High Assurance Systems (RHAS'03)","author":"Firesmith Donald G.","year":"2003","unstructured":"Donald G. Firesmith , \" Analyzing and Specifying Reusable Security Requirements ,\" Proceedings of the Second International Workshop on Requirements for High Assurance Systems (RHAS'03) at the 11th International IEEE Conference on Requirements Engineering (RE'03), Monterey Bay, California, Software Engineering Institute, 8- -12 September 2003 , pp. 7 -- 11 Donald G. Firesmith, \"Analyzing and Specifying Reusable Security Requirements,\" Proceedings of the Second International Workshop on Requirements for High Assurance Systems (RHAS'03) at the 11th International IEEE Conference on Requirements Engineering (RE'03), Monterey Bay, California, Software Engineering Institute, 8--12 September 2003, pp. 7--11"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2003.2.3.c6"},{"issue":"1","key":"e_1_3_2_1_9_1","article-title":"Engineering Security Requirements","volume":"2","author":"Firesmith Donald G.","unstructured":"Donald G. Firesmith , \" Engineering Security Requirements ,\" Journal of Object Technology , Vol. 2 , No. 1 , January -- February 2003, pp. 53--68 Donald G. Firesmith, \"Engineering Security Requirements,\" Journal of Object Technology, Vol. 2, No. 1, January -- February 2003, pp. 53--68","journal-title":"Journal of Object Technology"}],"event":{"name":"ICSE '10: 32nd International Conference on Software Engineering","location":"Cape Town South Africa","acronym":"ICSE '10","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering - Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1810295.1810444","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1810295.1810444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:24Z","timestamp":1750246764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1810295.1810444"}},"subtitle":["tutorial summary"],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":9,"alternative-id":["10.1145\/1810295.1810444","10.1145\/1810295"],"URL":"https:\/\/doi.org\/10.1145\/1810295.1810444","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]},"assertion":[{"value":"2010-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}