{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:03Z","timestamp":1750307343722,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,22]],"date-time":"2011-05-22T00:00:00Z","timestamp":1306022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,22]]},"DOI":"10.1145\/1988630.1988635","type":"proceedings-article","created":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T13:04:30Z","timestamp":1306242270000},"page":"22-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A conceptual meta-model for secured information systems"],"prefix":"10.1145","author":[{"given":"Nadira","family":"Lammari","sequence":"first","affiliation":[{"name":"Laboratoire CEDRIC-CNAM, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jean-Sylvain","family":"Bucumi","sequence":"additional","affiliation":[{"name":"Laboratoire CEDRIC-CNAM, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jacky","family":"Akoka","sequence":"additional","affiliation":[{"name":"Laboratoire CEDRIC-CNAM, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Isabelle","family":"Comyn-Wattiau","sequence":"additional","affiliation":[{"name":"Laboratoire CEDRIC-CNAM, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2011,5,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125808.1125810"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2394101.2394136"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AGNT.0000018806.20944.ef"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceeding of 13th Int. Conf. Softw. Sys. Eng. Applic. (Paris, France, December 5-8, 2000). ICSEA'00","author":"Breton E.","year":"2000","unstructured":"Breton , E. , B\u00e9zivin , J. 2000 . An Overview of Industrial Process Meta-models . In Proceeding of 13th Int. Conf. Softw. Sys. Eng. Applic. (Paris, France, December 5-8, 2000). ICSEA'00 Breton, E., B\u00e9zivin, J. 2000. An Overview of Industrial Process Meta-models. In Proceeding of 13th Int. Conf. Softw. Sys. Eng. Applic. (Paris, France, December 5-8, 2000). ICSEA'00"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-007-0045-y"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.133"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.48"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956457"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/646046.676618"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.004"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69073-3_15"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.11.005"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceeding of the 9th Int. workshop on Requirements Engineering for Software Quality (Klagenfurt","author":"He Q.","year":"2003","unstructured":"He , Q. , Ant\u00f3n , A. I.. 2003 . A framework for Modeling Privacy Requirements in Role Engineering . In Proceeding of the 9th Int. workshop on Requirements Engineering for Software Quality (Klagenfurt , Velden, Austria, June 16 - 17). REFSQ'03, 115--124. He, Q., Ant\u00f3n, A. I.. 2003. A framework for Modeling Privacy Requirements in Role Engineering. In Proceeding of the 9th Int. workshop on Requirements Engineering for Software Quality (Klagenfurt, Velden, Austria, June 16 - 17). REFSQ'03, 115--124."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368186"},{"key":"e_1_3_2_1_16_1","first-page":"5","article-title":"A Synthesis of Evaluation Criteria for Software Specifications and Specification","volume":"12","author":"Khwaja A","year":"2002","unstructured":"Khwaja , A , Urban , J. 2002 . A Synthesis of Evaluation Criteria for Software Specifications and Specification Techniques. Int. J. Softw. Eng. and Know. Eng. , 12 , 5 (Aug., 2002), 581--599. DOI= http:\/\/dx.doi.org\/10.1142\/S0218194002001062 10.1142\/S0218194002001062 Khwaja, A, Urban, J. 2002. A Synthesis of Evaluation Criteria for Software Specifications and Specification Techniques. Int. J. Softw. Eng. and Know. Eng., 12, 5 (Aug., 2002), 581--599. DOI= http:\/\/dx.doi.org\/10.1142\/S0218194002001062","journal-title":"Techniques. Int. J. Softw. Eng. and Know. Eng."},{"key":"e_1_3_2_1_18_1","volume-title":"Requirements Engineering: From System Goals to UML Models to Software Specifications","author":"Lamsweerde A. V.","year":"2009","unstructured":"Lamsweerde , A. V. 2009 . Requirements Engineering: From System Goals to UML Models to Software Specifications . Wiley , ISBN 978-0-470-01270-3. Lamsweerde, A. V. 2009. Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley, ISBN 978-0-470-01270-3."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceeding of the ER'97 workshop on Behavioral Models and Design Transformations: Issues and Opportunities in Conceptual Modeling","author":"Lei Y.","year":"1997","unstructured":"Lei , Y. , Singh , M. P. 1997 . A Comparison of Workflow Meta-models . In Proceeding of the ER'97 workshop on Behavioral Models and Design Transformations: Issues and Opportunities in Conceptual Modeling ( Los Angeles, California, November 6 - 7 , 1997). Lei, Y., Singh, M. P. 1997. A Comparison of Workflow Meta-models. In Proceeding of the ER'97 workshop on Behavioral Models and Design Transformations: Issues and Opportunities in Conceptual Modeling (Los Angeles, California, November 6 - 7, 1997)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141633"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/942807.943910"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88873-4_11"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISA.2008.19"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2006.04.002"},{"key":"e_1_3_2_1_25_1","first-page":"241","article-title":"Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems","volume":"3","author":"Mouratidis H.","year":"2009","unstructured":"Mouratidis , H. 2009 . Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems . Int. J. Comp. Sci. Secur. , 3 , 3, 241 -- 271 . Mouratidis, H. 2009. Secure Tropos: An Agent Oriented Software Engineering Methodology for the Development of Health and Social Care Information Systems. Int. J. Comp. Sci. Secur., 3, 3, 241--271.","journal-title":"Int. J. Comp. Sci. Secur."},{"key":"e_1_3_2_1_26_1","unstructured":"OMG. 2009. Business Process Model and Notation Specification http:\/\/www.omg.org\/spec\/BPMN\/1.2.  OMG. 2009. Business Process Model and Notation Specification http:\/\/www.omg.org\/spec\/BPMN\/1.2."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceeding of the CAISE 2006 workshop on Business Process Modelling, Development, and Support (Luxemburg, June 5 - 9, 2006) BPMDS'06, CEUR-WS.org, 111--120","author":"Saidani O.","year":"2006","unstructured":"Saidani , O. , Nurcan , S. 2006 . A Role-Based Approach for Modelling Flexible Business Processes . In Proceeding of the CAISE 2006 workshop on Business Process Modelling, Development, and Support (Luxemburg, June 5 - 9, 2006) BPMDS'06, CEUR-WS.org, 111--120 . Saidani, O., Nurcan, S. 2006. A Role-Based Approach for Modelling Flexible Business Processes. In Proceeding of the CAISE 2006 workshop on Business Process Modelling, Development, and Support (Luxemburg, June 5 - 9, 2006) BPMDS'06, CEUR-WS.org, 111--120."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceeding of the 9th Int. workshop on Requirements Engineering: Foundation for Software Quality (Klagenfurt, Velden, Austria June 16 - 17,2003). REFSQ'03, 16--17","author":"Sindre G.","year":"2003","unstructured":"Sindre , G. , Firesmith , D. G. , Opdahl , A. L. 2003 . A Reuse-Based Approach to Determining Security Requirements . In Proceeding of the 9th Int. workshop on Requirements Engineering: Foundation for Software Quality (Klagenfurt, Velden, Austria June 16 - 17,2003). REFSQ'03, 16--17 . Sindre, G., Firesmith, D. G., Opdahl, A. L. 2003. A Reuse-Based Approach to Determining Security Requirements. In Proceeding of the 9th Int. workshop on Requirements Engineering: Foundation for Software Quality (Klagenfurt, Velden, Austria June 16 - 17,2003). REFSQ'03, 16--17."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"e_1_3_2_1_30_1","first-page":"401","article-title":"The Tropos Meta-model and its Use","volume":"29","author":"Susi A.","year":"2005","unstructured":"Susi , A. , Perini , A. , Mylopoulos , J. , Giorgini , F. 2005 . The Tropos Meta-model and its Use . Informatica , 29 , 4, 401 -- 408 . Susi, A., Perini, A., Mylopoulos, J., Giorgini, F. 2005. The Tropos Meta-model and its Use. Informatica, 29, 4, 401--408.","journal-title":"Informatica"},{"key":"e_1_3_2_1_31_1","first-page":"4","article-title":"Secure Information Systems Development - a survey and comparison","volume":"24","author":"Villarroel R.","year":"2005","unstructured":"Villarroel , R. , Fern\u00e1ndez-Medina , E. , Piattini , M. 2005 . Secure Information Systems Development - a survey and comparison . Comp. Secur. 24 , 4 (Jun. 2005) 308--321. DOI= http:\/\/dx.doi.org\/10.1016\/j.cose.2004.09.011 10.1016\/j.cose.2004.09.011 Villarroel, R., Fern\u00e1ndez-Medina, E., Piattini, M. 2005. Secure Information Systems Development - a survey and comparison. Comp. Secur. 24, 4 (Jun. 2005) 308--321. DOI= http:\/\/dx.doi.org\/10.1016\/j.cose.2004.09.011","journal-title":"Comp. Secur."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370811.1370817"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2006.36"},{"key":"e_1_3_2_1_34_1","article-title":"The Si* Modeling Framework","volume":"19","author":"Zannone N.","year":"2009","unstructured":"Zannone , N. 2009 . The Si* Modeling Framework : Metamodel and Applications. Int. J. Softw. Eng. and Know. Eng. , 19 , 5, (Aug., 2009), 727--746. DOI= http:\/\/dx.doi.org\/10.1142\/S02181940090043 10.1142\/S02181940090043 Zannone, N. 2009. The Si* Modeling Framework: Metamodel and Applications. Int. J. Softw. Eng. and Know. Eng., 19, 5, (Aug., 2009), 727--746. DOI= http:\/\/dx.doi.org\/10.1142\/S02181940090043","journal-title":"Metamodel and Applications. Int. J. Softw. Eng. and Know. Eng."}],"event":{"name":"ICSE11: International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Waikiki, Honolulu HI USA","acronym":"ICSE11"},"container-title":["Proceedings of the 7th International Workshop on Software Engineering for Secure Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1988630.1988635","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1988630.1988635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:25Z","timestamp":1750244785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1988630.1988635"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,22]]},"references-count":32,"alternative-id":["10.1145\/1988630.1988635","10.1145\/1988630"],"URL":"https:\/\/doi.org\/10.1145\/1988630.1988635","relation":{},"subject":[],"published":{"date-parts":[[2011,5,22]]},"assertion":[{"value":"2011-05-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}