{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:30:04Z","timestamp":1769632204349,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,26]],"date-time":"2012-10-26T00:00:00Z","timestamp":1351209600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,26]]},"DOI":"10.1145\/2393216.2393238","type":"proceedings-article","created":{"date-parts":[[2012,11,13]],"date-time":"2012-11-13T15:04:07Z","timestamp":1352819047000},"page":"126-131","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Elicitation of Security requirements for E-Health system by applying Model Oriented Security Requirements Engineering (MOSRE) Framework"],"prefix":"10.1145","author":[{"given":"P.","family":"Salini","sequence":"first","affiliation":[{"name":"Pondicherry Engineering College"}]},{"given":"S.","family":"Kanmani","sequence":"additional","affiliation":[{"name":"Pondicherry Engineering College"}]}],"member":"320","published-online":{"date-parts":[[2012,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0092-x"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0093-9"},{"key":"e_1_3_2_1_3_1","volume-title":"Madras Institute of Technology","author":"Salini P.","unstructured":"P. Salini , S. Kanmani ,\" A Model based Security Requirements Engineering Framework applied for Online Trading System\" IEEE International Conference on Recent Trends in Information Technology (ICRTIT 2011) , Madras Institute of Technology , Anna University , Chennai, India , ISBN: 978-1-4577-0590-8, Paper ID-177, PP. 1195--1202, June 3--5, 2011. P. Salini, S. Kanmani,\" A Model based Security Requirements Engineering Framework applied for Online Trading System\" IEEE International Conference on Recent Trends in Information Technology (ICRTIT 2011), Madras Institute of Technology, Anna University, Chennai, India, ISBN: 978-1-4577-0590-8, Paper ID-177, PP. 1195--1202, June 3--5, 2011."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY 2012","volume":"2","author":"Salini P.","year":"2012","unstructured":"P. Salini and S. Kanmani . \" Model Oriented Security Requirements Engineering (MOSRE) Framework for Web Applications \". In Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY 2012 ), India, July 13--15 , 2012 , Vol. 2 and in Advances in Intelligent and Soft Computing book Series, Vol.177, pp. 341--353. P. Salini and S. Kanmani. \"Model Oriented Security Requirements Engineering (MOSRE) Framework for Web Applications\". In Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY 2012), India, July 13--15, 2012, Vol.2 and in Advances in Intelligent and Soft Computing book Series, Vol.177, pp. 341--353."},{"key":"e_1_3_2_1_5_1","volume-title":"Journal of Object-Oriented Programming","author":"Use Cases Modeling","year":"1995","unstructured":"Jacobson. I, \" Modeling with Use Cases : Formalizing Use Case Modelling . Journal of Object-Oriented Programming , 1995 . Jacobson. I, \"Modeling with Use Cases: Formalizing Use Case Modelling. Journal of Object-Oriented Programming, 1995."},{"key":"e_1_3_2_1_6_1","volume-title":"Ray Escamilla and Anandha Murukan, \"Improving Web Application Security: Threats and Countermeasures","author":"Meier J. D.","year":"2003","unstructured":"J. D. Meier , Alex Mackman , Michael Dunner , Srinath Vasireddy , Ray Escamilla and Anandha Murukan, \"Improving Web Application Security: Threats and Countermeasures \", Microsoft Corporation , Published : June 2003 J. D. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan, \"Improving Web Application Security: Threats and Countermeasures\", Microsoft Corporation, Published: June 2003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70754"},{"key":"e_1_3_2_1_9_1","volume-title":"Software Engineering. Institute","author":"Mead R.","year":"2005","unstructured":"R. Mead , E. D. Houg , and T. R. Stehney , Security Quality Requirements Engineering (Square) Methodology, tech. Report CMU\/SEI-2005-TR-009 , Software Engineering. Institute . Carnegie Mellon Univ. , 2005 . R. Mead, E. D. Houg, and T. R. Stehney, Security Quality Requirements Engineering (Square) Methodology, tech. Report CMU\/SEI-2005-TR-009, Software Engineering. Institute. Carnegie Mellon Univ., 2005."},{"key":"e_1_3_2_1_10_1","volume-title":"IEEE conference","author":"Wang Hui","year":"2009","unstructured":"Hui Wang , Zongpu Jia , Zihao Shen ,\" Research in security requirements engineering process\", 1285--1288 , IEEE conference , 2009 Hui Wang, Zongpu Jia, Zihao Shen,\" Research in security requirements engineering process\", 1285--1288, IEEE conference, 2009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.103"},{"key":"e_1_3_2_1_12_1","unstructured":"Graham Dan. \"Introduction to the CLASP Process.\" Build Security In 2006. https:\/\/buildsecurityin.us-cert.gov\/daisy\/bsi\/articles\/best-practices\/requirements\/548.html.  Graham Dan. \"Introduction to the CLASP Process.\" Build Security In 2006. https:\/\/buildsecurityin.us-cert.gov\/daisy\/bsi\/articles\/best-practices\/requirements\/548.html."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0094-8"},{"issue":"1","key":"e_1_3_2_1_14_1","article-title":"A knowledge-based approach to security requirements for e-health applications","volume":"2","author":"Dritsas S.","year":"2006","unstructured":"S. Dritsas , L. Gymnopoulos , M. Karyda , T. Balopoulos , S. Kokolakis , C. Lambrinoudakis and S. Katsikas . \" A knowledge-based approach to security requirements for e-health applications \". The electronic Journal on Emerging Tools and Applications, In the Special Issue: \"Emerging Security Paradigms in the Knowledge Era\" , Volume 2 , issue 1 , 2006 . S. Dritsas, L. Gymnopoulos, M. Karyda, T. Balopoulos, S. Kokolakis, C. Lambrinoudakis and S. Katsikas. \"A knowledge-based approach to security requirements for e-health applications\". The electronic Journal on Emerging Tools and Applications, In the Special Issue: \"Emerging Security Paradigms in the Knowledge Era\", Volume 2, issue 1, 2006.","journal-title":"The electronic Journal on Emerging Tools and Applications, In the Special Issue: \"Emerging Security Paradigms in the Knowledge Era\""},{"key":"e_1_3_2_1_15_1","unstructured":"Shuo Lu Yuan Hong and Qian Liu and Lingyu Wang and Rachida Dssouli \"Implementing Web-based e-Health Portal Systems\". http:\/\/cimic.rutgers.edu\/~yhong\/pub\/eHealthPortal.pdf.  Shuo Lu Yuan Hong and Qian Liu and Lingyu Wang and Rachida Dssouli \"Implementing Web-based e-Health Portal Systems\". http:\/\/cimic.rutgers.edu\/~yhong\/pub\/eHealthPortal.pdf."}],"event":{"name":"CCSEIT '12: The Second International Conference on Computational Science, Engineering","location":"Coimbatore UNK India","acronym":"CCSEIT '12","sponsor":["Avinashilingam University Avinashilingam University"]},"container-title":["Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393238","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2393216.2393238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:46Z","timestamp":1750240486000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2393216.2393238"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,26]]},"references-count":15,"alternative-id":["10.1145\/2393216.2393238","10.1145\/2393216"],"URL":"https:\/\/doi.org\/10.1145\/2393216.2393238","relation":{},"subject":[],"published":{"date-parts":[[2012,10,26]]},"assertion":[{"value":"2012-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}