{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:13Z","timestamp":1750306573348,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,9]],"date-time":"2014-07-09T00:00:00Z","timestamp":1404864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,9]]},"DOI":"10.1145\/2721956.2721963","type":"proceedings-article","created":{"date-parts":[[2015,5,11]],"date-time":"2015-05-11T16:31:04Z","timestamp":1431361864000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Problem-oriented security patterns for requirements engineering"],"prefix":"10.1145","author":[{"given":"Azadeh","family":"Alebrahim","sequence":"first","affiliation":[{"name":"The Ruhr Institute for Software Technology, Germany"}]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[{"name":"The Ruhr Institute for Software Technology, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,7,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Alebrahim A. Choppy C. Fassbender S. and Heisel M. 2014. Optimizing functional and quality requirements according to stakeholders' goals. In System Quality and Software Architecture (SQSA). Elsevier 75--120.  Alebrahim A. Choppy C. Fassbender S. and Heisel M. 2014. Optimizing functional and quality requirements according to stakeholders' goals. In System Quality and Software Architecture (SQSA) . Elsevier 75--120.","DOI":"10.1016\/B978-0-12-417009-4.00004-1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2011.29"},{"volume-title":"Proceedings of the 5th European Conference on Software Architecture (ECSA), I. Crnkovic, V. Gruhn, and M. Book, Eds. LNCS 6903","author":"Alebrahim A.","key":"e_1_3_2_1_3_1","unstructured":"Alebrahim , A. , Hatebur , D. , and Heisel , M . 2011b. Towards systematic integration of quality requirements into software architecture . In Proceedings of the 5th European Conference on Software Architecture (ECSA), I. Crnkovic, V. Gruhn, and M. Book, Eds. LNCS 6903 . Springer Verlag, 17--25. Alebrahim, A., Hatebur, D., and Heisel, M. 2011b. Towards systematic integration of quality requirements into software architecture. In Proceedings of the 5th European Conference on Software Architecture (ECSA), I. Crnkovic, V. Gruhn, and M. Book, Eds. LNCS 6903. Springer Verlag, 17--25."},{"volume-title":"Proceedings of the 14th International Conference on Computational Science and Its Applications (ICCSA). LNCS 8583","author":"Alebrahim A.","key":"e_1_3_2_1_4_1","unstructured":"Alebrahim , A. , Heisel , M. , and Meis , R . 2014. A structured approach for eliciting, modeling, and using quality-related domain knowledge . In Proceedings of the 14th International Conference on Computational Science and Its Applications (ICCSA). LNCS 8583 . Springer, 370--386. Alebrahim, A., Heisel, M., and Meis, R. 2014. A structured approach for eliciting, modeling, and using quality-related domain knowledge. In Proceedings of the 14th International Conference on Computational Science and Its Applications (ICCSA). LNCS 8583. Springer, 370--386."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the CAiSE Forum. CEUR Workshop Proceedings Series","volume":"855","author":"Alebrahim A.","unstructured":"Alebrahim , A. , Tun , T. T. , Yu , Y. , Heisel , M. , and Nuseibeh , B . 2012. An aspect-oriented approach to relating security requirements and access control . In Proceedings of the CAiSE Forum. CEUR Workshop Proceedings Series , vol. 855 . CEUR-WS.org, 15--22. Alebrahim, A., Tun, T. T., Yu, Y., Heisel, M., and Nuseibeh, B. 2012. An aspect-oriented approach to relating security requirements and access control. In Proceedings of the CAiSE Forum. CEUR Workshop Proceedings Series, vol. 855. CEUR-WS.org, 15--22."},{"volume-title":"Proceedings of the 18th European Conference on Pattern Languages of Programs (EuroPLoP). ACM, --. Accepted for Publication.","author":"Beckers K.","key":"e_1_3_2_1_6_1","unstructured":"Beckers , K. , Fassbender , S. , and Heisel , M . 2013. A meta-model approach to the fundamentals for a pattern language for context elicitation . In Proceedings of the 18th European Conference on Pattern Languages of Programs (EuroPLoP). ACM, --. Accepted for Publication. Beckers, K., Fassbender, S., and Heisel, M. 2013. A meta-model approach to the fundamentals for a pattern language for context elicitation. In Proceedings of the 18th European Conference on Pattern Languages of Programs (EuroPLoP). ACM, --. Accepted for Publication."},{"volume-title":"IEE Proceedings -- Software, Special issue on Relating Software Requirements and Architecture 152","author":"Choppy C.","key":"e_1_3_2_1_7_1","unstructured":"Choppy , C. , Hatebur , D. , and Heisel , M . 2005. Architectural patterns for problem frames . IEE Proceedings -- Software, Special issue on Relating Software Requirements and Architecture 152 , 4, 198--208. Choppy, C., Hatebur, D., and Heisel, M. 2005. Architectural patterns for problem frames. IEE Proceedings -- Software, Special issue on Relating Software Requirements and Architecture 152, 4, 198--208."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Chung L. Nixon B. A. Yu E. and Mylopoulos J. 2000. Non-functional requirements in software engineering. Klewer Academic.  Chung L. Nixon B. A. Yu E. and Mylopoulos J. 2000. Non-functional requirements in software engineering . Klewer Academic.","DOI":"10.1007\/978-1-4615-5269-7"},{"volume-title":"Proceedings of the European Conference on Pattern Languages of Programs (EuroPLoP). Universit\u00e4tsverlag Konstanz, 749--767","author":"C\u00f4t\u00e9 I.","key":"e_1_3_2_1_9_1","unstructured":"C\u00f4t\u00e9 , I. , Hatebur , D. , Heisel , M. , Schmidt , H. , and Wentzlaff , I . 2008. A Systematic Account of Problem Frames . In Proceedings of the European Conference on Pattern Languages of Programs (EuroPLoP). Universit\u00e4tsverlag Konstanz, 749--767 . C\u00f4t\u00e9, I., Hatebur, D., Heisel, M., Schmidt, H., and Wentzlaff, I. 2008. A Systematic Account of Problem Frames. In Proceedings of the European Conference on Pattern Languages of Programs (EuroPLoP). Universit\u00e4tsverlag Konstanz, 749--767."},{"key":"e_1_3_2_1_10_1","volume-title":"Analysis Patterns: Reusable Object Models","author":"Fowler M.","year":"1996","unstructured":"Fowler , M. 1996 . Analysis Patterns: Reusable Object Models . Addison Wesley . Fowler, M. 1996. Analysis Patterns: Reusable Object Models. Addison Wesley."},{"key":"e_1_3_2_1_11_1","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"Gamma E.","year":"1995","unstructured":"Gamma , E. , Helm , R. , Johnson , R. , and Vlissides , J . 1995 . Design Patterns: Elements of Reusable Object-Oriented Software . Addison Wesley . Gamma, E., Helm, R., Johnson, R., and Vlissides, J. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley."},{"volume-title":"Proceedings of 12th International Conference on Formal Engineering Methods (ICFEM), J. S. Dong and H. Zhu, Eds. LNCS 6447","author":"Hatebur D.","key":"e_1_3_2_1_12_1","unstructured":"Hatebur , D. and Heisel , M . 2010a. Making Pattern- and Model-Based Software Development More Rigorous . In Proceedings of 12th International Conference on Formal Engineering Methods (ICFEM), J. S. Dong and H. Zhu, Eds. LNCS 6447 . Springer Verlag, 253--269. Hatebur, D. and Heisel, M. 2010a. Making Pattern- and Model-Based Software Development More Rigorous. In Proceedings of 12th International Conference on Formal Engineering Methods (ICFEM), J. S. Dong and H. Zhu, Eds. LNCS 6447. Springer Verlag, 253--269."},{"volume-title":"Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP), E. Schoitsch, Ed. LNCS 6351","author":"Hatebur D.","key":"e_1_3_2_1_13_1","unstructured":"Hatebur , D. and Heisel , M . 2010b. A UML profile for requirements analysis of dependable software . In Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP), E. Schoitsch, Ed. LNCS 6351 . Springer Verlag, 317--331. Hatebur, D. and Heisel, M. 2010b. A UML profile for requirements analysis of dependable software. In Proceedings of the International Conference on Computer Safety, Reliability and Security (SAFECOMP), E. Schoitsch, Ed. LNCS 6351. Springer Verlag, 317--331."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11766155_17"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.12"},{"volume-title":"Analyzing and structuring software development problems","author":"Jackson M.","key":"e_1_3_2_1_16_1","unstructured":"Jackson , M. 2001. Problem Frames . Analyzing and structuring software development problems . Addison-Wesley . Jackson, M. 2001. Problem Frames. Analyzing and structuring software development problems. Addison-Wesley."},{"key":"e_1_3_2_1_17_1","unstructured":"Kreutzmann H. Vollmer S. Tekampe N. and Abromeit A. 2011a. Protection profile for the gateway of a smart metering system. Tech. rep. BSI.  Kreutzmann H. Vollmer S. Tekampe N. and Abromeit A. 2011a. Protection profile for the gateway of a smart metering system. Tech. rep. BSI."},{"key":"e_1_3_2_1_18_1","unstructured":"Kreutzmann H. Vollmer S. Tekampe N. and Abromeit A. 2011b. Protection profile for the security module of a smart metering system. Tech. rep. BSI.  Kreutzmann H. Vollmer S. Tekampe N. and Abromeit A. 2011b. Protection profile for the security module of a smart metering system. Tech. rep. BSI."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02463-4_20"},{"key":"e_1_3_2_1_20_1","volume-title":"Requirements Engineering: From System Goals to UML Models to Software Specifications","author":"Lamsweerde A.","year":"2009","unstructured":"Lamsweerde , A. 2009 b. Requirements Engineering: From System Goals to UML Models to Software Specifications . Wiley . Lamsweerde, A. 2009b. Requirements Engineering: From System Goals to UML Models to Software Specifications. Wiley."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018443.1022100"},{"volume-title":"Proceedings of the 20th Conference on Pattern Languages of Programs (PLOP).","author":"Li Y.","key":"e_1_3_2_1_22_1","unstructured":"Li , Y. , Kobro Runde , R. , and St\u00f8len , K . 2013. A meta-model approach to the fundamentals for a pattern language for context elicitation . In Proceedings of the 20th Conference on Pattern Languages of Programs (PLOP). Li, Y., Kobro Runde, R., and St\u00f8len, K. 2013. A meta-model approach to the fundamentals for a pattern language for context elicitation. In Proceedings of the 20th Conference on Pattern Languages of Programs (PLOP)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.910904"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018443.1022096"},{"key":"e_1_3_2_1_25_1","unstructured":"Schumacher M. Fernandez-Buglioni E. Hybertson D. Buschmann F. and Sommerlad P. 2005. Security patterns: integrating security and systems engineering. John Wiley & Sons.   Schumacher M. Fernandez-Buglioni E. Hybertson D. Buschmann F. and Sommerlad P. 2005. Security patterns: integrating security and systems engineering . John Wiley & Sons."},{"key":"e_1_3_2_1_26_1","volume-title":"Software Aechitecture: Perspectives on an emerging discipline","author":"Shaw M.","year":"1996","unstructured":"Shaw , M. and Garlan , G . 1996 . Software Aechitecture: Perspectives on an emerging discipline . Prentice Hall . Shaw, M. and Garlan, G. 1996. Software Aechitecture: Perspectives on an emerging discipline. Prentice Hall."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.173"},{"key":"e_1_3_2_1_28_1","unstructured":"Yskout K. Heyman T. Scandariato R. and Joosen W. 2006. A system of security patterns. Report CW 469 K. U. Leuven Department of Computer Science.  Yskout K. Heyman T. Scandariato R. and Joosen W. 2006. A system of security patterns. Report CW 469 K. U. Leuven Department of Computer Science."}],"event":{"name":"EuroPLoP 2014: 19th European Conference on Pattern Languages of Programs","acronym":"EuroPLoP 2014","location":"Irsee Germany"},"container-title":["Proceedings of the 19th European Conference on Pattern Languages of Programs"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2721956.2721963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2721956.2721963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:28Z","timestamp":1750227208000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2721956.2721963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,9]]},"references-count":28,"alternative-id":["10.1145\/2721956.2721963","10.1145\/2721956"],"URL":"https:\/\/doi.org\/10.1145\/2721956.2721963","relation":{},"subject":[],"published":{"date-parts":[[2014,7,9]]},"assertion":[{"value":"2014-07-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}