{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:01:41Z","timestamp":1778601701179,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,9]],"date-time":"2019-09-09T00:00:00Z","timestamp":1567987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,9]]},"DOI":"10.1145\/3344948.3344977","type":"proceedings-article","created":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T12:16:25Z","timestamp":1567685785000},"page":"235-240","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["A systems-of-systems security framework for requirements definition in cloud environment"],"prefix":"10.1145","author":[{"given":"Sara B. O. Gennari","family":"Carturan","sequence":"first","affiliation":[{"name":"Federal University of ABC, Santo Andr\u00e9, SP, Brazil"}]},{"given":"Denise Hideko","family":"Goya","sequence":"additional","affiliation":[{"name":"Federal University of ABC, Santo Andr\u00e9, SP, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2019,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ISO\/IEC 27000:2018 Information technology - Security techniques - Information security management systems - Overview and vocabulary  ISO\/IEC 27000:2018 Information technology - Security techniques - Information security management systems - Overview and vocabulary"},{"key":"e_1_3_2_1_2_1","unstructured":"ISO\/IEC 27001:2013 Information technology - Security techniques - Information security management systems - Requirements  ISO\/IEC 27001:2013 Information technology - Security techniques - Information security management systems - Requirements"},{"key":"e_1_3_2_1_3_1","volume":"201","author":"Correia M. P.","unstructured":"M. P. Correia and P. J. Sousa. 201 7. Secure Software. (2nd. ed.). ISBN-13: 9789727228584 M. P. Correia and P. J. Sousa. 2017. Secure Software. (2nd. ed.). ISBN-13: 9789727228584","journal-title":"J. Sousa."},{"key":"e_1_3_2_1_4_1","volume-title":"NIST Special Publication 800-160. Updated","author":"Multidisciplinary Systems Security","year":"2018","unstructured":"Systems Security Engineering - Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems . NIST Special Publication 800-160. Updated March 2018 . Systems Security Engineering - Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. NIST Special Publication 800-160. Updated March 2018."},{"key":"e_1_3_2_1_5_1","volume-title":"INCOSE Systems Engineering Handbook","year":"2015","unstructured":"INCOSE Systems Engineering Handbook , 4 th Edition, John Wiley & Sons Inc ., 2015 INCOSE Systems Engineering Handbook, 4th Edition, John Wiley & Sons Inc., 2015","edition":"4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2017.8104885"},{"key":"e_1_3_2_1_7_1","first-page":"590","volume-title":"PROFES","author":"Riungu-Kalliosaari L.","year":"2016","unstructured":"L. Riungu-Kalliosaari , L. E. Lwakatare and S. Makinen T. M\u00e4nnist\u00f6 . DevOps Adoption Benefits and Challenges in Practice: A Case Study. Product-Focused Software Process Improvement: 17th International Conference , PROFES 2016 , Trondheim, Norway, November 22--24, 2016, Proceedings ( pp. 590 -- 597 ). L. Riungu-Kalliosaari, L. E. Lwakatare and S. Makinen T. M\u00e4nnist\u00f6. DevOps Adoption Benefits and Challenges in Practice: A Case Study. Product-Focused Software Process Improvement: 17th International Conference, PROFES 2016, Trondheim, Norway, November 22--24, 2016, Proceedings (pp.590--597)."},{"key":"e_1_3_2_1_8_1","unstructured":"ISO\/IEC 27017:2015 Information technology - Security techniques - Code of practice for information security controls based on ISO\/IEC 27002 for cloud services  ISO\/IEC 27017:2015 Information technology - Security techniques - Code of practice for information security controls based on ISO\/IEC 27002 for cloud services"},{"key":"e_1_3_2_1_9_1","volume-title":"6th. ed.","author":"Project Management Institute (PMI) - PMBOK\u00ae Guide.","year":"2017","unstructured":"Project Management Institute (PMI) - PMBOK\u00ae Guide. A Guide to the Project Management Body of Knowledge , 6th. ed. , 2017 . Project Management Institute (PMI) - PMBOK\u00ae Guide. A Guide to the Project Management Body of Knowledge, 6th. ed., 2017."},{"key":"e_1_3_2_1_10_1","volume-title":"A Systems Approach to Planning, Scheduling and Controlling\", 12th. ed","author":"Kezner H.","year":"2017","unstructured":"H. Kezner , \" Project Management : A Systems Approach to Planning, Scheduling and Controlling\", 12th. ed ., Wiley , 2017 . H. Kezner, \"Project Management: A Systems Approach to Planning, Scheduling and Controlling\", 12th. ed., Wiley, 2017."},{"key":"e_1_3_2_1_11_1","volume-title":"The nature of human values","author":"Rokeach M.","year":"1973","unstructured":"M. Rokeach . The nature of human values . 1973 . New York, NY. The Free Press . M. Rokeach. The nature of human values. 1973. New York, NY. The Free Press."},{"key":"e_1_3_2_1_12_1","volume-title":"Understanding human values - Individual and Societal.2008.New York","author":"Rokeach M.","unstructured":"M. Rokeach . Understanding human values - Individual and Societal.2008.New York , NY. The Free Press . M. Rokeach. Understanding human values - Individual and Societal.2008.New York, NY. The Free Press."},{"key":"e_1_3_2_1_13_1","volume-title":"Human resource management: Gaining a competitive advantage","author":"Noe R. A.","year":"2017","unstructured":"R. A. Noe , J. R. Hollenbeck , B. Gerhart and P. M. Wright . Human resource management: Gaining a competitive advantage . 2017 . R. A. Noe, J. R. Hollenbeck, B. Gerhart and P. M. Wright. Human resource management: Gaining a competitive advantage. 2017."},{"key":"e_1_3_2_1_14_1","volume-title":"3rd. ed.","author":"Boxall P.","year":"2011","unstructured":"P. Boxall and J. Purcell . Strategy and Human Resource Management . 3rd. ed. , 2011 . P. Boxall and J. Purcell. Strategy and Human Resource Management. 3rd. ed., 2011."},{"key":"e_1_3_2_1_15_1","volume-title":"Online Readings in Psychology and Culture","author":"Schwartz S. H.","year":"2012","unstructured":"S. H. Schwartz . An Overview of the Schwartz Theory of Basic Values . Online Readings in Psychology and Culture . 2012 . S. H. Schwartz. An Overview of the Schwartz Theory of Basic Values. Online Readings in Psychology and Culture. 2012."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Advances in Experimental Social Psychology","author":"Schwartz S. H.","unstructured":"S. H. Schwartz . Universals in the Content and Structure of Values: Theoretical Advances and Empirical Tests in 20 Countries , Advances in Experimental Social Psychology Vol. 25 , Elsevier , pp. 1 -- 65 S. H. Schwartz. Universals in the Content and Structure of Values: Theoretical Advances and Empirical Tests in 20 Countries, Advances in Experimental Social Psychology Vol. 25, Elsevier, pp. 1--65"}],"event":{"name":"ECSA: European Conference on Software Architecture","location":"Paris France","acronym":"ECSA"},"container-title":["Proceedings of the 13th European Conference on Software Architecture - Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344948.3344977","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3344948.3344977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:28Z","timestamp":1750204468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3344948.3344977"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,9]]},"references-count":16,"alternative-id":["10.1145\/3344948.3344977","10.1145\/3344948"],"URL":"https:\/\/doi.org\/10.1145\/3344948.3344977","relation":{},"subject":[],"published":{"date-parts":[[2019,9,9]]},"assertion":[{"value":"2019-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}