{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:34:06Z","timestamp":1725579246110},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642198106"},{"type":"electronic","value":"9783642198113"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19811-3_17","type":"book-chapter","created":{"date-parts":[[2011,3,14]],"date-time":"2011-03-14T09:06:18Z","timestamp":1300093578000},"page":"232-246","source":"Crossref","is-referenced-by-count":10,"title":["Systematic Development of UMLsec Design Models Based on Security Requirements"],"prefix":"10.1007","author":[{"given":"Denis","family":"Hatebur","sequence":"first","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]},{"given":"Jan","family":"J\u00fcrjens","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Schmidt","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"<\u2009\u2009> 2004 - The Unified Modeling Language","author":"E. Cariou","year":"2004","unstructured":"Cariou, E., Marvie, R., Seinturier, L., Duchien, L.: OCL for the specification of model transformation contracts. In: Baar, T., Strohmeier, A., Moreira, A., Mellor, S.J. (eds.) UML 2004. LNCS, vol.\u00a03273, Springer, Heidelberg (2004)"},{"key":"17_CR2","unstructured":"C\u00f4t\u00e9, I., Hatebur, D., Heisel, M., Schmidt, H., Wentzlaff, I.: A systematic account of problem frames. In: Proceedings of the European Conference on Pattern Languages of Programs (EuroPLoP), pp. 749\u2013767. Universit\u00e4tsverlag Konstanz (2008)"},{"issue":"1","key":"17_CR3","first-page":"7","volume":"15","author":"B. Fabian","year":"2010","unstructured":"Fabian, B., G\u00fcrses, S., Heisel, M., Santen, T., Schmidt, H.: A comparison of security requirements engineering methods. Requirements Engineering \u2013 Special Issue on Security Requirements Engineering\u00a015(1), 7\u201340 (2010)","journal-title":"Requirements Engineering \u2013 Special Issue on Security Requirements Engineering"},{"issue":"2","key":"17_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"P. Giorgini","year":"2007","unstructured":"Giorgini, P., Mouratidis, H.: Secure tropos: A security-oriented extension of the tropos methodology. International Journal of Software Engineering and Knowledge Engineering\u00a017(2), 285\u2013309 (2007)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"},{"key":"17_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-642-15651-9_24","volume-title":"Computer Safety, Reliability, and Security","author":"D. Hatebur","year":"2010","unstructured":"Hatebur, D., Heisel, M.: A UML profile for requirements analysis of dependable software. In: Schoitsch, E. (ed.) SAFECOMP 2010. LNCS, vol.\u00a06351, pp. 317\u2013331. Springer, Heidelberg (2010)"},{"key":"17_CR6","first-page":"195","volume-title":"Proceedings of the International Conference on Availability, Reliability and Security (AReS)","author":"D. Hatebur","year":"2008","unstructured":"Hatebur, D., Heisel, M., Schmidt, H.: Analysis and component-based realization of security requirements. In: Proceedings of the International Conference on Availability, Reliability and Security (AReS), pp. 195\u2013203. IEEE Computer Society Press, Los Alamitos (2008)"},{"issue":"1","key":"17_CR7","first-page":"63","volume":"15","author":"S.H. Houmb","year":"2010","unstructured":"Houmb, S.H., Islam, S., Knauss, E., J\u00fcrjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: An integration of common criteria, heuristics, and UMLsec. Requirements Engineering \u2013 Special Issue on Security Requirements Engineering\u00a015(1), 63\u201393 (2010)","journal-title":"Requirements Engineering \u2013 Special Issue on Security Requirements Engineering"},{"volume-title":"Problem Frames. Analyzing and structuring software development problems","year":"2001","author":"M. Jackson","key":"17_CR8","unstructured":"Jackson, M.: Problem Frames. Analyzing and structuring software development problems. Addison-Wesley, Reading (2001)"},{"volume-title":"Secure Systems Development with UML","year":"2005","author":"J. J\u00fcrjens","key":"17_CR9","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)"},{"key":"17_CR10","first-page":"426","volume-title":"Proceedings of the International Conference on the Unified Modeling Language (UML)","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: Proceedings of the International Conference on the Unified Modeling Language (UML), London, UK, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"17_CR11","first-page":"144","volume-title":"Proceedings of the WSEAS International Conference on Software Engineering, Parallel and distributed Systems (SEPADS)","author":"T. Millan","year":"2009","unstructured":"Millan, T., Sabatier, L., Le Thi, T.-T., Bazex, P., Percebois, C.: An OCL extension for checking and transforming uml models. In: Proceedings of the WSEAS International Conference on Software Engineering, Parallel and distributed Systems (SEPADS), Stevens Point, Wisconsin, USA, pp. 144\u2013149. World Scientific and Engineering Academy and Society (WSEAS), Singapore (2009)"},{"issue":"8","key":"17_CR12","first-page":"813","volume":"25","author":"H. Mouratidis","year":"2010","unstructured":"Mouratidis, H., J\u00fcrjens, J.: From goal-driven security requirements engineering to secure design. International Journal of Intelligent Systems \u2013 Special issue on Goal-Driven Requirements Engineering\u00a025(8), 813\u2013840 (2010)","journal-title":"International Journal of Intelligent Systems \u2013 Special issue on Goal-Driven Requirements Engineering"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Schmidt, H.: A Pattern- and Component-Based Method to Develop Secure Software. Deutscher Wissenschafts-Verlag (DWV) Baden-Baden (April 2010)","DOI":"10.4018\/978-1-61520-837-1.ch003"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19811-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T06:32:57Z","timestamp":1558420377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19811-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642198106","9783642198113"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19811-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}