{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:49:04Z","timestamp":1725594544961},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642310683"},{"type":"electronic","value":"9783642310690"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31069-0_4","type":"book-chapter","created":{"date-parts":[[2012,7,3]],"date-time":"2012-07-03T06:01:27Z","timestamp":1341295287000},"page":"46-60","source":"Crossref","is-referenced-by-count":4,"title":["A Meta-model for Legal Compliance and Trustworthiness of Information Systems"],"prefix":"10.1007","author":[{"given":"Fatemeh","family":"Zarrabi","sequence":"first","affiliation":[]},{"given":"Michalis","family":"Pavlidis","sequence":"additional","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]},{"given":"Shareeful","family":"Islam","sequence":"additional","affiliation":[]},{"given":"David","family":"Preston","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Ryan, J.D.: Two Views on Security Software Liability: Let the legal System Decide. In: Mead, R.N., McGraw, G. (eds.) IEEE Security & Privacy, pp. 70\u201372. IEEE Computer Society Press (2003)","DOI":"10.1109\/MSECP.2003.1176999"},{"key":"4_CR2","unstructured":"Zarrabi, F., Mouratidis, H., Islam, S.: Extracting Security Requirements from Relevant\u00a0Laws and Regulations. In: Proceedings of the International Conference on Research Challenges in Information Science (2012)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Pavlidis, M., Mouratidis, H., Islam, K.P.: Dealing with Trust and Control: A Meta-Model for Trustworthy Information Systems Development. In: Proceedings of the International Conference on Research Challenges in Information Science (2012)","DOI":"10.1109\/RCIS.2012.6240441"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Hohfeld, W.N.: Fundamental Legal Conceptions as Applied in Judicial Reasoning. Yale Law Journal\u00a023(1) (1913)","DOI":"10.2307\/785533"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Islam, S., Mouratidis, H., J\u00fcrjens, J.: A Framework to Support Alignment of Secure Software Engineering with Legal Regulations. Journal of Software and Systems Modeling (SoSyM), Theme Section on Non-Functional System Properties in Domain-Specific Modeling Languages (NFPinDSML)\u00a010(3), 369\u2013394 (2011)","DOI":"10.1007\/s10270-010-0154-z"},{"key":"4_CR6","unstructured":"The Cambridge Encyclopaedia of Language. Cambridge University Press (1997) ISBN 0-521-55967-7"},{"key":"4_CR7","unstructured":"Yu, E.: Towards Modelling and Reasoning Support for Early-Requirements Engineering. In: Proceedings of the 3rd IEEE International Symposium on Requirements Engineering, pp. 226\u2013235 (1997)"},{"key":"4_CR8","doi-asserted-by":"crossref","first-page":"70","DOI":"10.4018\/978-1-59904-147-6.ch004","volume-title":"Integrating Security and Software Engineering: Advances and Future Visions","author":"E. Yu","year":"2007","unstructured":"Yu, E., Liu, L., Mylopoulos, J.: A Social Ontology for Integrating Security and Software Engineering. In: Mouratidis, H., Giorgini, P. (eds.) Integrating Security and Software Engineering: Advances and Future Visions, pp. 70\u2013105. Idea Group Publishing, London (2007)"},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1177\/0268580905055478","volume":"20","author":"G. Mollering","year":"2005","unstructured":"Mollering, G.: The Trust\/Control Duality: An Integrative Perspective on Positive Expectations of Others. International Sociology\u00a020(3), 283\u2013305 (2005)","journal-title":"International Sociology"},{"key":"4_CR10","unstructured":"Dropbox, \n \n http:\/\/www.dropbox.com"},{"key":"4_CR11","unstructured":"House of Representatives: Conference Report: Digital Millennium Copyright Act. Report 105-796 (October 1998)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Breaux, T.D., Ant\u00f3n, A.I.: Analyzing Regulator Rules for privacy and Security Requirements. IEEE Transactions on Software Engineering\u00a034(1) (January-February 2008)","DOI":"10.1109\/TSE.2007.70746"},{"key":"4_CR13","unstructured":"May, M.J., Gunter, C.A., Lee, I.: Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. In: Proc. of the 19th Computer Security Foundations Workshop (July 2006)"},{"key":"4_CR14","unstructured":"Darimont, R., Lemoine, M.: Goal-oriented Analysis of Regulations. Regulations Modeling and their Validation and Verification (2006)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Siena, A., Mylopoulos, J., Perini, A., Susi, A.: From Laws to Requirements. In: 1st International Workshop on Requirements Engineering and Law (2008)","DOI":"10.1109\/RELAW.2008.6"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Mead, N.R.: Identifying Security Requirements Using the Security Quality Requirements Engineering (SQUARE) Method. In: Integrating Security and Software Engineering, pp. 44\u201369. Idea Publishing Group (2006)","DOI":"10.4018\/978-1-59904-147-6.ch003"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.csi.2006.04.002","volume":"29","author":"D. Mellado","year":"2007","unstructured":"Mellado, D., Medina, E., Piattini, M.: A common criterion based security requirements engineering process for the development of secure information system. Computer Standards & Interfaces\u00a029, 244\u2013253 (2007)","journal-title":"Computer Standards & Interfaces"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Pourshahid, A., Tran, T.: Modelling Trust in E-Commerce: An Approach Based on User Requirement. In: Proceedings of the 9th International Conference on Electronic Commerce, USA, pp. 413\u2013422 (2007)","DOI":"10.1145\/1282100.1282179"},{"key":"4_CR19","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/3-540-45547-7_11","volume-title":"Trust in Cyber-societies","author":"E. Yu","year":"2001","unstructured":"Yu, E., Liu, L.: Modelling Trust for System Design Using the i* Strategic Actors Framework. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol.\u00a02246, pp. 175\u2013194. Springer, Heidelberg (2001)"},{"issue":"4","key":"4_CR20","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10207-006-0005-7","volume":"5","author":"P. Giorgini","year":"2004","unstructured":"Giorgini, P., Massaci, F., Mylopoulos, J., Zanone, N.: Requirements Engineering for Trust Management. International Journal of Information Security\u00a05(4), 257\u2013274 (2004)","journal-title":"International Journal of Information Security"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Bimrah, K.K.: A Framework for Modelling Trust during Information Systems Development. PhD Thesis, University of East London (2009)","DOI":"10.1007\/b137171_62"},{"issue":"2","key":"4_CR22","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H. Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure Tropos: A Security-Oriented Extension of the Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering\u00a017(2), 285\u2013309 (2007)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"}],"container-title":["Lecture Notes in Business Information Processing","Advanced Information Systems Engineering Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31069-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:27:39Z","timestamp":1558380459000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31069-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642310683","9783642310690"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31069-0_4","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}