{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T22:39:04Z","timestamp":1725835144948},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662486337"},{"type":"electronic","value":"9783662486344"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48634-4_9","type":"book-chapter","created":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T18:06:31Z","timestamp":1445796391000},"page":"126-134","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Kind of Safety Requirements Description Method of the Embedded Software Based on Ontology"],"prefix":"10.1007","author":[{"given":"Fengjie","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Xiaoyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huaxiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,26]]},"reference":[{"issue":"12","key":"9_CR1","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1109\/TC.1976.1674590","volume":"25","author":"BW Boehm","year":"1976","unstructured":"Boehm, B.W.: Software Engineering. IEEE Transactions on Computers 25(12), 1226\u20131241 (1976)","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"9_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.5381\/jot.2003.2.1.c6","volume":"2","author":"DG Firesmith","year":"2003","unstructured":"Firesmith, D.G.: Engineering safety requirements. J of Object Technology 2(1), 53\u201368 (2003)","journal-title":"J of Object Technology"},{"issue":"3","key":"9_CR3","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/BF03223958","volume":"4","author":"DIS Kemmann","year":"2009","unstructured":"Kemmann, D.I.S., Trapp, M., Kalmar, D.I.R.: Safety analysis for embedded software. Atzelektronik Worldwide 4(3), 10\u201315 (2009)","journal-title":"Atzelektronik Worldwide"},{"key":"9_CR4","volume-title":"Fundamentals of computer security technology","author":"EG Amoroso","year":"1994","unstructured":"Amoroso, E.G.: Fundamentals of computer security technology. Prentice-Hall, Upper Saddle River (1994)"},{"issue":"1","key":"9_CR5","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"CB Haley","year":"2007","unstructured":"Haley, C.B., Laney, R., Moffett, J.D., et al.: Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering 34(1), 133\u2013153 (2007)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9_CR6","unstructured":"Van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proceedings of the 26th Int\u2019l Conf Software Eng(ICSE 04). IEEE CS Press (2004)"},{"issue":"2","key":"9_CR7","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/7474.7528","volume":"18","author":"NG Leveson","year":"1986","unstructured":"Leveson, N.G.: Software safety: why, what, and how. Computing Surveys 18(2), 125\u2013163 (1986)","journal-title":"Computing Surveys"},{"key":"9_CR8","unstructured":"Jin, Y.: Research on Eliciting Security Requirement Methods. Computer Science (2011)"},{"issue":"9","key":"9_CR9","doi-asserted-by":"publisher","first-page":"3124","DOI":"10.3969\/j.issn.1000-7024.2013.09.026","volume":"34","author":"L Bo","year":"2013","unstructured":"Bo, L., Wei, L., Fei, W.: Modeling method of software security requirements based on UMLsec. Computer Engineering and Design 34(9), 3124\u20133129 (2013). doi:\n 10.3969\/j.issn.1000-7024.2013.09.026","journal-title":"Computer Engineering and Design"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Z., Motet, G.: Formalizing safety requirements using controlling automata. In: Second International Conference on Dependability. DEPEND, pp. 81\u201386 (2009)","DOI":"10.1109\/DEPEND.2009.18"},{"issue":"4","key":"9_CR11","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/s00766-013-0166-7","volume":"18","author":"C Kalloniatis","year":"2013","unstructured":"Kalloniatis, C., Mouratidis, H., Islam, S.: Evaluating cloud deployment scenarios based on safety and privacy requirements. Requirements Engineering 18(4), 299\u2013319 (2013)","journal-title":"Requirements Engineering"},{"issue":"2","key":"9_CR12","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"TR Gruber","year":"1993","unstructured":"Gruber, T.R.: A translation approach to portable ontology specifications. Knowledge Acquisition 5(2), 199\u2013220 (1993)","journal-title":"Knowledge Acquisition"},{"key":"9_CR13","unstructured":"Xiao-Yong, D., Man, L., Shan, W.: A Survey on Ontology Learning Research. Journal of Software (2006)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Kaiya, H., Saeki, M.: Using domain ontology as domain knowledge for requirements elicitation. In: Proceedings of 14th IEEE International Requirements Engineering Conference, Minnesota, USA, pp. 186\u2013195 (2006)","DOI":"10.1109\/RE.2006.72"},{"issue":"3","key":"9_CR15","first-page":"101","volume":"21","author":"W Hong-wei","year":"2003","unstructured":"Hong-wei, W., Jia-chun, W., Fu, J.: A study on Ontology Model Based on Description logic. Systems Engineering 21(3), 101\u2013106 (2003)","journal-title":"Systems Engineering"},{"key":"9_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-02463-4_19","volume-title":"Conceptual Modeling: Foundations and Applications","author":"L Chung","year":"2009","unstructured":"Chung, L., do Prado Leite, J.C.S.: On non-functional requirements in software engineering. In: Borgida, A.T., Chaudhri, V.K., Giorgini, P., Yu, E.S. (eds.) Conceptual Modeling: Foundations and Applications. LNCS, vol. 5600, pp. 363\u2013379. Springer, Heidelberg (2009)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Galvao Martins, L.E., De Oliveira, T.: A case study using a protocol to derive safety functional requirements from Fault Tree Analysis. In: 2014 IEEE 22nd International Requirements Engineering Conference (RE), pp. 412\u2013419. IEEE (2014)","DOI":"10.1109\/RE.2014.6912292"},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1177\/193229681000400207","volume":"4","author":"Y Zhang","year":"2010","unstructured":"Zhang, Y., Jones, P.L., Jetley, R.: A hazard analysis for a generic insulin infusion pump. J. Diabetes Sci. Technol. 4(2), 263\u2013283 (2010)","journal-title":"J. Diabetes Sci. Technol."},{"issue":"1","key":"9_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4239\/wjd.v4.i1.1","volume":"4","author":"S Yaturu","year":"2013","unstructured":"Yaturu, S.: Insulin therapies: Current and future trends at dawn. World Journal of Diabetes 4(1), 1\u20137 (2013)","journal-title":"World Journal of Diabetes"}],"container-title":["Communications in Computer and Information Science","Requirements Engineering in the Big Data Era"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48634-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T10:05:03Z","timestamp":1558519503000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-48634-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662486337","9783662486344"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48634-4_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"26 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}