{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T09:01:39Z","timestamp":1725786099851},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/repa.2012.6359966","type":"proceedings-article","created":{"date-parts":[[2012,11,30]],"date-time":"2012-11-30T21:14:14Z","timestamp":1354310054000},"page":"17-22","source":"Crossref","is-referenced-by-count":4,"title":["Early security patterns: A collection of constraints to describe regulatory security requirements"],"prefix":"10.1109","author":[{"given":"Robin A.","family":"Gandhi","sequence":"first","affiliation":[]},{"given":"Mariam","family":"Rahmani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0093-9"},{"key":"11","article-title":"Using Common Criteria as Reusable Knowledge in Security Requirements Elicitation","author":"motoshi","year":"0","journal-title":"Modeling Security Workshop MODELS '08 2008"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.31"},{"journal-title":"DIACAP Instruction","year":"2007","key":"3"},{"journal-title":"Software Abstractions","year":"2006","author":"jackson","key":"2"},{"journal-title":"Common Criteria Part 1 Intro and General Model","year":"2009","key":"1"},{"key":"10","first-page":"60","article-title":"Formal Methods for Developing High Assurance Computer Systems: Working Group Report","author":"heimdahl","year":"1998","journal-title":"Proceedings 2nd IEEE Workshop on Industrial Strength Formal Specification Techniques WIFT-98"},{"journal-title":"Building Secure Software","year":"2002","author":"viega","key":"7"},{"journal-title":"Secure Systems Development with UML","year":"2004","author":"ju?rjens","key":"6"},{"key":"5","article-title":"Security threat modeling and analysis: A goal-oriented approach","author":"oladimeji","year":"0","journal-title":"ICSE 2006"},{"journal-title":"Information Assurance Implementation","year":"2003","key":"4"},{"journal-title":"Software Requirements and Specifications A Lexicon of Practice Principles and Prejudices","year":"1995","author":"jackson","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232746"}],"event":{"name":"2012 IEEE Second International Workshop on Requirements Patterns (RePa)","start":{"date-parts":[[2012,9,24]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2012,9,24]]}},"container-title":["2012 Second IEEE International Workshop on Requirements Patterns (RePa)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6338383\/6359964\/06359966.pdf?arnumber=6359966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:56:58Z","timestamp":1490115418000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6359966\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/repa.2012.6359966","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}