{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:37:25Z","timestamp":1729669045822,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/res4.2012.6347689","type":"proceedings-article","created":{"date-parts":[[2012,11,15]],"date-time":"2012-11-15T12:14:59Z","timestamp":1352981699000},"page":"10-13","source":"Crossref","is-referenced-by-count":2,"title":["System security requirements analysis with answer set programming"],"prefix":"10.1109","author":[{"given":"Gideon","family":"Bibu","sequence":"first","affiliation":[]},{"given":"Nobukazu","family":"Yoshioka","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Padget","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"iTrust Medical Care Requirements Specification","year":"2011","author":"williams","key":"13"},{"key":"11","first-page":"120","article-title":"Eliciting security requirements by misuse cases","author":"sindre","year":"2000","journal-title":"Tools"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.3.6.22-31"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2043174.2043195"},{"journal-title":"Security Requirements Analysis and Validation Using Misuse Case and Institutional Framework","year":"2012","author":"bibu","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511543357"},{"journal-title":"Secrets and Lies Digital Security in a Networked World","year":"2000","author":"schneier","key":"10"},{"key":"7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1082983.1083214","article-title":"Security quality requirements engineering (square) methodology","volume":"30","author":"mead","year":"2005","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-660-0.ch011"},{"journal-title":"Security Considerations in the System Development Life Cycle","year":"2008","author":"kissel","key":"5"},{"journal-title":"Specifying and Analysing Institutions in Multi-Agent Systems Using Aswer Set Programming","year":"2007","author":"cliffe","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11503-5_1"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.79"}],"event":{"name":"2012 IEEE Second Workshop on Requirements Engineering for Systems, Services and Systems-of-Systems (RES4)","start":{"date-parts":[[2012,9,25]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2012,9,25]]}},"container-title":["2012 Second IEEE International Workshop on Requirements Engineering for Systems, Services, and Systems-of-Systems (RESS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6336879\/6347685\/06347689.pdf?arnumber=6347689","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T22:43:57Z","timestamp":1497998637000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6347689\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/res4.2012.6347689","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}