{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:50:46Z","timestamp":1725519046069},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8]]},"DOI":"10.1109\/socialcom.2010.136","type":"proceedings-article","created":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T20:19:44Z","timestamp":1285964384000},"page":"920-925","source":"Crossref","is-referenced-by-count":0,"title":["Increasing Trustworthiness through Security Testing Support"],"prefix":"10.1109","author":[{"given":"Jose","family":"Romero-Mariona","sequence":"first","affiliation":[]},{"given":"Hadar","family":"Ziv","sequence":"additional","affiliation":[]},{"given":"Debra J.","family":"Richardson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1083200.1083207"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2006.1652074"},{"journal-title":"Requirements Based Testing Process Overview","year":"2003","author":"bender","key":"ref10"},{"journal-title":"Proc Int'l Workshop Test and Analysis of Component-Based Systems","year":"2004","author":"bertolino","key":"ref11"},{"key":"ref12","article-title":"Generating Simulation and Test Models from Scenarios","author":"whittle","year":"2005","journal-title":"Proc 3rd World Congr Softw Quality"},{"key":"ref13","article-title":"Introducing model-based testing techniques in industrial projects","author":"ulrich","year":"2007","journal-title":"Software Engineering (Workshops)"},{"key":"ref14","article-title":"A Survey of Using Model-Based Testing to Improve Quality Attributes in Distributed Systems","author":"saifan","year":"2008","journal-title":"International Joint Conferences on Computer Information System Sciences and Engineering"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2005.4.6.a4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/75308.75319"},{"key":"ref17","article-title":"Specification-Based Test Generation for Security-Critical Systems Using Mutations","author":"wimmel","year":"2002","journal-title":"ICFEM"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021634422504"},{"journal-title":"Security Requirements Engineering A Survey Technical Report UCI-ISR-08–2","year":"2008","author":"romero-mariona","key":"ref19"},{"journal-title":"Introduction to the OCTAVE Approach CERT Coordination Center","year":"0","author":"alberts","key":"ref28"},{"key":"ref4","article-title":"Processes to Produce Secure Software","author":"redwine","year":"2004","journal-title":"Towards More Secure Software National Cyber Security Summit"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.21236\/ADA443493","author":"mead","year":"2005","journal-title":"Security Quality Requirements Engineering (SQUARE) Methodology (CMU\/SEI-2005-TR-009)"},{"key":"ref3","article-title":"Trustworthy Computing","author":"mundie","year":"2002","journal-title":"A Microsoft White Paper"},{"journal-title":"Exploring Grand Challenges in Trustworthy Computing","year":"0","author":"spafford","key":"ref6"},{"journal-title":"Secrets and Lies Digital Security in a Networked World","year":"2000","author":"schneier","key":"ref29"},{"key":"ref5","article-title":"Information Ethics: Privacy and Intellectual Property","author":"freeman","year":"2002","journal-title":"Information Science Publishing"},{"article-title":"Microsoft Labels Trustworthy Computing a Success","year":"2009","author":"ashford","key":"ref8"},{"key":"ref7","article-title":"Trustworthy Computing","author":"carnahan","year":"0","journal-title":"NIST\/Information Technology Laboratory"},{"key":"ref2","article-title":"Gates: Security is top priority","author":"lemos","year":"2002","journal-title":"CNET News"},{"key":"ref9","article-title":"Security Requirements Engineering: A Road Map","author":"araujo","year":"2007","journal-title":"Security Feature"},{"journal-title":"Trust in Cyberspace","year":"1999","author":"schneider","key":"ref1"},{"key":"ref20","article-title":"Capturing Security Requirements through Misuse Cases","author":"sindre","year":"2001","journal-title":"Norsk Informatikkonferanse"},{"key":"ref22","article-title":"Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems","author":"mouratidis","year":"2003","journal-title":"Proceedings of the 15th Conference on Advance Information Systems (CAiSE)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.56"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/976270.976285"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/11766155_17"},{"journal-title":"Common Criteria Portal Common Criteria Version 3 1 Revision 2","year":"2007","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232746"}],"event":{"name":"2010 IEEE Second International Conference on Social Computing (SocialCom)","start":{"date-parts":[[2010,8,20]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2010,8,22]]}},"container-title":["2010 IEEE Second International Conference on Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5590331\/5590391\/05591421.pdf?arnumber=5591421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T05:22:43Z","timestamp":1559712163000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5591421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/socialcom.2010.136","relation":{},"subject":[],"published":{"date-parts":[[2010,8]]}}}