{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T18:55:01Z","timestamp":1730314501349,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,11,9]]},"DOI":"10.1145\/1454247.1454266","type":"proceedings-article","created":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T12:59:40Z","timestamp":1226408380000},"page":"50-52","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["SRRS"],"prefix":"10.1145","author":[{"given":"Jose","family":"Romero-Mariona","sequence":"first","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Hadar","family":"Ziv","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Debra J.","family":"Richardson","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]}],"member":"320","published-online":{"date-parts":[[2008,11,9]]},"reference":[{"volume-title":"I.: Initial Industrial Experience of Misuse Cases in Trade-Off Analysis. Proceedings of IEEE Joint International Requirements Engineering Conference. 2002","author":"Alexander","key":"e_1_3_2_1_1_1","unstructured":"Alexander , I.: Initial Industrial Experience of Misuse Cases in Trade-Off Analysis. Proceedings of IEEE Joint International Requirements Engineering Conference. 2002 Alexander, I.: Initial Industrial Experience of Misuse Cases in Trade-Off Analysis. Proceedings of IEEE Joint International Requirements Engineering Conference. 2002"},{"volume-title":"D.: Toward Hybrid Requirements-based and Architecture-based Testing. Proceedings of the workshop on the Role Of Software Architecture for Testing and Analysis (ROSATEA). 2007","author":"Romero-Mariona J.","key":"e_1_3_2_1_2_1","unstructured":"Romero-Mariona , J. , Ziv , H. , Richardson , D.: Toward Hybrid Requirements-based and Architecture-based Testing. Proceedings of the workshop on the Role Of Software Architecture for Testing and Analysis (ROSATEA). 2007 Romero-Mariona, J., Ziv, H., Richardson, D.: Toward Hybrid Requirements-based and Architecture-based Testing. Proceedings of the workshop on the Role Of Software Architecture for Testing and Analysis (ROSATEA). 2007"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v35:9"},{"key":"e_1_3_2_1_4_1","unstructured":"ISO\/IEC.: Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 1: Introduction and General Model. ISO\/IEC. International Standard 15408-1. 1999 ISO\/IEC.: Information Technology - Security Techniques - Evaluation Criteria for IT Security - Part 1: Introduction and General Model. ISO\/IEC. International Standard 15408-1. 1999"},{"key":"e_1_3_2_1_5_1","volume-title":"Mylopoulos","author":"Soutchanski M.","year":"2006","unstructured":"Soutchanski , M. , Pham , H. , Mylopoulos , J. : Decision Making in Uncertain Real-World Domains Using DT-Golog. AAAI. 2006 Soutchanski, M., Pham, H., Mylopoulos, J.: Decision Making in Uncertain Real-World Domains Using DT-Golog. AAAI. 2006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(02)00012-1"},{"key":"e_1_3_2_1_7_1","volume-title":"et al.: Object-Oriented Software Engineering: A Use Case Driven Approach","author":"Jacobson I.","year":"1992","unstructured":"Jacobson , I. et al.: Object-Oriented Software Engineering: A Use Case Driven Approach . Addison-Wesley . 1992 Jacobson, I. et al.: Object-Oriented Software Engineering: A Use Case Driven Approach. Addison-Wesley. 1992"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.56"},{"volume-title":"Manson G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. Proceedings of the 15th Conference on Advance Information Systems (CAiSE). 2003","author":"Mouratidis H.","key":"e_1_3_2_1_9_1","unstructured":"Mouratidis , H. , Giorgini , P. , Manson G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. Proceedings of the 15th Conference on Advance Information Systems (CAiSE). 2003 Mouratidis, H., Giorgini, P., Manson G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. Proceedings of the 15th Conference on Advance Information Systems (CAiSE). 2003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11766155_17"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/976270.976285"},{"volume-title":"Proceedings of the International Conference on Requirements Engineering. 2003","author":"Liu L.","key":"e_1_3_2_1_12_1","unstructured":"Liu , L. , Yu , E. , Mylopoulos , J. : Security and Privacy Requirements Analysis within a Social Setting In . Proceedings of the International Conference on Requirements Engineering. 2003 Liu, L., Yu, E., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting In. Proceedings of the International Conference on Requirements Engineering. 2003"},{"key":"e_1_3_2_1_13_1","volume-title":"Engineering Principles for Information Technology Security (A Baseline for Achieving Security). Computer Security Division","author":"Stoneburner G.","year":"2001","unstructured":"Stoneburner , G. , Hayden , C. , & Feringa , A. : Engineering Principles for Information Technology Security (A Baseline for Achieving Security). Computer Security Division , Information Technology Laboratory National Institute of Standards and Technology . 2001 Stoneburner, G., Hayden, C., & Feringa, A.: Engineering Principles for Information Technology Security (A Baseline for Achieving Security). Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology. 2001"},{"key":"e_1_3_2_1_14_1","volume-title":"Stehney II","author":"Mead N.","year":"2005","unstructured":"Mead , N. , Hough , E. , Stehney II , T. : Security Quality Requirements (SQUARE) Methodology. (CMU\/SEI- 2005 -TR-009). Software Engineering Institute, Carnegie Mellon University . 2005 Mead, N., Hough, E., Stehney II, T.: Security Quality Requirements (SQUARE) Methodology. (CMU\/SEI-2005-TR-009). Software Engineering Institute, Carnegie Mellon University. 2005"},{"volume-title":"et. al.: Introduction to the OCTAVE Approach","author":"Alberts C.","key":"e_1_3_2_1_15_1","unstructured":"Alberts , C. et. al.: Introduction to the OCTAVE Approach . CERT Coordination Center . www.cert.org\/octave\/approach_intro.pdf Alberts, C. et. al.: Introduction to the OCTAVE Approach. CERT Coordination Center. www.cert.org\/octave\/approach_intro.pdf"},{"key":"e_1_3_2_1_16_1","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"Schneier B.","year":"2000","unstructured":"Schneier , B. : Secrets and Lies: Digital Security in a Networked World . John Wiley & amp; Sons. 2000 Schneier, B.: Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons. 2000"},{"volume-title":"J.: The Usage-Centric Security Requirements Engineering (USeR) Method. Information Assurance Workshop. 2006","author":"Hallberg N.","key":"e_1_3_2_1_17_1","unstructured":"Hallberg , N. , Hallberg , J.: The Usage-Centric Security Requirements Engineering (USeR) Method. Information Assurance Workshop. 2006 Hallberg, N., Hallberg, J.: The Usage-Centric Security Requirements Engineering (USeR) Method. Information Assurance Workshop. 2006"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083200.1083207"},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"A Technique for the Measurement of Attitudes","volume":"140","author":"Likert R.","year":"1932","unstructured":"Likert , R. : A Technique for the Measurement of Attitudes , Archives of Psychology 140 : pp. 1 -- 55 . 1932 Likert, R.: A Technique for the Measurement of Attitudes, Archives of Psychology 140: pp. 1--55. 1932","journal-title":"Archives of Psychology"}],"event":{"name":"SIGSOFT '08\/FSE-16: SIGSOFT 2008 -16th International Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Atlanta Georgia","acronym":"SIGSOFT '08\/FSE-16"},"container-title":["Proceedings of the 2008 international workshop on Recommendation systems for software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1454247.1454266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T17:42:55Z","timestamp":1672940575000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454247.1454266"}},"subtitle":["a recommendation system for security requirements"],"short-title":[],"issued":{"date-parts":[[2008,11,9]]},"references-count":19,"alternative-id":["10.1145\/1454247.1454266","10.1145\/1454247"],"URL":"https:\/\/doi.org\/10.1145\/1454247.1454266","relation":{},"subject":[],"published":{"date-parts":[[2008,11,9]]},"assertion":[{"value":"2008-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}