{"id":"https://openalex.org/W3196053839","doi":"https://doi.org/10.1109/tdsc.2021.3103109","title":"A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements","display_name":"A Systemic Approach for Natural Language Scenario Elicitation of Security Requirements","publication_year":2021,"publication_date":"2021-08-10","ids":{"openalex":"https://openalex.org/W3196053839","doi":"https://doi.org/10.1109/tdsc.2021.3103109","mag":"3196053839"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3103109","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007316441","display_name":"Hanan Hibshi","orcid":"https://orcid.org/0000-0003-0250-3616"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]},{"id":"https://openalex.org/I4210111472","display_name":"King Abdul Aziz University Hospital","ror":"https://ror.org/01vv03303","country_code":"SA","type":"healthcare","lineage":["https://openalex.org/I4210111472"]}],"countries":["SA","US"],"is_corresponding":false,"raw_author_name":"Hanan Hibshi","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA, USA","King Abdul-Aziz University, Jeddah, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"King Abdul-Aziz University, Jeddah, Saudi Arabia","institution_ids":["https://openalex.org/I4210111472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074694848","display_name":"Stephanie Tubbs Jones","orcid":"https://orcid.org/0000-0002-7361-2011"},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stephanie T. Jones","raw_affiliation_strings":["Northwestern University, Evanston, IL, USA"],"affiliations":[{"raw_affiliation_string":"Northwestern University, Evanston, IL, USA","institution_ids":["https://openalex.org/I111979921"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5006266551","display_name":"Travis D. Breaux","orcid":"https://orcid.org/0000-0001-7127-8155"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Travis D. Breaux","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh, PA, USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh, PA, USA","institution_ids":["https://openalex.org/I74973139"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.398,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.768257,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":83},"biblio":{"volume":"19","issue":"6","first_page":"3579","last_page":"3591"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/statement","display_name":"Statement (logic)","score":0.41709018}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.84024405},{"id":"https://openalex.org/C45384764","wikidata":"https://www.wikidata.org/wiki/Q838667","display_name":"Requirements elicitation","level":4,"score":0.6611326},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6377392},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.62219256},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.59689975},{"id":"https://openalex.org/C195324797","wikidata":"https://www.wikidata.org/wiki/Q33742","display_name":"Natural language","level":2,"score":0.59607404},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4977684},{"id":"https://openalex.org/C2777026412","wikidata":"https://www.wikidata.org/wiki/Q2684591","display_name":"Statement (logic)","level":2,"score":0.41709018},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.32440382},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.32139367},{"id":"https://openalex.org/C6604083","wikidata":"https://www.wikidata.org/wiki/Q376937","display_name":"Requirements engineering","level":3,"score":0.23235488},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2245627},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.12501916},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.1074788},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09065309},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2021.3103109","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.61,"id":"https://metadata.un.org/sdg/4","display_name":"Quality education"}],"grants":[{"funder":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council","award_id":null},{"funder":"https://openalex.org/F4320335353","funder_display_name":"National Science Foundation of Sri Lanka","award_id":"#2007298"},{"funder":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research","award_id":"#N00244-16-1-0006"},{"funder":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research","award_id":"#NOO244-17-0012"}],"datasets":[],"versions":[],"referenced_works_count":50,"referenced_works":["https://openalex.org/W1482707767","https://openalex.org/W1537001026","https://openalex.org/W155051492","https://openalex.org/W1572316785","https://openalex.org/W1605228128","https://openalex.org/W1662441884","https://openalex.org/W1893648522","https://openalex.org/W1954228917","https://openalex.org/W1969200709","https://openalex.org/W1982736558","https://openalex.org/W2010398643","https://openalex.org/W2037789405","https://openalex.org/W2064419470","https://openalex.org/W2075662644","https://openalex.org/W2087271627","https://openalex.org/W2091254174","https://openalex.org/W2094475537","https://openalex.org/W2095037572","https://openalex.org/W2096036274","https://openalex.org/W2096266868","https://openalex.org/W2099823198","https://openalex.org/W2106623896","https://openalex.org/W2107400344","https://openalex.org/W2109105084","https://openalex.org/W2110895835","https://openalex.org/W2113355018","https://openalex.org/W2115203384","https://openalex.org/W2117410295","https://openalex.org/W2118826152","https://openalex.org/W2119555207","https://openalex.org/W2129289644","https://openalex.org/W2131730994","https://openalex.org/W2132462705","https://openalex.org/W2133766618","https://openalex.org/W2142911102","https://openalex.org/W2146322906","https://openalex.org/W2151058103","https://openalex.org/W2165031063","https://openalex.org/W2296086440","https://openalex.org/W2343556275","https://openalex.org/W2344806047","https://openalex.org/W2545289138","https://openalex.org/W2545999784","https://openalex.org/W2765514333","https://openalex.org/W2790903144","https://openalex.org/W3014040211","https://openalex.org/W328118924","https://openalex.org/W4281564584","https://openalex.org/W4298052160","https://openalex.org/W55918722"],"related_works":["https://openalex.org/W4224234432","https://openalex.org/W2923538289","https://openalex.org/W2470643824","https://openalex.org/W2353819554","https://openalex.org/W2353179089","https://openalex.org/W2353125546","https://openalex.org/W2349635380","https://openalex.org/W190396239","https://openalex.org/W1516679419","https://openalex.org/W148774598"],"abstract_inverted_index":{"Security":[0],"analysts":[1],"rely":[2],"on":[3,12,50,135],"scenarios":[4,23,131],"to":[5,33,111],"assess":[6],"vulnerabilities,":[7],"project":[8],"attacks,":[9],"and":[10,31,35,100,160,179,198],"decide":[11],"security":[13,130,176,187],"requirements":[14,188],"that":[15,53,74,96,109,127],"mitigate":[16],"the":[17,98,104,161,173,180],"threat.":[18],"However,":[19],"eliciting":[20,70,87],"natural":[21,190],"language":[22,191],"from":[24,132],"stakeholders":[25],"can":[26],"be":[27],"an":[28,71],"ad-hoc":[29],"process":[30,57,64],"subject":[32],"ambiguity":[34],"incompleteness.":[36],"In":[37],"this":[38],"article,":[39],"we":[40,194],"examine":[41],"systematic":[42],"scenario":[43,61],"elicitation":[44],"by":[45,80,119],"introducing":[46],"a":[47,55,76,81,94,124,146],"method":[48,118,140],"based":[49],"user":[51,82,125],"stories":[52],"uses":[54],"simplified":[56],"model":[58],"of":[59,66,103,155,165,175,182],"iterative":[60],"refinement.":[62],"The":[63],"consists":[65],"three":[67],"steps:":[68],"1)":[69],"interaction":[72],"statement":[73],"describes":[75],"critical":[77],"action":[78],"performed":[79],"or":[83,89],"system":[84],"process;":[85],"2)":[86],"one":[88],"more":[90],"descriptive":[91],"statements":[92],"about":[93],"technology":[95,105],"enables":[97],"interaction;":[99],"3)":[101],"refinement":[102],"into":[106],"technical":[107],"variants":[108],"correspond":[110],"design":[112],"alternatives.":[113],"We":[114,170],"empirically":[115],"evaluated":[116],"our":[117,121,136,138],"implementing":[120],"prototype":[122],"in":[123,189],"study":[126],"collects":[128],"30":[129],"participants.":[133],"Based":[134],"analysis,":[137],"proposed":[139],"is":[141],"shown":[142],"effective.":[143],"Participants":[144],"had":[145],"100":[147],"percent":[148,154,164],"task":[149],"completion":[150],"rate":[151],"with":[152],"57":[153],"participants":[156,166],"achieving":[157,167],"complete":[158],"task-success,":[159],"remaining":[162],"43":[163],"partial":[168],"task-success.":[169],"also":[171],"show":[172],"effect":[174],"domain":[177],"knowledge,":[178],"benefit":[181],"using":[183],"structure":[184],"when":[185],"collecting":[186],"text.":[192],"Finally,":[193],"present":[195],"lessons":[196],"learned":[197],"future":[199],"research":[200],"directions.":[201]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3196053839","counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3}],"updated_date":"2024-12-30T10:18:41.330888","created_date":"2021-08-30"}