iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/ARES.2011.113
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:43:08Z","timestamp":1730198588245,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/ares.2011.113","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T15:35:11Z","timestamp":1318952111000},"page":"710-715","source":"Crossref","is-referenced-by-count":11,"title":["Characterising and Analysing Security Requirements Modelling Initiatives"],"prefix":"10.1109","author":[{"given":"Peter","family":"Karpati","sequence":"first","affiliation":[]},{"given":"Guttorm","family":"Sindre","sequence":"additional","affiliation":[]},{"given":"Andreas L.","family":"Opdahl","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2010.01.006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194002001062"},{"key":"ref13","first-page":"xiii","article-title":"Analyzing the past to prepare for the future: writing a Literature Review","volume":"26","author":"webster","year":"2002","journal-title":"MI Quarterly"},{"key":"ref14","article-title":"How is Management Research Carried Out?","volume":"318","author":"bennet","year":"1991","journal-title":"The Management Research Handbook"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/237432.237434"},{"year":"0","key":"ref16"},{"key":"ref17","first-page":"179","article-title":"A Dynamic Framework for Classifying Information Systems Development Methodologies and Approaches","volume":"17","author":"juhani","year":"2001","journal-title":"Journal of Management Information Systems"},{"key":"ref18","first-page":"665","volume":"42","author":"paige","year":"2000","journal-title":"Principles for Modeling Language Design Information & Software Technology – INFSOF"},{"journal-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists","article-title":"A Framework for Classifying and Comparing Graphical Object Oriented Modeling Languages","year":"2008","author":"kamandi","key":"ref19"},{"journal-title":"Recent Research in Secure Software unpublished report","year":"2006","author":"yee","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.09.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2009.14"},{"key":"ref5","first-page":"985","article-title":"Security Requirements Engineering; State of the Art and Research Challenges","author":"hadavi","year":"2008","journal-title":"Proceedings of the International MultiConference of Engineers and Computer Scientists"},{"journal-title":"Technical Report 2009–562 School of Computing Queen's University Canada","article-title":"A Survey on Requirements and Design Methods for Secure Software Development","year":"2009","author":"khan","key":"ref8"},{"key":"ref7","first-page":"570","article-title":"A Reclassification of IS Security Analysis Approaches","author":"ali","year":"0","journal-title":"(2009) AMCIS 2009 Proceedings"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0092-x"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.19"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/jsse.2010102004"}],"event":{"name":"2011 Sixth International Conference on Availability, Reliability and Security (ARES)","start":{"date-parts":[[2011,8,22]]},"location":"Vienna, Austria","end":{"date-parts":[[2011,8,26]]}},"container-title":["2011 Sixth International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6045375\/6045921\/06046025.pdf?arnumber=6046025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T08:19:01Z","timestamp":1490084341000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6046025\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":19,"URL":"http:\/\/dx.doi.org\/10.1109\/ares.2011.113","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}