{"id":"https://openalex.org/W2552271940","doi":"https://doi.org/10.1109/icitcs.2016.7740336","title":"Framework for Engineering Complex Security Requirements Patterns","display_name":"Framework for Engineering Complex Security Requirements Patterns","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2552271940","doi":"https://doi.org/10.1109/icitcs.2016.7740336","mag":"2552271940"},"language":"en","primary_location":{"id":"doi:10.1109/icitcs.2016.7740336","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitcs.2016.7740336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113127651","display_name":"Ra\u00fal Mazo","orcid":null},"institutions":[{"id":"https://openalex.org/I51101395","display_name":"Universit\u00e9 Paris 1 Panth\u00e9on-Sorbonne","ror":"https://ror.org/002t25c44","country_code":"FR","type":"education","lineage":["https://openalex.org/I51101395"]},{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Raul Mazo","raw_affiliation_strings":["Panth\u00e9on Sorbonne University, Paris, France"],"affiliations":[{"raw_affiliation_string":"Panth\u00e9on Sorbonne University, Paris, France","institution_ids":["https://openalex.org/I51101395","https://openalex.org/I39804081"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036978326","display_name":"Christophe Feltus","orcid":"https://orcid.org/0000-0002-7182-8185"},"institutions":[{"id":"https://openalex.org/I4210112527","display_name":"Luxembourg Institute of Science and Technology","ror":"https://ror.org/01t178j62","country_code":"LU","type":"education","lineage":["https://openalex.org/I4210112527"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Christophe Feltus","raw_affiliation_strings":["Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg"],"affiliations":[{"raw_affiliation_string":"Luxembourg Institute of Science and Technology, Esch-sur-Alzette, Luxembourg","institution_ids":["https://openalex.org/I4210112527"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5113127651"],"corresponding_institution_ids":["https://openalex.org/I39804081","https://openalex.org/I51101395"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.16339859,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.76526939868927},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7385339140892029},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6327853202819824},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.6283203363418579},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.6259806156158447},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6073784828186035},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.6013921499252319},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5902292132377625},{"id":"https://openalex.org/keywords/security-convergence","display_name":"Security convergence","score":0.5802686214447021},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49276307225227356},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4196270704269409},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.32498329877853394},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.23153647780418396}],"concepts":[{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.76526939868927},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7385339140892029},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6327853202819824},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.6283203363418579},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.6259806156158447},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6073784828186035},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.6013921499252319},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5902292132377625},{"id":"https://openalex.org/C52420254","wikidata":"https://www.wikidata.org/wiki/Q7445028","display_name":"Security convergence","level":5,"score":0.5802686214447021},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49276307225227356},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4196270704269409},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.32498329877853394},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.23153647780418396},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icitcs.2016.7740336","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitcs.2016.7740336","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.unamur.be:openaire_cris_publications/52fe0db7-96e9-4b2f-935f-b3d7628a1403","is_oa":false,"landing_page_url":"https://researchportal.unamur.be/en/publications/52fe0db7-96e9-4b2f-935f-b3d7628a1403","pdf_url":null,"source":{"id":"https://openalex.org/S4406922457","display_name":"Repository of the University of Namur","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Mazo, R & Feltus, C 2016, Framework for Engineering Complex Security Requirements Patterns. in 2016 6th International Conference on IT Convergence and Security (ICITCS) : Proceedings. 2016 edn, vol. 6, IEEE.","raw_type":"contributionToPeriodical"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W51018611","https://openalex.org/W190164772","https://openalex.org/W395385492","https://openalex.org/W1514888816","https://openalex.org/W1535690258","https://openalex.org/W1557557006","https://openalex.org/W1887766054","https://openalex.org/W1975980841","https://openalex.org/W1987826190","https://openalex.org/W2066736649","https://openalex.org/W2091625233","https://openalex.org/W2095985840","https://openalex.org/W2100659764","https://openalex.org/W2136451344","https://openalex.org/W2136706421","https://openalex.org/W2153764140","https://openalex.org/W2170702179","https://openalex.org/W2172174853","https://openalex.org/W2201233573","https://openalex.org/W3151685851","https://openalex.org/W6607686743","https://openalex.org/W6631838537","https://openalex.org/W6646994366","https://openalex.org/W6687779449"],"related_works":["https://openalex.org/W4230385779","https://openalex.org/W1811024770","https://openalex.org/W2018644264","https://openalex.org/W3138658062","https://openalex.org/W2552271940","https://openalex.org/W2299494954","https://openalex.org/W2395987867","https://openalex.org/W658105165","https://openalex.org/W2542633692","https://openalex.org/W2467594283"],"abstract_inverted_index":{"Security":[0],"management":[1],"and":[2,112,126,151,209],"business":[3],"assets":[4],"protection":[5],"have":[6,31,61,110,113,138],"been":[7],"a":[8,167,176,205,217],"paramount":[9],"concern":[10],"for":[11,57,120,169,178,183,203,213],"many":[12],"years.":[13],"Due":[14],"to":[15,39,51,89],"the":[16,68,76,91,95,104,116,146,155,158,194,221],"flood":[17],"of":[18,70,97,106,118,123,131,148,157,175,196,216],"arising":[19],"innovative":[20],"technologies":[21],"such":[22],"as":[23],"cloud":[24],"computing":[25],"or":[26],"big":[27],"data,":[28],"security":[29,44,59,72,99,108,124,149,159,181,207],"approaches":[30,56],"constantly":[32],"evolved":[33],"toward":[34],"more":[35,42],"sophisticate":[36],"solutions,":[37],"aiming":[38],"tackle":[40],"always":[41],"complex":[43,184,206],"issues.":[45],"Nowadays,":[46],"integrated":[47],"frameworks":[48],"are":[49,142],"necessary":[50],"manage":[52],"this":[53,163,171,199],"complexity.":[54],"Pattern-based":[55],"reusing":[58],"solutions":[60,150],"proven":[62],"its":[63,210],"usefulness,":[64],"but":[65],"mostly":[66,143],"in":[67,115,134],"frame":[69],"simple":[71],"matters.":[73],"Acknowledging":[74],"this,":[75],"scientific":[77],"community":[78],"has":[79],"recently":[80],"considered":[81],"how":[82],"these":[83,129],"patterns":[84,109,125,182],"could":[85],"also":[86],"be":[87],"used":[88,202],"address":[90,154],"complexity":[92,156],"caused":[93],"by":[94,173],"association":[96],"multiple":[98],"criteria.":[100],"Approaches":[101],"based":[102],"on":[103,145],"combination":[105],"\"simple\"":[107],"emerged":[111],"resulted":[114],"elaboration":[117],"methods":[119],"designing":[121],"systems":[122,127,185],"managing":[128],"collections":[130],"patterns.":[132],"Nonetheless,":[133],"that":[135,140],"domain,":[136],"we":[137,165],"observed":[139],"researches":[141],"focused":[144],"definition":[147],"do":[152],"not":[153],"requirements":[160],"yet.":[161],"In":[162],"paper":[164],"present":[166],"proposal":[168],"addressing":[170],"issue":[172],"means":[174],"framework":[177,200],"engineering":[179],"reusable":[180],"called":[186],"COPERATE":[187],"(COmPlex":[188],"sEcurity":[189],"Requirements":[190],"pAtTErns).":[191],"To":[192],"show":[193],"feasibility":[195],"our":[197],"approach,":[198],"is":[201],"defining":[204],"requirement":[208],"corresponding":[211],"pattern":[212],"an":[214],"excerpt":[215],"case":[218],"taken":[219],"from":[220],"cloud-computing":[222],"domain.":[223]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
