{"id":"https://openalex.org/W2116175419","doi":"https://doi.org/10.1145/1456362.1456366","title":"Enforcing a security pattern in stakeholder goal models","display_name":"Enforcing a security pattern in stakeholder goal models","publication_year":2008,"publication_date":"2008-10-27","ids":{"openalex":"https://openalex.org/W2116175419","doi":"https://doi.org/10.1145/1456362.1456366","mag":"2116175419"},"language":"en","primary_location":{"id":"doi:10.1145/1456362.1456366","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1456362.1456366","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM workshop on Quality of protection","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002289161","display_name":"Yijun Yu","orcid":"https://orcid.org/0000-0002-7154-8570"},"institutions":[{"id":"https://openalex.org/I204136569","display_name":"The Open University","ror":"https://ror.org/05mzfcs16","country_code":"GB","type":"education","lineage":["https://openalex.org/I204136569"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Yijun Yu","raw_affiliation_strings":["The Open University, Milton Keynes, United Kngdm","The Open University, Milton Keynes, United Kngdm#TAB#"],"affiliations":[{"raw_affiliation_string":"The Open University, Milton Keynes, United Kngdm","institution_ids":["https://openalex.org/I204136569"]},{"raw_affiliation_string":"The Open University, Milton Keynes, United Kngdm#TAB#","institution_ids":["https://openalex.org/I204136569"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042986574","display_name":"Haruhiko Kaiya","orcid":"https://orcid.org/0000-0001-9816-8001"},"institutions":[{"id":"https://openalex.org/I137975476","display_name":"Shinshu University","ror":"https://ror.org/0244rem06","country_code":"JP","type":"education","lineage":["https://openalex.org/I137975476"]},{"id":"https://openalex.org/I4210162928","display_name":"\u014ctani University","ror":"https://ror.org/05b7rex33","country_code":"JP","type":"education","lineage":["https://openalex.org/I4210162928"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Haruhiko Kaiya","raw_affiliation_strings":["Shinshu University, Nagano City, Japan","Shinshu University, Nagano City, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Shinshu University, Nagano City, Japan","institution_ids":["https://openalex.org/I137975476","https://openalex.org/I4210162928"]},{"raw_affiliation_string":"Shinshu University, Nagano City, Japan#TAB#","institution_ids":["https://openalex.org/I137975476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033111691","display_name":"Hironori Washizaki","orcid":"https://orcid.org/0000-0002-1417-9879"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hironori Washizaki","raw_affiliation_strings":["Waseda University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Waseda University, Tokyo, Japan","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100712724","display_name":"Yingfei Xiong","orcid":"https://orcid.org/0000-0001-8991-747X"},"institutions":[{"id":"https://openalex.org/I74801974","display_name":"The University of Tokyo","ror":"https://ror.org/057zh3y96","country_code":"JP","type":"education","lineage":["https://openalex.org/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yingfei Xiong","raw_affiliation_strings":["University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"University of Tokyo, Tokyo, Japan","institution_ids":["https://openalex.org/I74801974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102717988","display_name":"Zhenjiang Hu","orcid":"https://orcid.org/0000-0002-9034-205X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhenjiang Hu","raw_affiliation_strings":["NII, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NII, Tokyo, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018128809","display_name":"Nobukazu Yoshioka","orcid":"https://orcid.org/0000-0002-1986-5675"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nobukazu Yoshioka","raw_affiliation_strings":["NII, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NII, Tokyo, Japan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5002289161"],"corresponding_institution_ids":["https://openalex.org/I204136569"],"apc_list":null,"apc_paid":null,"fwci":7.872,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.97065172,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"9","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7543097734451294},{"id":"https://openalex.org/keywords/goal-modeling","display_name":"Goal modeling","score":0.7472113966941833},{"id":"https://openalex.org/keywords/stakeholder","display_name":"Stakeholder","score":0.6547293663024902},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.4753679633140564},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.46561598777770996},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4166918694972992},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.39179128408432007},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3822907507419586},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.348175972700119},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3342706263065338},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2944227457046509},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.10117277503013611},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08648538589477539},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.07147881388664246}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7543097734451294},{"id":"https://openalex.org/C9586889","wikidata":"https://www.wikidata.org/wiki/Q5575167","display_name":"Goal modeling","level":4,"score":0.7472113966941833},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.6547293663024902},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.4753679633140564},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.46561598777770996},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4166918694972992},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.39179128408432007},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3822907507419586},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.348175972700119},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3342706263065338},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2944227457046509},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.10117277503013611},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08648538589477539},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.07147881388664246},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1456362.1456366","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1456362.1456366","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM workshop on Quality of protection","raw_type":"proceedings-article"},{"id":"pmh:oai:oro.open.ac.uk:33463","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401187","display_name":"Open Research Online (The Open University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204136569","host_organization_name":"The Open University","host_organization_lineage":["https://openalex.org/I204136569"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W146458024","https://openalex.org/W1495153211","https://openalex.org/W1524500851","https://openalex.org/W1525541389","https://openalex.org/W1539259953","https://openalex.org/W1552595334","https://openalex.org/W1649645444","https://openalex.org/W1692845443","https://openalex.org/W1817810154","https://openalex.org/W1853162542","https://openalex.org/W1874464064","https://openalex.org/W2073068676","https://openalex.org/W2076676096","https://openalex.org/W2097154968","https://openalex.org/W2101976855","https://openalex.org/W2110054482","https://openalex.org/W2110157102","https://openalex.org/W2127393411","https://openalex.org/W2129527513","https://openalex.org/W2130310983","https://openalex.org/W2130891285","https://openalex.org/W2131730994","https://openalex.org/W2146174615","https://openalex.org/W2154765153","https://openalex.org/W2159976480","https://openalex.org/W3161918289","https://openalex.org/W4285719527","https://openalex.org/W6605978214","https://openalex.org/W6676387807","https://openalex.org/W7043454694"],"related_works":["https://openalex.org/W2372156812","https://openalex.org/W2374393728","https://openalex.org/W2386545329","https://openalex.org/W2148952798","https://openalex.org/W2382286253","https://openalex.org/W2356011375","https://openalex.org/W1795360416","https://openalex.org/W2392979115","https://openalex.org/W819284483","https://openalex.org/W2370002471"],"abstract_inverted_index":{"Patterns":[0],"are":[1],"useful":[2],"knowledge":[3],"about":[4],"recurring":[5],"problems":[6],"and":[7,30,71,88],"solutions.":[8],"Detecting":[9],"a":[10,41,47,75],"security":[11,33,92],"problem":[12],"using":[13,68],"patterns":[14],"in":[15,35,52,59,81,94],"requirements":[16,54,78],"models":[17,79],"may":[18,50],"lead":[19],"to":[20,26,74],"its":[21],"early":[22,28],"solution.":[23],"In":[24],"order":[25],"facilitate":[27],"detection":[29,87],"resolution":[31,89],"of":[32,77,90],"problems,":[34],"this":[36],"paper,":[37],"we":[38],"formally":[39,65],"describe":[40],"role-based":[42],"access":[43],"control":[44],"(RBAC)":[45],"as":[46],"pattern":[48,67,93],"that":[49],"occur":[51],"stakeholder":[53,97],"models.":[55],"We":[56],"also":[57],"implemented":[58],"our":[60],"goal-oriented":[61,96],"modeling":[62],"tool":[63,84],"the":[64,83,86,91],"described":[66],"model-driven":[69],"queries":[70],"transformations.":[72],"Applied":[73],"number":[76],"published":[80],"literature,":[82],"automates":[85],"several":[95],"requirements.":[98]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
