{"id":"https://openalex.org/W2080885463","doi":"https://doi.org/10.1145/2721956.2721963","title":"Problem-oriented security patterns for requirements engineering","display_name":"Problem-oriented security patterns for requirements engineering","publication_year":2014,"publication_date":"2014-07-09","ids":{"openalex":"https://openalex.org/W2080885463","doi":"https://doi.org/10.1145/2721956.2721963","mag":"2080885463"},"language":"en","primary_location":{"id":"doi:10.1145/2721956.2721963","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2721956.2721963","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th European Conference on Pattern Languages of Programs","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014569696","display_name":"Azadeh Alebrahim","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Azadeh Alebrahim","raw_affiliation_strings":["The Ruhr Institute for Software Technology, Germany"],"affiliations":[{"raw_affiliation_string":"The Ruhr Institute for Software Technology, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064516321","display_name":"Maritta Heisel","orcid":"https://orcid.org/0000-0002-3275-2819"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Maritta Heisel","raw_affiliation_strings":["The Ruhr Institute for Software Technology, Germany"],"affiliations":[{"raw_affiliation_string":"The Ruhr Institute for Software Technology, Germany","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014569696"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.409,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.74698428,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7232224345207214},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.691222608089447},{"id":"https://openalex.org/keywords/requirements-engineering","display_name":"Requirements engineering","score":0.5989453196525574},{"id":"https://openalex.org/keywords/non-functional-requirement","display_name":"Non-functional requirement","score":0.5867427587509155},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.5772191286087036},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.541709303855896},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5184897184371948},{"id":"https://openalex.org/keywords/requirement","display_name":"Requirement","score":0.5102803707122803},{"id":"https://openalex.org/keywords/sherwood-applied-business-security-architecture","display_name":"Sherwood Applied Business Security Architecture","score":0.440575510263443},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.43950796127319336},{"id":"https://openalex.org/keywords/functional-requirement","display_name":"Functional requirement","score":0.430853009223938},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.42922982573509216},{"id":"https://openalex.org/keywords/requirements-elicitation","display_name":"Requirements elicitation","score":0.42375725507736206},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.39622604846954346},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3650500774383545},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.23653584718704224},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.22795066237449646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22140032052993774},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.22022321820259094},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2125721573829651},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.10596427321434021},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09920454025268555}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7232224345207214},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.691222608089447},{"id":"https://openalex.org/C6604083","wikidata":"https://www.wikidata.org/wiki/Q376937","display_name":"Requirements engineering","level":3,"score":0.5989453196525574},{"id":"https://openalex.org/C199747065","wikidata":"https://www.wikidata.org/wiki/Q3254666","display_name":"Non-functional requirement","level":5,"score":0.5867427587509155},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.5772191286087036},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.541709303855896},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5184897184371948},{"id":"https://openalex.org/C135475081","wikidata":"https://www.wikidata.org/wiki/Q774228","display_name":"Requirement","level":4,"score":0.5102803707122803},{"id":"https://openalex.org/C60172848","wikidata":"https://www.wikidata.org/wiki/Q7495506","display_name":"Sherwood Applied Business Security Architecture","level":5,"score":0.440575510263443},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.43950796127319336},{"id":"https://openalex.org/C62235348","wikidata":"https://www.wikidata.org/wiki/Q3264234","display_name":"Functional requirement","level":2,"score":0.430853009223938},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.42922982573509216},{"id":"https://openalex.org/C45384764","wikidata":"https://www.wikidata.org/wiki/Q838667","display_name":"Requirements elicitation","level":4,"score":0.42375725507736206},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.39622604846954346},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3650500774383545},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.23653584718704224},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.22795066237449646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22140032052993774},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.22022321820259094},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2125721573829651},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.10596427321434021},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09920454025268555},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2721956.2721963","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2721956.2721963","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th European Conference on Pattern Languages of Programs","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W180420618","https://openalex.org/W1514888816","https://openalex.org/W1523197392","https://openalex.org/W1551592336","https://openalex.org/W1563985110","https://openalex.org/W1578883965","https://openalex.org/W1587148475","https://openalex.org/W1649645444","https://openalex.org/W1964994340","https://openalex.org/W2035336560","https://openalex.org/W2056134008","https://openalex.org/W2069431083","https://openalex.org/W2105539612","https://openalex.org/W2109477976","https://openalex.org/W2111293241","https://openalex.org/W2112154700","https://openalex.org/W2128260027","https://openalex.org/W2129289644","https://openalex.org/W2174735376","https://openalex.org/W2220881896","https://openalex.org/W2398057897","https://openalex.org/W2491625839","https://openalex.org/W2524476898","https://openalex.org/W4242182825","https://openalex.org/W6979921960"],"related_works":["https://openalex.org/W25306326","https://openalex.org/W3092415673","https://openalex.org/W3153864189","https://openalex.org/W4200131578","https://openalex.org/W2961241715","https://openalex.org/W4224303169","https://openalex.org/W2178535488","https://openalex.org/W1550223151","https://openalex.org/W1918308797","https://openalex.org/W1627741891"],"abstract_inverted_index":{"Security":[0],"is":[1,55],"one":[2],"essential":[3],"quality":[4,17,49],"requirement":[5,96,134,168],"that":[6,44,157],"needs":[7],"to":[8,24,73,82,94,142],"be":[9,25,67],"addressed":[10],"during":[11],"the":[12,26,39,58,70,87,104,127,132,140,143,147,159,163,167],"software":[13,105],"development":[14,106],"process.":[15,107],"While":[16],"requirements":[18,50,71,88],"such":[19,31],"as":[20,32],"security":[21,33,64,84,99,114,118,138,144,164],"are":[22],"supposed":[23],"architectural":[27],"drivers,":[28],"architecture":[29,40],"solutions":[30],"patterns":[34,85],"represent":[35],"design":[36,42],"decisions":[37],"on":[38,166],"and":[41,77,146],"levels":[43],"in":[45,57,69,86,90,103],"turn":[46],"might":[47],"constrain":[48],"significantly.":[51],"Thus,":[52],"knowledge":[53],"which":[54,130],"gained":[56],"solution":[59,100,141,165],"space,":[60],"for":[61],"example":[62],"from":[63],"patterns,":[65],"should":[66],"reflected":[68],"engineering":[72,89],"obtain":[74],"sound":[75],"architectures":[76],"correct":[78],"requirements.":[79],"We":[80],"propose":[81,112],"reuse":[83],"a":[91,122,137,155],"systematic":[92],"manner":[93],"equip":[95],"models":[97],"with":[98,136],"approaches":[101],"early":[102],"To":[108],"this":[109],"end,":[110],"we":[111,153],"problem-oriented":[113,117],"patterns.":[115],"Each":[116],"pattern":[119,125],"consists":[120],"of":[121,149,161],"three-part":[123],"graphical":[124],"representing":[126],"functional":[128,133],"problem":[129],"describes":[131],"annotated":[135],"requirement,":[139,145],"composition":[148],"them.":[150],"In":[151],"addition,":[152],"provide":[154],"template":[156],"captures":[158],"affect":[160],"applying":[162],"models.":[169]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
