{"id":"https://openalex.org/W2188298146","doi":"https://doi.org/10.3217/jucs-019-13-1940","title":"A Tool-based Semantic Framework for Security Requirements Specification","display_name":"A Tool-based Semantic Framework for Security Requirements Specification","publication_year":2020,"publication_date":"2020-04-07","ids":{"openalex":"https://openalex.org/W2188298146","doi":"https://doi.org/10.3217/jucs-019-13-1940","mag":"2188298146"},"language":"en","primary_location":{"id":"pmh:oai:eprints.covenantuniversity.edu.ng:6411","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400995","display_name":"Covenant University Repository (Covenant University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186771145","host_organization_name":"Covenant University","host_organization_lineage":["https://openalex.org/I186771145"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/11250/2469673","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039061863","display_name":"Guttorm Sindre","orcid":"https://orcid.org/0000-0001-5739-8265"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Guttorm Sindre","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044914031","display_name":"Olawande Daramola","orcid":"https://orcid.org/0000-0001-6340-078X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Olawande Daramola","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5037332714","display_name":"Thomas Moser","orcid":"https://orcid.org/0000-0002-9220-649X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thomas Moser","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5039061863"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.00091042,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8514280915260315},{"id":"https://openalex.org/keywords/system-requirements-specification","display_name":"System requirements specification","score":0.5675528049468994},{"id":"https://openalex.org/keywords/software-requirements-specification","display_name":"Software requirements specification","score":0.5357975363731384},{"id":"https://openalex.org/keywords/requirements-analysis","display_name":"Requirements analysis","score":0.5341068506240845},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.529975414276123},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.471280038356781},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.435587078332901},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.38492774963378906},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2984248995780945},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.2502378225326538},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1923135221004486},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.1628519594669342},{"id":"https://openalex.org/keywords/software-design","display_name":"Software design","score":0.11072281002998352},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06872642040252686},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.06619712710380554}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8514280915260315},{"id":"https://openalex.org/C84651959","wikidata":"https://www.wikidata.org/wiki/Q17052506","display_name":"System requirements specification","level":2,"score":0.5675528049468994},{"id":"https://openalex.org/C102780508","wikidata":"https://www.wikidata.org/wiki/Q1761598","display_name":"Software requirements specification","level":5,"score":0.5357975363731384},{"id":"https://openalex.org/C59488412","wikidata":"https://www.wikidata.org/wiki/Q187147","display_name":"Requirements analysis","level":3,"score":0.5341068506240845},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.529975414276123},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.471280038356781},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.435587078332901},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.38492774963378906},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2984248995780945},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2502378225326538},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1923135221004486},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.1628519594669342},{"id":"https://openalex.org/C52913732","wikidata":"https://www.wikidata.org/wiki/Q857102","display_name":"Software design","level":4,"score":0.11072281002998352},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06872642040252686},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.06619712710380554},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"pmh:oai:eprints.covenantuniversity.edu.ng:6411","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400995","display_name":"Covenant University Repository (Covenant University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I186771145","host_organization_name":"Covenant University","host_organization_lineage":["https://openalex.org/I186771145"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:brage.bibsys.no:11250/2469673","is_oa":true,"landing_page_url":"http://hdl.handle.net/11250/2469673","pdf_url":"http://hdl.handle.net/11250/2469673","source":{"id":"https://openalex.org/S4306400255","display_name":"BIBSYS Brage (BIBSYS (Norway))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I173212132","host_organization_name":"Vilnius University","host_organization_lineage":["https://openalex.org/I173212132"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"1940-1962","raw_type":"Journal article"},{"id":"pmh:oai:zenodo.org:5505941","is_oa":true,"landing_page_url":"https://zenodo.org/record/5505941","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"JUCS - Journal of Universal Computer Science 19((13)) 1940-1962","raw_type":"info:eu-repo/semantics/article"},{"id":"doi:10.3217/jucs-019-13-1940","is_oa":true,"landing_page_url":"https://doi.org/10.3217/jucs-019-13-1940","pdf_url":null,"source":{"id":"https://openalex.org/S4306400660","display_name":"TUGraz OPEN Library (Graz University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4092182","host_organization_name":"Graz University of Technology","host_organization_lineage":["https://openalex.org/I4092182"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:brage.bibsys.no:11250/2469673","is_oa":true,"landing_page_url":"http://hdl.handle.net/11250/2469673","pdf_url":"http://hdl.handle.net/11250/2469673","source":{"id":"https://openalex.org/S4306400255","display_name":"BIBSYS Brage (BIBSYS (Norway))","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I173212132","host_organization_name":"Vilnius University","host_organization_lineage":["https://openalex.org/I173212132"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"1940-1962","raw_type":"Journal article"},"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3748656914","display_name":null,"funder_award_id":"Norway","funder_id":"https://openalex.org/F4320323299","funder_display_name":"Norges Forskningsr\u00e5d"}],"funders":[{"id":"https://openalex.org/F4320315059","display_name":"Austrian Federal Ministry of Economy, Family and Youth","ror":"https://ror.org/029s7f567"},{"id":"https://openalex.org/F4320323299","display_name":"Norges Forskningsr\u00e5d","ror":"https://ror.org/00epmv149"},{"id":"https://openalex.org/F4320323591","display_name":"Christian Doppler Forschungsgesellschaft","ror":"https://ror.org/00mv8h305"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2188298146.pdf"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W6274262","https://openalex.org/W67298675","https://openalex.org/W1553078293","https://openalex.org/W1574491227","https://openalex.org/W1585849773","https://openalex.org/W1608515316","https://openalex.org/W1686284517","https://openalex.org/W1737185541","https://openalex.org/W2018940430","https://openalex.org/W2023413379","https://openalex.org/W2030684361","https://openalex.org/W2043836359","https://openalex.org/W2052086751","https://openalex.org/W2078899285","https://openalex.org/W2087440083","https://openalex.org/W2099473180","https://openalex.org/W2103422137","https://openalex.org/W2113237548","https://openalex.org/W2121697735","https://openalex.org/W2122590871","https://openalex.org/W2124105024","https://openalex.org/W2127962926","https://openalex.org/W2130175296","https://openalex.org/W2146863076","https://openalex.org/W2147733013","https://openalex.org/W2158572645","https://openalex.org/W2531610761","https://openalex.org/W3022544607","https://openalex.org/W3161918289"],"related_works":["https://openalex.org/W2548515206","https://openalex.org/W3119960109","https://openalex.org/W1976796938","https://openalex.org/W2020194669","https://openalex.org/W2114334503","https://openalex.org/W2279923222","https://openalex.org/W1597028236","https://openalex.org/W2910544062","https://openalex.org/W2406589135","https://openalex.org/W2062212465","https://openalex.org/W2182849240","https://openalex.org/W1993218317","https://openalex.org/W2103054907","https://openalex.org/W2013238834","https://openalex.org/W395385492","https://openalex.org/W2101195914","https://openalex.org/W2781731965","https://openalex.org/W2125764176","https://openalex.org/W1545300662","https://openalex.org/W1950235502"],"abstract_inverted_index":{"Attaining":[0],"high":[1],"quality":[2,56,110],"in":[3,24],"security":[4,22,38,52,80,105,112],"requirements":[5,39,45,53,71],"specification":[6,40,78],"requires":[7],"first-rate":[8],"professional":[9],"expertise,":[10],"which":[11],"is":[12,92],"scarce.":[13],"In":[14],"fact,":[15],"most":[16],"organisations":[17],"do":[18],"not":[19],"include":[20],"core":[21],"experts":[23],"their":[25],"software":[26],"team.":[27],"This":[28,60],"scenario":[29],"motivates":[30],"the":[31,43,75,86,100,109],"need":[32],"for":[33,37],"adequate":[34],"tool":[35],"support":[36],"so":[41],"that":[42,67,90],"human":[44],"analyst":[46],"can":[47],"be":[48],"assisted":[49],"to":[50,73,95],"specify":[51],"of":[54,79,85,97,103,111],"acceptable":[55],"with":[57],"minimum":[58],"effort.":[59],"paper":[61],"presents":[62],"a":[63],"tool-based":[64],"semantic":[65,87],"framework":[66,88],"uses":[68],"ontology":[69],"and":[70,77,107],"boilerplates":[72],"facilitate":[74],"formulation":[76],"requirements.":[81,113],"A":[82],"two-phased":[83],"evaluation":[84],"suggests":[89],"it":[91],"usable,":[93],"leads":[94],"reduction":[96],"effort,":[98],"aids":[99],"quick":[101],"discovery":[102],"hidden":[104],"threats,":[106],"improves":[108]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
