{"id":"https://openalex.org/W2790436343","doi":"https://doi.org/10.4018/ijsse.2017070103","title":"Goal Modelling for Security Problem Matching and Pattern Enforcement","display_name":"Goal Modelling for Security Problem Matching and Pattern Enforcement","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2790436343","doi":"https://doi.org/10.4018/ijsse.2017070103","mag":"2790436343"},"language":"en","primary_location":{"id":"doi:10.4018/ijsse.2017070103","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijsse.2017070103","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=201215&isxn=9781522513872","source":{"id":"https://openalex.org/S43656255","display_name":"International Journal of Secure Software Engineering","issn_l":"1947-3036","issn":["1947-3036","1947-3044"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Secure Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=201215&isxn=9781522513872","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002289161","display_name":"Yijun Yu","orcid":"https://orcid.org/0000-0002-7154-8570"},"institutions":[{"id":"https://openalex.org/I204136569","display_name":"The Open University","ror":"https://ror.org/05mzfcs16","country_code":"GB","type":"education","lineage":["https://openalex.org/I204136569"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Yijun Yu","raw_affiliation_strings":["School of Computing and Communications, The Open University, Milton Keynes, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing and Communications, The Open University, Milton Keynes, UK","institution_ids":["https://openalex.org/I204136569"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042986574","display_name":"Haruhiko Kaiya","orcid":"https://orcid.org/0000-0001-9816-8001"},"institutions":[{"id":"https://openalex.org/I41802502","display_name":"Kanagawa University","ror":"https://ror.org/02j6c0d67","country_code":"JP","type":"education","lineage":["https://openalex.org/I41802502"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Haruhiko Kaiya","raw_affiliation_strings":["Kanagawa University, Hiratsuka, Japan"],"affiliations":[{"raw_affiliation_string":"Kanagawa University, Hiratsuka, Japan","institution_ids":["https://openalex.org/I41802502"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018128809","display_name":"Nobukazu Yoshioka","orcid":"https://orcid.org/0000-0002-1986-5675"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nobukazu Yoshioka","raw_affiliation_strings":["GRACE Center, NII, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"GRACE Center, NII, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102717988","display_name":"Zhenjiang Hu","orcid":"https://orcid.org/0000-0002-9034-205X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhenjiang Hu","raw_affiliation_strings":["GRACE Center, NII, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"GRACE Center, NII, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033111691","display_name":"Hironori Washizaki","orcid":"https://orcid.org/0000-0002-1417-9879"},"institutions":[{"id":"https://openalex.org/I150744194","display_name":"Waseda University","ror":"https://ror.org/00ntfnx83","country_code":"JP","type":"education","lineage":["https://openalex.org/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hironori Washizaki","raw_affiliation_strings":["Computer Science and Engineering Department, Waseda University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Department, Waseda University, Tokyo, Japan","institution_ids":["https://openalex.org/I150744194"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100712724","display_name":"Yingfei Xiong","orcid":"https://orcid.org/0000-0001-8991-747X"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingfei Xiong","raw_affiliation_strings":["Peking University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Peking University, Beijing, China","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040987266","display_name":"Amin Hosseinian\u2010Far","orcid":"https://orcid.org/0000-0002-2534-9044"},"institutions":[{"id":"https://openalex.org/I35870678","display_name":"University of Northampton","ror":"https://ror.org/04jp2hx10","country_code":"GB","type":"education","lineage":["https://openalex.org/I35870678"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Amin Hosseinian-Far","raw_affiliation_strings":["Faculty of Business & Law, The University of Northampton, Northampton, UK"],"affiliations":[{"raw_affiliation_string":"Faculty of Business & Law, The University of Northampton, Northampton, UK","institution_ids":["https://openalex.org/I35870678"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5002289161"],"corresponding_institution_ids":["https://openalex.org/I204136569"],"apc_list":null,"apc_paid":null,"fwci":2.2413,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.91932621,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"8","issue":"3","first_page":"42","last_page":"57"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8240691423416138},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5010647773742676},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.49854397773742676},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4570392072200775},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4449279308319092},{"id":"https://openalex.org/keywords/stakeholder","display_name":"Stakeholder","score":0.4366964101791382},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43544572591781616},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.4173528850078583},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3893229365348816},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3390668034553528},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.29181933403015137},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2657313942909241}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8240691423416138},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5010647773742676},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.49854397773742676},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4570392072200775},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4449279308319092},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.4366964101791382},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43544572591781616},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.4173528850078583},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3893229365348816},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3390668034553528},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.29181933403015137},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2657313942909241},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.4018/ijsse.2017070103","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijsse.2017070103","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=201215&isxn=9781522513872","source":{"id":"https://openalex.org/S43656255","display_name":"International Journal of Secure Software Engineering","issn_l":"1947-3036","issn":["1947-3036","1947-3044"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Secure Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:nectar.northampton.ac.uk:10207","is_oa":false,"landing_page_url":"http://nectar.northampton.ac.uk/10207/1/201215","pdf_url":null,"source":{"id":"https://openalex.org/S4377196393","display_name":"NECTAR - Northampton Electronic Collection of Thesis and Research (University of Northampton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I35870678","host_organization_name":"University of Northampton","host_organization_lineage":["https://openalex.org/I35870678"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:oro.open.ac.uk:52692","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401187","display_name":"Open Research Online (The Open University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204136569","host_organization_name":"The Open University","host_organization_lineage":["https://openalex.org/I204136569"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Journal Item"}],"best_oa_location":{"id":"doi:10.4018/ijsse.2017070103","is_oa":true,"landing_page_url":"https://doi.org/10.4018/ijsse.2017070103","pdf_url":"https://www.igi-global.com/ViewTitle.aspx?TitleId=201215&isxn=9781522513872","source":{"id":"https://openalex.org/S43656255","display_name":"International Journal of Secure Software Engineering","issn_l":"1947-3036","issn":["1947-3036","1947-3044"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Secure Software Engineering","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.44999998807907104,"display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2790436343.pdf","grobid_xml":"https://content.openalex.org/works/W2790436343.grobid-xml"},"referenced_works_count":53,"referenced_works":["https://openalex.org/W146458024","https://openalex.org/W1079567482","https://openalex.org/W1484460783","https://openalex.org/W1499108226","https://openalex.org/W1510027660","https://openalex.org/W1514888816","https://openalex.org/W1525541389","https://openalex.org/W1545210075","https://openalex.org/W1649645444","https://openalex.org/W1692845443","https://openalex.org/W1811024770","https://openalex.org/W1950875746","https://openalex.org/W1953739031","https://openalex.org/W1987826190","https://openalex.org/W1997199359","https://openalex.org/W2001822577","https://openalex.org/W2034078044","https://openalex.org/W2043787018","https://openalex.org/W2050180747","https://openalex.org/W2073068676","https://openalex.org/W2076676096","https://openalex.org/W2080279828","https://openalex.org/W2101976855","https://openalex.org/W2106723671","https://openalex.org/W2110054482","https://openalex.org/W2110157102","https://openalex.org/W2116175419","https://openalex.org/W2118875948","https://openalex.org/W2129527513","https://openalex.org/W2130891285","https://openalex.org/W2131730994","https://openalex.org/W2146174615","https://openalex.org/W2154765153","https://openalex.org/W2157706064","https://openalex.org/W2158572645","https://openalex.org/W2159951278","https://openalex.org/W2164287933","https://openalex.org/W2252272901","https://openalex.org/W2294361433","https://openalex.org/W2295279718","https://openalex.org/W2486979789","https://openalex.org/W2513806568","https://openalex.org/W2518294170","https://openalex.org/W2521933324","https://openalex.org/W2523012251","https://openalex.org/W2525989728","https://openalex.org/W2575164493","https://openalex.org/W2606320129","https://openalex.org/W2607943351","https://openalex.org/W2913191858","https://openalex.org/W3161918289","https://openalex.org/W4229680087","https://openalex.org/W4242704521"],"related_works":["https://openalex.org/W4230385779","https://openalex.org/W1811024770","https://openalex.org/W2412133583","https://openalex.org/W1976635772","https://openalex.org/W2542633692","https://openalex.org/W2017116761","https://openalex.org/W2222589037","https://openalex.org/W1981397775","https://openalex.org/W2467594283","https://openalex.org/W1548138051"],"abstract_inverted_index":{"This":[0,168],"article":[1,204],"describes":[2],"how":[3],"earlier":[4],"detection":[5,190],"of":[6,12,39,84,96,113,174,193,210],"security":[7,53,57,61,85,119,195],"problems":[8],"and":[9,26,32,55,107,123,151,160,180,191,213],"the":[10,37,42,64,78,88,111,139,144,147,165,178,181,189,203],"implementation":[11],"solutions":[13,33],"would":[14],"be":[15],"a":[16,60,94,133,172,208],"cost-effective":[17],"approach":[18],"for":[19],"developing":[20],"secure":[21],"software":[22],"systems.":[23],"Developing,":[24],"gathering":[25],"sharing":[27],"similar":[28],"repeatable":[29],"programming":[30],"knowledge":[31,54],"has":[34,47,187],"led":[35],"to":[36,50,71,163,171],"introduction":[38],"Patterns":[40],"in":[41,66,87,130,138,197],"90's.":[43],"The":[44],"same":[45],"concept":[46],"been":[48],"adopted":[49],"realise":[51],"reoccurring":[52],"hence":[56],"patterns.":[58],"Detecting":[59],"problem":[62],"using":[63],"patterns":[65,86],"requirements":[67,114,141,175],"models":[68,176],"may":[69,136],"lead":[70],"its":[72,155],"early":[73],"prevention.":[74],"In":[75],"this":[76,194],"article,":[77],"authors":[79,145],"have":[80,117],"provided":[81],"an":[82],"overview":[83],"past":[89],"two":[90],"decades,":[91],"followed":[92],"by":[93],"summary":[95],"i*/Tropos":[97],"goal":[98],"modelling":[99,149],"framework.":[100],"Section":[101],"2":[102],"outlines":[103],"model-driven":[104,158],"development,":[105],"meta-models":[106],"model":[108],"transformation,":[109],"within":[110,177],"context":[112],"engineering.":[115],"They":[116],"summarised":[118],"access":[120,127],"control":[121,128],"types,":[122],"formally":[124],"described":[125],"role-based":[126],"(RBAC)":[129],"particular":[131],"as":[132],"pattern":[134,166,196],"that":[135],"occur":[137],"stakeholder":[140,200],"models.":[142],"Then":[143],"used":[146],"i*":[148],"language":[150],"some":[152],"elements":[153],"from":[154],"constructs":[156],"-":[157,162],"queries":[159],"transformations":[161],"describe":[164],"enforcement.":[167],"is":[169],"applied":[170],"number":[173],"literature,":[179],"pattern-based":[182],"transformation":[183],"tool":[184],"they":[185],"designed":[186],"automated":[188],"resolution":[192],"several":[198],"goal-oriented":[199],"requirements.":[201],"Finally,":[202],"also":[205],"reflects":[206],"on":[207],"variety":[209],"existing":[211],"applications":[212],"future":[214],"work.":[215]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
