{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:36:04Z","timestamp":1767926164035,"version":"3.49.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/repa.2012.6359977","type":"proceedings-article","created":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T02:14:14Z","timestamp":1354328054000},"page":"29-34","source":"Crossref","is-referenced-by-count":18,"title":["Security requirements patterns: understanding the science behind the art of pattern writing"],"prefix":"10.1109","author":[{"given":"Maria","family":"Riaz","sequence":"first","affiliation":[]},{"given":"Laurie","family":"Williams","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.2201\/NiiPi.2008.5.5"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1753196.1753214"},{"key":"17","author":"fowler","year":"2002","journal-title":"Patterns of Enterprise Application Architecture"},{"key":"36","article-title":"Metapatterns: A pattern language for pattern writing","author":"meszaros","year":"0","journal-title":"The 3rd Pattern Languages of Programming Conference Monticello Illinois USA 1996"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.23"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2009.09.028"},{"key":"15","author":"fowler","year":"1997","journal-title":"Analysis Patterns Reusable Object Models"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1202_4"},{"key":"16","author":"h","year":"1995","journal-title":"Design Patterns Elements of Reusable Object-Oriented Software"},{"key":"39","first-page":"7","article-title":"The Difficulties of Using Design Patterns among Novices: An Exploratory Study","author":"jalil","year":"0","journal-title":"5th International Conference on Computational Science & Applications (ICCSA'07) Kuala Lampur Malaysia 2007"},{"key":"13","article-title":"Using mapping studies in software engineering","author":"budgen","year":"2008","journal-title":"20th Annual Psychology of Programming Interest Group Conference (PPIG 2008)"},{"key":"14","author":"withall","year":"2007","journal-title":"Software Requirement Patterns"},{"key":"37","author":"vlissides","year":"1998","journal-title":"Pattern Hatching Design Patterns Applied"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2011.6051659"},{"key":"38","author":"riaz","year":"2012","journal-title":"On the Design of Empirical Studies to Evaluate Software Patterns A Survey"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2004.3.1.c6"},{"key":"21","author":"jackson","year":"2001","journal-title":"Problem Frames"},{"key":"20","author":"berczuk","year":"2003","journal-title":"Software Configuration Management Patterns Effective Teamwork Practical Integration"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/32.895989"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(03)00095-8"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.11.003"},{"key":"40","first-page":"47","article-title":"A controlled experiment comparing the maintainability of programs designed with and without design patterns - A replication in a real programming environment","volume":"9","author":"vocak","year":"0","journal-title":"Empirical Software Engineering"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.51"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.36"},{"key":"24","author":"schumacher","year":"2006","journal-title":"Security Patterns Integrating Security and Systems Engineering"},{"key":"25","author":"withall","year":"2007","journal-title":"Software Requirement Patterns"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/RePa.2011.6046726"},{"key":"27","author":"bloom","year":"1956","journal-title":"Taxonomy of Educational Objectives The Classification of Educational Goals"},{"key":"28","author":"boehm","year":"2003","journal-title":"Balancing Agility and Discipline A Guide for the Perplexed"},{"key":"29","volume":"4","author":"buschmann","year":"2007","journal-title":"A Pattern Language for Distributed Computing"},{"key":"3","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/PL00010360","article-title":"Requirements Reuse for Improving Information Systems Security: A Practitioner's Approach","volume":"6","author":"toval","year":"2002","journal-title":"Requirements Engineering"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.23"},{"key":"10","article-title":"Elaborating Security Requirements by Construction of Intentional Anti-Models","author":"lamsweerde","year":"0","journal-title":"International Conference on Software Engineering (ICSE 2004) Edinburgh Scotland 2004"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.19"},{"key":"30","article-title":"Using Security Patterns and Security Standards - With Selected Security Patterns for Anonymity and Privacy","author":"kerth","year":"0","journal-title":"European Conference on Pattern Languages of Programs"},{"key":"7","author":"bishop","year":"2003","journal-title":"Computer Security Art and Science"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/236156.236164"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/52.566428"},{"key":"5","author":"howard","year":"2006","journal-title":"The Security Development Lifecycle"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1142\/S021819400900443X"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1083200.1083214"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2003.2.1.c6"}],"event":{"name":"2012 IEEE Second International Workshop on Requirements Patterns (RePa)","location":"Chicago, IL, USA","start":{"date-parts":[[2012,9,24]]},"end":{"date-parts":[[2012,9,24]]}},"container-title":["2012 Second IEEE International Workshop on Requirements Patterns (RePa)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6338383\/6359964\/06359977.pdf?arnumber=6359977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T03:23:08Z","timestamp":1498015388000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6359977\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/repa.2012.6359977","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}