{"id":"https:\/\/openalex.org\/W2116175419","doi":"https:\/\/doi.org\/10.1145\/1456362.1456366","title":"Enforcing a security pattern in stakeholder goal models","display_name":"Enforcing a security pattern in stakeholder goal models","publication_year":2008,"publication_date":"2008-10-27","ids":{"openalex":"https:\/\/openalex.org\/W2116175419","doi":"https:\/\/doi.org\/10.1145\/1456362.1456366","mag":"2116175419"},"language":"en","primary_location":{"id":"doi:10.1145\/1456362.1456366","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1145\/1456362.1456366","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM workshop on Quality of protection","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5002289161","display_name":"Yijun Yu","orcid":"https:\/\/orcid.org\/0000-0002-7154-8570"},"institutions":[{"id":"https:\/\/openalex.org\/I204136569","display_name":"The Open University","ror":"https:\/\/ror.org\/05mzfcs16","country_code":"GB","type":"education","lineage":["https:\/\/openalex.org\/I204136569"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Yijun Yu","raw_affiliation_strings":["The Open University, Milton Keynes, United Kngdm","The Open University, Milton Keynes, United Kngdm#TAB#"],"affiliations":[{"raw_affiliation_string":"The Open University, Milton Keynes, United Kngdm","institution_ids":["https:\/\/openalex.org\/I204136569"]},{"raw_affiliation_string":"The Open University, Milton Keynes, United Kngdm#TAB#","institution_ids":["https:\/\/openalex.org\/I204136569"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5042986574","display_name":"Haruhiko Kaiya","orcid":"https:\/\/orcid.org\/0000-0001-9816-8001"},"institutions":[{"id":"https:\/\/openalex.org\/I137975476","display_name":"Shinshu University","ror":"https:\/\/ror.org\/0244rem06","country_code":"JP","type":"education","lineage":["https:\/\/openalex.org\/I137975476"]},{"id":"https:\/\/openalex.org\/I4210162928","display_name":"\u014ctani University","ror":"https:\/\/ror.org\/05b7rex33","country_code":"JP","type":"education","lineage":["https:\/\/openalex.org\/I4210162928"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Haruhiko Kaiya","raw_affiliation_strings":["Shinshu University, Nagano City, Japan","Shinshu University, Nagano City, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Shinshu University, Nagano City, Japan","institution_ids":["https:\/\/openalex.org\/I137975476","https:\/\/openalex.org\/I4210162928"]},{"raw_affiliation_string":"Shinshu University, Nagano City, Japan#TAB#","institution_ids":["https:\/\/openalex.org\/I137975476"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5033111691","display_name":"Hironori Washizaki","orcid":"https:\/\/orcid.org\/0000-0002-1417-9879"},"institutions":[{"id":"https:\/\/openalex.org\/I150744194","display_name":"Waseda University","ror":"https:\/\/ror.org\/00ntfnx83","country_code":"JP","type":"education","lineage":["https:\/\/openalex.org\/I150744194"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hironori Washizaki","raw_affiliation_strings":["Waseda University, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"Waseda University, Tokyo, Japan","institution_ids":["https:\/\/openalex.org\/I150744194"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5100712724","display_name":"Yingfei Xiong","orcid":"https:\/\/orcid.org\/0000-0001-8991-747X"},"institutions":[{"id":"https:\/\/openalex.org\/I74801974","display_name":"The University of Tokyo","ror":"https:\/\/ror.org\/057zh3y96","country_code":"JP","type":"education","lineage":["https:\/\/openalex.org\/I74801974"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yingfei Xiong","raw_affiliation_strings":["University of Tokyo, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"University of Tokyo, Tokyo, Japan","institution_ids":["https:\/\/openalex.org\/I74801974"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5102717988","display_name":"Zhenjiang Hu","orcid":"https:\/\/orcid.org\/0000-0002-9034-205X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhenjiang Hu","raw_affiliation_strings":["NII, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NII, Tokyo, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5018128809","display_name":"Nobukazu Yoshioka","orcid":"https:\/\/orcid.org\/0000-0002-1986-5675"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nobukazu Yoshioka","raw_affiliation_strings":["NII, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NII, Tokyo, Japan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https:\/\/openalex.org\/A5002289161"],"corresponding_institution_ids":["https:\/\/openalex.org\/I204136569"],"apc_list":null,"apc_paid":null,"fwci":7.872,"has_fulltext":false,"cited_by_count":22,"citation_normalized_percentile":{"value":0.97065172,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"9","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9994999766349792,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9994999766349792,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https:\/\/openalex.org\/subfields\/3312","display_name":"Sociology and Political Science"},"field":{"id":"https:\/\/openalex.org\/fields\/33","display_name":"Social Sciences"},"domain":{"id":"https:\/\/openalex.org\/domains\/2","display_name":"Social Sciences"}},{"id":"https:\/\/openalex.org\/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9994000196456909,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1702","display_name":"Artificial Intelligence"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.7543097734451294},{"id":"https:\/\/openalex.org\/keywords\/goal-modeling","display_name":"Goal modeling","score":0.7472113966941833},{"id":"https:\/\/openalex.org\/keywords\/stakeholder","display_name":"Stakeholder","score":0.6547293663024902},{"id":"https:\/\/openalex.org\/keywords\/role-based-access-control","display_name":"Role-based access control","score":0.4753679633140564},{"id":"https:\/\/openalex.org\/keywords\/computer-security-model","display_name":"Computer security model","score":0.46561598777770996},{"id":"https:\/\/openalex.org\/keywords\/order","display_name":"Order (exchange)","score":0.4166918694972992},{"id":"https:\/\/openalex.org\/keywords\/access-control","display_name":"Access control","score":0.39179128408432007},{"id":"https:\/\/openalex.org\/keywords\/software-engineering","display_name":"Software engineering","score":0.3822907507419586},{"id":"https:\/\/openalex.org\/keywords\/requirements-analysis","display_name":"Requirements analysis","score":0.348175972700119},{"id":"https:\/\/openalex.org\/keywords\/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3342706263065338},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.2944227457046509},{"id":"https:\/\/openalex.org\/keywords\/software","display_name":"Software","score":0.10117277503013611},{"id":"https:\/\/openalex.org\/keywords\/programming-language","display_name":"Programming language","score":0.08648538589477539},{"id":"https:\/\/openalex.org\/keywords\/business","display_name":"Business","score":0.07147881388664246}],"concepts":[{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.7543097734451294},{"id":"https:\/\/openalex.org\/C9586889","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5575167","display_name":"Goal modeling","level":4,"score":0.7472113966941833},{"id":"https:\/\/openalex.org\/C201305675","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q852998","display_name":"Stakeholder","level":2,"score":0.6547293663024902},{"id":"https:\/\/openalex.org\/C45567728","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1702839","display_name":"Role-based access control","level":3,"score":0.4753679633140564},{"id":"https:\/\/openalex.org\/C121822524","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q5157582","display_name":"Computer security model","level":2,"score":0.46561598777770996},{"id":"https:\/\/openalex.org\/C182306322","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4166918694972992},{"id":"https:\/\/openalex.org\/C527821871","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q228502","display_name":"Access control","level":2,"score":0.39179128408432007},{"id":"https:\/\/openalex.org\/C115903868","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q80993","display_name":"Software engineering","level":1,"score":0.3822907507419586},{"id":"https:\/\/openalex.org\/C59488412","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q187147","display_name":"Requirements analysis","level":3,"score":0.348175972700119},{"id":"https:\/\/openalex.org\/C112930515","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3342706263065338},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.2944227457046509},{"id":"https:\/\/openalex.org\/C2777904410","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7397","display_name":"Software","level":2,"score":0.10117277503013611},{"id":"https:\/\/openalex.org\/C199360897","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9143","display_name":"Programming language","level":1,"score":0.08648538589477539},{"id":"https:\/\/openalex.org\/C144133560","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q4830453","display_name":"Business","level":0,"score":0.07147881388664246},{"id":"https:\/\/openalex.org\/C10138342","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q43015","display_name":"Finance","level":1,"score":0},{"id":"https:\/\/openalex.org\/C17744445","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q36442","display_name":"Political science","level":0,"score":0},{"id":"https:\/\/openalex.org\/C39549134","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q133080","display_name":"Public relations","level":1,"score":0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145\/1456362.1456366","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1145\/1456362.1456366","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th ACM workshop on Quality of protection","raw_type":"proceedings-article"},{"id":"pmh:oai:oro.open.ac.uk:33463","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306401187","display_name":"Open Research Online (The Open University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I204136569","host_organization_name":"The Open University","host_organization_lineage":["https:\/\/openalex.org\/I204136569"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https:\/\/metadata.un.org\/sdg\/16","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https:\/\/openalex.org\/W146458024","https:\/\/openalex.org\/W1495153211","https:\/\/openalex.org\/W1524500851","https:\/\/openalex.org\/W1525541389","https:\/\/openalex.org\/W1539259953","https:\/\/openalex.org\/W1552595334","https:\/\/openalex.org\/W1649645444","https:\/\/openalex.org\/W1692845443","https:\/\/openalex.org\/W1817810154","https:\/\/openalex.org\/W1853162542","https:\/\/openalex.org\/W1874464064","https:\/\/openalex.org\/W2073068676","https:\/\/openalex.org\/W2076676096","https:\/\/openalex.org\/W2097154968","https:\/\/openalex.org\/W2101976855","https:\/\/openalex.org\/W2110054482","https:\/\/openalex.org\/W2110157102","https:\/\/openalex.org\/W2127393411","https:\/\/openalex.org\/W2129527513","https:\/\/openalex.org\/W2130310983","https:\/\/openalex.org\/W2130891285","https:\/\/openalex.org\/W2131730994","https:\/\/openalex.org\/W2146174615","https:\/\/openalex.org\/W2154765153","https:\/\/openalex.org\/W2159976480","https:\/\/openalex.org\/W3161918289","https:\/\/openalex.org\/W4285719527","https:\/\/openalex.org\/W6605978214","https:\/\/openalex.org\/W6676387807","https:\/\/openalex.org\/W7043454694"],"related_works":["https:\/\/openalex.org\/W2372156812","https:\/\/openalex.org\/W2374393728","https:\/\/openalex.org\/W2386545329","https:\/\/openalex.org\/W2148952798","https:\/\/openalex.org\/W2382286253","https:\/\/openalex.org\/W2356011375","https:\/\/openalex.org\/W1795360416","https:\/\/openalex.org\/W2392979115","https:\/\/openalex.org\/W819284483","https:\/\/openalex.org\/W2370002471"],"abstract_inverted_index":{"Patterns":[0],"are":[1],"useful":[2],"knowledge":[3],"about":[4],"recurring":[5],"problems":[6],"and":[7,30,71,88],"solutions.":[8],"Detecting":[9],"a":[10,41,47,75],"security":[11,33,92],"problem":[12],"using":[13,68],"patterns":[14],"in":[15,35,52,59,81,94],"requirements":[16,54,78],"models":[17,79],"may":[18,50],"lead":[19],"to":[20,26,74],"its":[21],"early":[22,28],"solution.":[23],"In":[24],"order":[25],"facilitate":[27],"detection":[29,87],"resolution":[31,89],"of":[32,77,90],"problems,":[34],"this":[36],"paper,":[37],"we":[38],"formally":[39,65],"describe":[40],"role-based":[42],"access":[43],"control":[44],"(RBAC)":[45],"as":[46],"pattern":[48,67,93],"that":[49],"occur":[51],"stakeholder":[53,97],"models.":[55],"We":[56],"also":[57],"implemented":[58],"our":[60],"goal-oriented":[61,96],"modeling":[62],"tool":[63,84],"the":[64,83,86,91],"described":[66],"model-driven":[69],"queries":[70],"transformations.":[72],"Applied":[73],"number":[76],"published":[80],"literature,":[82],"automates":[85],"several":[95],"requirements.":[98]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}