{"version.version":"0.0.7","version.cm_url":"https://github.com/ceurws/ceur-spt","spt.html_url":"/Vol-1157/norms4.html","spt.description":null,"spt.id":"Vol-1157/norms4","spt.wikidataid":null,"spt.title":"Modeling and Applying Security Patterns Using Contextual Goal Models","spt.pdfUrl":"https://ceur-ws.org/Vol-1157/paper11.pdf","spt.volume":{"number":1157,"acronym":"iStar 2014","wikidataid":"Q113544882","title":"Proceedings of the Seventh International i* Workshop","description":"Proceedings of iStar 2014 workshop","url":"http://ceur-ws.org/Vol-1157/","date":"2014-06-04","dblp":"conf/istar/2014","k10plus":"787197718","urn":"urn:nbn:de:0074-1157-5"},"spt.session":null,"cvb.id":"Vol-1157/norms4","cvb.title":"Modeling and Applying Security Patterns Using Contextual Goal Models","cvb.type":null,"cvb.position":null,"cvb.pagesFrom":null,"cvb.pagesTo":null,"cvb.authors":"","cvb.vol_number":"1157","cvb.pdf_name":"paper11.pdf","cvb.pages":null,"cvb.fail":null,"dblp.dblp_publication_id":"https://dblp.org/rec/conf/istar/LiM14","dblp.dblp_proceeding_id":"https://dblp.org/rec/conf/istar/2014","dblp.volume_number":1157,"dblp.title":"Modeling and Applying Security Patterns Using Contextual Goal Models.","dblp.authors":[{"dblp_author_id":"https://dblp.org/pid/m/JohnMylopoulos","label":"John Mylopoulos","wikidata_id":"Q18156660","orcid_id":"0000-0002-8698-3292","gnd_id":"1089492294"},{"dblp_author_id":"https://dblp.org/pid/29/3826-1","label":"Tong Li 0001","wikidata_id":"Q130855263","orcid_id":"0000-0002-8881-0037","gnd_id":null}],"dblp.pdf_id":"Vol-1157/paper11"}