{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:09:20Z","timestamp":1743095360358,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":34,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780792375586"},{"type":"electronic","value":"9780306469589"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/0-306-46958-8_8","type":"book-chapter","created":{"date-parts":[[2006,2,20]],"date-time":"2006-02-20T04:49:39Z","timestamp":1140410979000},"page":"107-124","source":"Crossref","is-referenced-by-count":6,"title":["Secure Java Development with UML"],"prefix":"10.1007","author":[{"given":"Jan","family":"J\u00fcrjens","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi. Security protocols and their properties. In F. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation. IOS Press, 2000.","DOI":"10.1007\/3-540-49019-1_1"},{"issue":"4","key":"8_CR2","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"M. Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706\u2013734, 1993.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"8_CR3","unstructured":"R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2001."},{"key":"8_CR4","unstructured":"B. Bokowski and J. Vitek. Confined types. In 14th Annual ACM SIGPLAN Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA\u2019 99), 1999."},{"key":"8_CR5","unstructured":"R. Campo, A. Cavarra, and E. Riccobene. Simulating UML state machines. In E. Borger and U. Gl\u00e4sser, editors, ASM\u20192001, LNCS. Springer-Verlag, 2001. To be published."},{"key":"8_CR6","first-page":"343","volume-title":"Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach","author":"J. C. Fabre","year":"1994","unstructured":"J. C. Fabre, Y. Deswarte, and B. Randell. Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach. In PDCS 2: Open Conference, pages 343\u2013362, Newcastle-upon-Tyne, 1994. Dept of Computing Science, University of Newcastle, NE1 7RU, UK."},{"issue":"1","key":"8_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1108\/10662249910251273","volume":"9","author":"S. Gritzalis","year":"1999","unstructured":"Stefanos Gritzalis, George Aggelis, and Diomidis Spinellis. Architectures for secure portable executable content. Internet Research, 9(1):16\u201324, 1999.","journal-title":"Internet Research"},{"key":"8_CR8","unstructured":"D. Gollmann. Computer Security. J. Wiley, 1999."},{"key":"8_CR9","unstructured":"Li Gong. JavaTM Security Architecture (JDK1.2). http:\/\/java.sun.com\/products\/jdk\/1.2\/docs\/guide\/security\/spec\/securityspec.doc.html , October 2 1998."},{"key":"8_CR10","unstructured":"Li Gong. Inside Java 2 Platform Security-Architecture, API Design, and Implementation. Addison-Wesley, 1999."},{"issue":"8","key":"8_CR11","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/S0140-3664(99)00030-4","volume":"22","author":"S. Gritzalis","year":"1999","unstructured":"Stefanos Gritzalis, Diomidis Spinellis, and Panagiotis Georgiadis. Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification. Computer Communications Journal, 22(8):695\u2013707, 1999.","journal-title":"Computer Communications Journal"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Manfred Hauswirth, Clemens Kerer, and Roman Kurmanowytsch. A secure execution framework for Java. In ACM conference on Computer and communications security, 2000.","DOI":"10.1145\/352600.352608"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"H. Hu\u00dfmann, editor. Fundamental Approaches to Software Engineering (FASE\/ETA PS, International Conference), volume 2029 of LNCS. Springer-Verlag, 2001.","DOI":"10.1007\/3-540-45314-8"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Jan J\u00fcrjens. Developing secure systems with UMLsec-from business processes to implementation. In VIS 2001. Vieweg-Verlag, 2001. To appear.","DOI":"10.1007\/978-3-663-05918-9_11"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Jan Jiirjens. Encapsulating rules of prudent security engineering. In International Workshop on Security Protocols, LNCS. Springer-Verlag, 2001. To be published.","DOI":"10.1007\/3-540-45807-7_15"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Jan Jurjens. Modelling audit security for smart-card payment schemes with UMLsec. In M. Dupuy and P. Paradinas, editors, Trusted Information: The New Decade Challenge, pages 93\u2013108. International Federation for Information Processing (IFIP), Kluwer Academic Publishers, 2001. Proceedings of SEC 2001-16th International Conference on Information Security.","DOI":"10.1007\/0-306-46998-7_7"},{"key":"8_CR17","unstructured":"Jan J\u00fcrjens. Principles for Secure Systems Design. PhD thesis, Oxford University Computing Laboratory, 2001. In preparation."},{"key":"8_CR18","first-page":"135","volume":"2021","author":"J. J\u00fcrjens","year":"2001","unstructured":"Jan J\u00fcrjens. Secrecy-preserving refinement. In Formal Methods Europe (International Symposium), volume 2021 of LNCS, pages 135\u2013152. Springer-Verlag, 2001.","journal-title":"LNCS"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Jan Jurjens. Towards development of secure systems using UMLsec. In Hu\u00dfmann [Hu\u00df01], pages 187\u2013200. Also OUCL TR-9-00 (Nov. 2000), http:\/\/web.cornlab.ox.ac.uk\/oucl\/publications\/tr\/tr-9-00.html .","DOI":"10.1007\/3-540-45314-8_14"},{"issue":"23","key":"8_CR20","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3233\/JCS-2000-82-302","volume":"8","author":"G. Karjoth","year":"2000","unstructured":"G. Karjoth. Authorization in CORBA security. Journal of Computer Security, 8(2,3):89\u2013108, 2000.","journal-title":"Journal of Computer Security"},{"key":"8_CR21","unstructured":"G. Karjoth. Java and mobile code security-an operational semantics of Java 2 access control. In IEEE Computer Security Foundations Workshop, 2000."},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"L. Kassab and S. Greenwald. Towards formalizing the Java Security Architecture in JDK 1.2. In European Symposium on Research in Computer Security (ESORICS), LNCS. Springer-Verlag, 1998.","DOI":"10.21236\/ADA465148"},{"key":"8_CR23","unstructured":"C. Lai, L. Gong, L. Koved, A. Nadalin, and R. Schemers. User authentication and authorization in the Java platform. In IEEE Annual Computer Security Applications Conference, 1999."},{"key":"8_CR24","unstructured":"W. Measor. Secure byzantine agreement-design, implementation and verification. Master\u2019s thesis, Oxford University Computing Laboratory, 2001."},{"key":"8_CR25","unstructured":"V. Nicomette and Y. Deswarte. An Authorization scheme for distributed object systems. In IEEE Symposium on Security and Privacy, 1997."},{"key":"8_CR26","unstructured":"P. Ryan, S. Schneider, M. Goldsmith, G. Lowe, and B. Roscoe. The Modelling and Analysis of Security Protocols: the CSP Approach. Addison-Wesley, 2001."},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"P. Samarati. Access control: Policies, models, architectures, and mechanisms. Lecture Notes, 2000.","DOI":"10.1007\/3-540-45608-2_3"},{"key":"8_CR28","unstructured":"P. Stevens and R. Pooley. Using VML. Addison-Wesley, 2000."},{"issue":"9","key":"8_CR29","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J. Saltzer","year":"1975","unstructured":"J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278\u20131308, September 1975.","journal-title":"Proceedings of the IEEE"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"R. Sandhu and P. Samarati. Access control: Principles and practice. IEEE Communications, 32(9), 1994.","DOI":"10.1109\/35.312842"},{"key":"8_CR31","unstructured":"UML Revision Task Force. OMG UML Specification v. 1.4 (draft). OMG Document ad\/01-02-14. Available at http:\/\/www.omg.org\/uml , February 2001."},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"V. Varadharajan. Distributed object system security. In H.P. Eloff and S.H. von Solms, editors, Information Security-the next Decade, pages 305\u2013321. Chapman & Hall, 1995.","DOI":"10.1007\/978-0-387-34873-5_23"},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"V. Varadharajan and T. Hardjono. Security model for distributed object framework and its applicability to CORBA. In 12th International Information Security Conference IFIP SEC\u201996, 1996.","DOI":"10.1007\/978-1-5041-2919-0_38"},{"key":"8_CR34","unstructured":"D. Wallach and E. Felten. Understanding Java Stack Inspection. In IEEE Security and Privacy, 1998."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Network and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-306-46958-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,16]],"date-time":"2019-04-16T20:47:24Z","timestamp":1555447644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-306-46958-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9780792375586","9780306469589"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/0-306-46958-8_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2002]]}}}