{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:46:38Z","timestamp":1760586398999},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540386193"},{"type":"electronic","value":"9783540386223"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11839569_17","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T13:21:24Z","timestamp":1159881684000},"page":"173-182","source":"Crossref","is-referenced-by-count":3,"title":["Development and Runtime Support for Situation-Aware Security in Autonomic Computing"],"prefix":"10.1007","author":[{"given":"Stephen S.","family":"Yau","sequence":"first","affiliation":[]},{"given":"Yisheng","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Min","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"17_CR1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MC.2003.1160055","volume":"36","author":"J.O. Kephart","year":"2003","unstructured":"Kephart, J.O., Chess, D.M.: The vision of autonomic computing. IEEE Computer\u00a036(1), 41\u201350 (2003)","journal-title":"IEEE Computer"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Yau, S.S., Wang, Y., Karim, F.: Development of Situation-Aware Application Software for Ubiquitous Computing Environments. In: Proc. 26th IEEE Int\u2019l Computer Software and Applications Conf., pp. 233\u2013238 (2002)","DOI":"10.1109\/CMPSAC.2002.1044557"},{"issue":"3","key":"17_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MPRV.2002.1037720","volume":"1","author":"S.S. Yau","year":"2002","unstructured":"Yau, S.S., et al.: Reconfigurable Context-Sensitive Middleware for Pervasive Computing. IEEE Pervasive Computing\u00a01(3), 33\u201340 (2002)","journal-title":"IEEE Pervasive Computing"},{"key":"17_CR4","unstructured":"OMG.: MDA Guide Version 1.01 (accessed 03\/18\/2006), http:\/\/www.omg.org\/"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Burt, C.C., et al.: Model driven security: unification of authorization models for fine-grain access control. In: Proc. 7th IEEE Int\u2019l Enterprise Distributed Object Computing Conf., pp. 159\u2013171 (2003)","DOI":"10.1109\/EDOC.2003.1233846"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Basin, D., Doser, J.r., Lodderstedt, T.: Model driven security for process-oriented systems. In: Proc. 8th ACM Symp. Access Control Models and Tech, pp. 100\u2013109 (2003)","DOI":"10.1145\/775412.775425"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/11554578_2","volume-title":"Foundations of Security Analysis and Design III","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Model-Based Security Engineering with UML. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol.\u00a03655, pp. 42\u201377. Springer, Heidelberg (2005)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Nakamura, Y., et al.: Model-Driven Security Based on a Web Services Security Architecture. In: Proc. 2005 IEEE Int\u2019l Conf. on Services Computing, pp. 7\u201315 (2005)","DOI":"10.1109\/SCC.2005.66"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Epstein, P., Sandhu, R.: Towards a UML based approach to role engineering. In: Proc. 4th ACM Workshop on Role-Based Access Control, pp. 135\u2013143 (1999)","DOI":"10.1145\/319171.319184"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Shin, M.E., Ahn, G.-J.: UML-Based Representation of Role-Based Access Control. In: Proc. 9th IEEE Int\u2019l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 195\u2013200 (2000)","DOI":"10.1109\/ENABL.2000.883728"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Doan, T., et al.: MAC and UML for secure software design. In: Proc. ACM Workshop on Formal Methods in Security Eng., pp. 75\u201385 (2004)","DOI":"10.1145\/1029133.1029144"},{"key":"17_CR13","unstructured":"OASIS.: Security Assertion Markup Language (SAML) Version 2.0 (accessed on 03\/18\/2006), http:\/\/www.oasis-open.org\/"},{"key":"17_CR14","unstructured":"OASIS.: eXtensible Access Control Markup Language (XACML) version 2.0 (accessed on 03\/18\/2006), http:\/\/docs.oasis-open.org\/xacml\/"},{"key":"17_CR15","unstructured":"WS-Security (accessed on 03\/18\/2006), http:\/\/www.ibm.com\/developerworks\/"},{"key":"17_CR16","unstructured":"WS Security Policy (accessed on 03\/18\/2006), http:\/\/www.ibm.com\/developerworks\/"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., Fournet, C., Gordon, A.D.: A semantics for web services authentication. In: Proc. 31st ACM Symp. on Principles of Programming Languages, pp. 198\u2013209 (2004)","DOI":"10.1145\/964001.964018"},{"issue":"4","key":"17_CR18","doi-asserted-by":"crossref","first-page":"309","DOI":"10.3233\/JCS-2000-8404","volume":"8","author":"E. Bertino","year":"2000","unstructured":"Bertino, E., et al.: Temporal Authorization Bases: From Specification to Integration. Jour. Computer Security\u00a08(4), 309\u2013354 (2000)","journal-title":"Jour. Computer Security"},{"issue":"2","key":"17_CR19","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., et al.: Flexible Supporting for Multiple Access Control Policies. ACM Trans. on Database Systems\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Trans. on Database Systems"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Uszok, A., et al.: KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement. In: Proc. IEEE 4th Int\u2019l Workshop on Policies for Distributed Systems and Networks, pp. 93\u201396 (2003)","DOI":"10.1109\/POLICY.2003.1206963"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Yau, S.S., el al.: Automated Agent Synthesis for Situation-Aware Service Coordination in Service-based Systems, Technical Report, Arizona State University (August 2005)","DOI":"10.1109\/COMPSAC.2006.30"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Yau, S.S., Yao, Y., Banga, V.: Situation-Aware Access Control for Service-Oriented Autonomous Decentralized Systems. In: Proc. 7th Int\u2019l Symp. on Autonomous Decentralized Systems, pp. 17\u201324 (2005)","DOI":"10.1109\/ISADS.2005.1452011"}],"container-title":["Lecture Notes in Computer Science","Autonomic and Trusted Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11839569_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T01:49:50Z","timestamp":1683596990000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11839569_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540386193","9783540386223"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/11839569_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}