{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:40Z","timestamp":1740099160183,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030008550"},{"type":"electronic","value":"9783030008567"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00856-7_13","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T04:32:19Z","timestamp":1536726739000},"page":"198-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Formalizing Reusable Communication Models for Distributed Systems Architecture"],"prefix":"10.1007","author":[{"given":"Quentin","family":"Rouland","sequence":"first","affiliation":[]},{"given":"Brahim","family":"Hamid","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"key":"13_CR1","unstructured":"Alloy Analyzer. http:\/\/alloy.mit.edu. Accessed June 2017"},{"issue":"3","key":"13_CR2","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/258077.258078","volume":"6","author":"R Allen","year":"1997","unstructured":"Allen, R., Garlan, D.: A formal basis for architectural connection. ACM Trans. Softw. Eng. Methodol. 6(3), 213\u2013249 (1997)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"13_CR3","volume-title":"Distributed Systems: Concepts and Design","author":"G Coulouris","year":"2011","unstructured":"Coulouris, G., Dollimore, J., Kindberg, T., Blair, G.: Distributed Systems: Concepts and Design, 5th edn. Addison-Wesley Publishing Company, Boston (2011)","edition":"5"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Crnkovic, I.: Component-based software engineering for embedded systems. In: Proceedings of the 27th International Conference on Software Engineering, ICSE 2005, pp. 712\u2013713. ACM (2005)","DOI":"10.1145\/1062455.1062631"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-39800-4_1","volume-title":"Formal Methods for Software Architectures","author":"D Garlan","year":"2003","unstructured":"Garlan, D.: Formal modeling and analysis of software architecture: components, connectors, and events. In: Bernardo, M., Inverardi, P. (eds.) SFM 2003. LNCS, vol. 2804, pp. 1\u201324. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-39800-4_1"},{"issue":"2","key":"13_CR6","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s11334-015-0259-1","volume":"12","author":"B Hamid","year":"2016","unstructured":"Hamid, B., G\u00fcrgens, S., Fuchs, A.: Security patterns modeling and formalization for pattern-based development of secure software systems. Innov. Syst. Softw. Eng. 12(2), 109\u2013140 (2016)","journal-title":"Innov. Syst. Softw. Eng."},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.jss.2016.09.027","volume":"122","author":"B Hamid","year":"2016","unstructured":"Hamid, B., Perez, J.: Supporting pattern-based dependability engineering via model-driven development: approach, tool-support and empirical validation. J. Syst. Softw. 122, 239\u2013273 (2016)","journal-title":"J. Syst. Softw."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Heyman, T., Scandariato, R., Joosen, W.: Reusable formal models for secure software architectures. In: Joint Working IEEE\/IFIP Conference on Software Architecture and European Conference on Software Architecture, pp. 41\u201350 (2012)","DOI":"10.1109\/WICSA-ECSA.212.12"},{"issue":"8","key":"13_CR9","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1145\/359576.359585","volume":"21","author":"CAR Hoare","year":"1978","unstructured":"Hoare, C.A.R.: Communicating sequential processes. Commun. ACM 21(8), 666\u2013677 (1978)","journal-title":"Commun. ACM"},{"key":"13_CR10","volume-title":"Software Abstractions: Logic, Language, and Analysis","author":"D Jackson","year":"2006","unstructured":"Jackson, D.: Software Abstractions: Logic, Language, and Analysis. The MIT Press, Cambridge (2006)"},{"key":"13_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-540-68265-3_11","volume-title":"Coordination Models and Languages","author":"R Khosravi","year":"2008","unstructured":"Khosravi, R., Sirjani, M., Asoudeh, N., Sahebi, S., Iravanchi, H.: Modeling and analysis of Reo connectors using alloy. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 169\u2013183. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-68265-3_11"},{"issue":"6","key":"13_CR12","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.469759","volume":"12","author":"P Kruchten","year":"1995","unstructured":"Kruchten, P.: Architectural blueprints - the \u201c4+1\u201d view model of software architecture. IEEE Softw. 12(6), 42\u201350 (1995)","journal-title":"IEEE Softw."},{"key":"13_CR13","unstructured":"OMG: CORBA Specification, Version 3.1. Part 3: CORBA Component Model (2008). http:\/\/www.omg.org\/spec\/CCM. Accessed Nov 2009"},{"key":"13_CR14","unstructured":"OMG. OMG Systems Modeling Language (OMG SysML), Version 1.1 (2008). http:\/\/www.omg.org\/spec\/SysML\/1.1\/,. Accessed Jan 2013"},{"key":"13_CR15","unstructured":"OMG: Object Constraint Language (OCL), Version 2.2 (2010). http:\/\/www.omg.org\/spec\/OCL\/2.2. Accessed Jan 2013"},{"key":"13_CR16","unstructured":"OMG: UML profile for Modeling and Analysis of Real-Time and Embedded Systems (MARTE), Version 1.1 (2011). http:\/\/www.omg.org\/spec\/MARTE\/1.1\/. Accessed Jan 2013"},{"key":"13_CR17","unstructured":"OMG: Unified Modeling Language (UML), Version 2.4.1 (2011). http:\/\/www.omg.org\/spec\/UML\/2.4.1. Accessed Jan 2013"},{"key":"13_CR18","unstructured":"OMG: Unified Component Model for Distributed, Real-Time And Embedded Systems, Version 1.0 (2017). http:\/\/www.omg.org\/spec\/UCM\/20170601\/. Accessed Jan 2018"},{"key":"13_CR19","unstructured":"OWASP: Application threat modeling (2017). https:\/\/www.owasp.org\/index.php\/Application_Threat_Modeling. Accessed Dec 2017"},{"key":"13_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/BFb0031987","volume-title":"Real-Time: Theory in Practice","author":"R Alur","year":"1992","unstructured":"Alur, R., Dill, D.: The theory of timed automata. In: de Bakker, J.W., Huizing, C., de Roever, W.P., Rozenberg, G. (eds.) REX 1991. LNCS, vol. 600, pp. 45\u201373. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/BFb0031987"},{"issue":"3","key":"13_CR21","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/1015047.1015049","volume":"3","author":"S Ravi","year":"2004","unstructured":"Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in embedded systems: design challenges. ACM Trans. Embed. Comput. Syst. 3(3), 461\u2013491 (2004)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"13_CR22","volume-title":"Software Architecture: Foundation, Theory, and Practice","author":"RN Taylor","year":"2010","unstructured":"Taylor, R.N., Medvidovic, N.: Software Architecture: Foundation, Theory, and Practice. Wiley, Hoboken (2010)"},{"key":"13_CR23","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.procs.2013.09.263","volume":"20","author":"M Rodano","year":"2013","unstructured":"Rodano, M., Giammarc, K.: A formal method for evaluation of a modeled system architecture. Procedia Comput. Sci. 20, 210\u2013215 (2013)","journal-title":"Procedia Comput. Sci."},{"key":"13_CR24","unstructured":"SAE: Architecture Analysis & Design Language (AADL) (2009). http:\/\/www.sae.org\/technical\/standards\/AS5506A. Accessed Jan 2011"},{"issue":"5","key":"13_CR25","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MS.2003.1231146","volume":"20","author":"B Selic","year":"2003","unstructured":"Selic, B.: The pragmatics of model-driven development. IEEE Softw. 20(5), 19\u201325 (2003)","journal-title":"IEEE Softw."},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Zurawski, R.: Embedded systems in industrial applications - challenges and trends. In: International Symposium on Industrial Embedded Systems (SIES). IEEE (2007)","DOI":"10.1109\/SIES.2007.4297309"}],"container-title":["Lecture Notes in Computer Science","Model and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00856-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T23:09:35Z","timestamp":1571872175000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00856-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030008550","9783030008567"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00856-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"MEDI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Model and Data Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"medi2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/medi2018.uca.ma\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}