{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:34Z","timestamp":1740099274577,"version":"3.37.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030047702"},{"type":"electronic","value":"9783030047719"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04771-9_47","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T22:02:53Z","timestamp":1544047373000},"page":"617-632","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Specification of Information Flow Security Policies in Model-Based Systems Engineering"],"prefix":"10.1007","author":[{"given":"Christopher","family":"Gerking","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"issue":"1","key":"47_CR1","first-page":"111","volume":"38","author":"K Alghathbar","year":"2006","unstructured":"Alghathbar, K., Farkas, C., Wijesekera, D.: Securing UML information flow using FlowUML. J. Res. Pract. Inf. Technol. 38(1), 111 (2006)","journal-title":"J. Res. Pract. Inf. Technol."},{"issue":"2","key":"47_CR2","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0304-3975(94)90010-8","volume":"126","author":"R Alur","year":"1994","unstructured":"Alur, R., Dill, D.L.: A theory of timed automata. Theor. Comput. Sci. 126(2), 183\u2013235 (1994)","journal-title":"Theor. Comput. Sci."},{"key":"47_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-319-27869-8_17","volume-title":"Model-Driven Engineering and Software Development","author":"L Apvrille","year":"2015","unstructured":"Apvrille, L., Roudier, Y.: Designing safe and secure embedded and cyber-physical systems with SysML-Sec. In: Desfray, P., Filipe, J., Hammoudi, S., Pires, L.F. (eds.) MODELSWARD 2015. CCIS, vol. 580, pp. 293\u2013308. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27869-8_17"},{"key":"47_CR4","unstructured":"Bauerei\u00df, et al.: RIFL 1.1: a common specification language for information-flow requirements. Technical report TUD-CS-2017-0225, TU Darmstadt (2017)"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Belloir, N., Chiprianov, V., Ahmad, M., Munier, M., Gallon, L., Bruel, J.: Using relax operators into an MDE security requirement elicitation process for systems of systems. In: ECSA Workshops, pp. 32:1\u201332:4. ACM (2014)","DOI":"10.1145\/2642803.2642835"},{"key":"47_CR6","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Prakash, A., Shafique, M.: Secure cyber-physical systems: Current trends, tools and open research problems. In: DATE 2017. pp. 1104\u20131109. IEEE (2017)","DOI":"10.23919\/DATE.2017.7927154"},{"key":"47_CR7","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-642-45435-6_4","volume-title":"Lecture Notes in Mechanical Engineering","author":"Harald Anacker","year":"2014","unstructured":"Dorociak, R., Dumitrescu, R., Gausemeier, J., Iwanek, P.: Specification technique consens for the description of self-optimizing systems. In: Gausemeier, J., Rammig, F., Sch\u00e4fer, W. (eds.) Design Methodology for Intelligent Technical Systems, chap. 4.1, pp. 119\u2013127. LNME. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-45435-6_4"},{"issue":"1","key":"47_CR8","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/s00766-009-0092-x","volume":"15","author":"B Fabian","year":"2010","unstructured":"Fabian, B., G\u00fcrses, S.F., Heisel, M., Santen, T., Schmidt, H.: A comparison of security requirements engineering methods. Requir. Eng. 15(1), 7\u201340 (2010)","journal-title":"Requir. Eng."},{"key":"47_CR9","unstructured":"Gausemeier, J., Sch\u00e4fer, W., Greenyer, J., Kahl, S., Pook, S., Rieke, J.: Management of cross-domain model consistency during the development of advanced mechatronic systems. In: ICED 2009, pp. 6:1\u20136:12. Design Society (2009)"},{"key":"47_CR10","doi-asserted-by":"crossref","unstructured":"Geismann, J., Gerking, C., Bodden, E.: Towards ensuring security by design in cyber-physical systems engineering processes. In: ICSSP 2018 (2018)","DOI":"10.1145\/3202710.3203159"},{"key":"47_CR11","unstructured":"Gerking, C.: Traceability of information flow requirements in cyber-physical systems engineering. In: DS@MoDELS. CEUR Workshop Proceedings, vol. 1735 (2016)"},{"key":"47_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-030-00761-4_10","volume-title":"Software Architecture","author":"C Gerking","year":"2018","unstructured":"Gerking, C., Schubert, D.: Towards preserving information flow security on architectural composition of cyber-physical systems. In: Cuesta, C.E., Garlan, D., P\u00e9rez, J. (eds.) ECSA 2018. LNCS, vol. 11048, pp. 147\u2013155. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00761-4_10"},{"key":"47_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-319-94496-8_3","volume-title":"Engineering Secure Software and Systems","author":"C Gerking","year":"2018","unstructured":"Gerking, C., Schubert, D., Bodden, E.: Model checking the information flow security of real-time systems. In: Payer, M., Rashid, A., Such, J.M. (eds.) ESSoS 2018. LNCS, vol. 10953, pp. 27\u201343. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-94496-8_3"},{"issue":"4","key":"47_CR14","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MDAT.2017.2709310","volume":"34","author":"J Giraldo","year":"2017","unstructured":"Giraldo, J., Sarkar, E., C\u00e1rdenas, A., Maniatakos, M., Kantarcioglu, M.: Security and privacy in cyber-physical systems: a survey of surveys. IEEE Des. Test 34(4), 7\u201317 (2017)","journal-title":"IEEE Des. Test"},{"issue":"8","key":"47_CR15","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1016\/j.jss.2007.11.716","volume":"81","author":"L Grunske","year":"2008","unstructured":"Grunske, L., Joyce, D.: Quantitative risk-based security prediction for component-based systems with explicitly modeled attack profiles. J. Syst. Softw. 81(8), 1327\u20131345 (2008)","journal-title":"J. Syst. Softw."},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Hachem, J.E., Khalil, T.A., Chiprianov, V., Babar, A., Aniort\u00e9, P.: A model driven method to design and analyze secure architectures of systems-of-systems. In: ICECCS 2017, pp. 166\u2013169. IEEE Computer Society (2017)","DOI":"10.1109\/ICECCS.2017.31"},{"key":"47_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-642-19811-3_17","volume-title":"Fundamental Approaches to Software Engineering","author":"D Hatebur","year":"2011","unstructured":"Hatebur, D., Heisel, M., J\u00fcrjens, J., Schmidt, H.: Systematic development of UMLsec design models based on security requirements. In: Giannakopoulou, D., Orejas, F. (eds.) FASE 2011. LNCS, vol. 6603, pp. 232\u2013246. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19811-3_17"},{"issue":"2","key":"47_CR18","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s10270-012-0263-y","volume":"13","author":"B Hoisl","year":"2014","unstructured":"Hoisl, B., Sobernig, S., Strembeck, M.: Modeling and enforcing secure object flows in process-driven SOAs: an integrated model-driven approach. Softw. Syst. Model. 13(2), 513\u2013548 (2014)","journal-title":"Softw. Syst. Model."},{"issue":"1","key":"47_CR19","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s00766-009-0093-9","volume":"15","author":"SH Houmb","year":"2010","unstructured":"Houmb, S.H., Islam, S., Knauss, E., J\u00fcrjens, J., Schneider, K.: Eliciting security requirements and tracing them to design: an integration of common criteria, heuristics, and UMLsec. Requir. Eng. 15(1), 63\u201393 (2010)","journal-title":"Requir. Eng."},{"key":"47_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/b137706","volume-title":"Secure Systems Development with UML","author":"J J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/b137706"},{"key":"47_CR21","doi-asserted-by":"crossref","unstructured":"Katkalov, K., Stenzel, K., Borek, M., Reif, W.: Modeling information flow properties with UML. In: NTMS 2015. IEEE (2015)","DOI":"10.1109\/NTMS.2015.7266507"},{"key":"47_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-319-65127-9_4","volume-title":"Computer Network Security","author":"L Lemaire","year":"2017","unstructured":"Lemaire, L., Vossaert, J., De Decker, B., Naessens, V.: Extending FAST-CPS for the analysis of data flows in cyber-physical systems. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 37\u201349. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-65127-9_4"},{"key":"47_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/3-540-45251-6_9","volume-title":"FME 2001: Formal Methods for Increasing Software Productivity","author":"H Mantel","year":"2001","unstructured":"Mantel, H.: Information flow control and applications \u2014 bridging a gap. In: Oliveira, J.N., Zave, P. (eds.) FME 2001. LNCS, vol. 2021, pp. 153\u2013172. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45251-6_9"},{"key":"47_CR24","doi-asserted-by":"crossref","unstructured":"Mantel, H.: On the composition of secure systems. In: S&P 2002, pp. 88\u2013101. IEEE (2002)","DOI":"10.1109\/SECPRI.2002.1004364"},{"key":"47_CR25","doi-asserted-by":"crossref","first-page":"605","DOI":"10.1007\/978-1-4419-5906-5_874","volume-title":"Encyclopedia of Cryptography and Security","author":"H Mantel","year":"2011","unstructured":"Mantel, H.: Information flow and noninterference. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 605\u2013607. Springer, Heidelberg (2011)"},{"issue":"4","key":"47_CR26","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.csi.2010.01.006","volume":"32","author":"D Mellado","year":"2010","unstructured":"Mellado, D., Blanco, C., Sanchez, L.E., Fern\u00e1ndez-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32(4), 153\u2013165 (2010)","journal-title":"Comput. Stand. Interfaces"},{"key":"47_CR27","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.csi.2016.10.001","volume":"50","author":"NM Mohammed","year":"2017","unstructured":"Mohammed, N.M., Niazi, M., Alshayeb, M., Mahmood, S.: Exploring software security approaches in software development lifecycle: a systematic mapping study. Comput. Stand. Interfaces 50, 107\u2013115 (2017)","journal-title":"Comput. Stand. Interfaces"},{"key":"47_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/3-540-45017-3_7","volume-title":"Advanced Information Systems Engineering","author":"H Mouratidis","year":"2003","unstructured":"Mouratidis, H., Giorgini, P., Manson, G.: Integrating security and systems engineering: towards the modelling of secure information systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 63\u201378. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-45017-3_7"},{"key":"47_CR29","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.infsof.2015.08.006","volume":"68","author":"PH Nguyen","year":"2015","unstructured":"Nguyen, P.H., Kramer, M.E., Klein, J., Traon, Y.L.: An extensive systematic review on the model-driven development of secure systems. Inf. Softw. Technol. 68, 62\u201381 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"47_CR30","unstructured":"Object Management Group: OMG System Modeling Language, May 2017. https:\/\/www.omg.org\/spec\/SysML"},{"issue":"7","key":"47_CR31","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1007\/s00607-015-0445-x","volume":"97","author":"S Ouchani","year":"2015","unstructured":"Ouchani, S., Debbabi, M.: Specification, verification, and quantification of security in model-based systems. Computing 97(7), 691\u2013711 (2015)","journal-title":"Computing"},{"issue":"1","key":"47_CR32","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TSMCC.2011.2106495","volume":"42","author":"AL Ramos","year":"2012","unstructured":"Ramos, A.L., Ferreira, J.V., Barcel\u00f3, J.: Model-based systems engineering: an emerging approach for modern systems. IEEE Trans. Syst. Man Cybern. 42(1), 101\u2013111 (2012)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"10","key":"47_CR33","doi-asserted-by":"publisher","first-page":"2328","DOI":"10.1093\/comjnl\/bxu152","volume":"58","author":"JF Ruiz","year":"2015","unstructured":"Ruiz, J.F., Ma\u00f1a, A., Rudolph, C.: An integrated security and systems engineering process and modelling framework. Comput. J. 58(10), 2328\u20132350 (2015)","journal-title":"Comput. J."},{"issue":"6","key":"47_CR34","doi-asserted-by":"publisher","first-page":"1785","DOI":"10.1016\/j.compeleceng.2012.08.008","volume":"38","author":"P Salini","year":"2012","unstructured":"Salini, P., Kanmani, S.: Survey and analysis on security requirements engineering. Comput. Electr. Eng. 38(6), 1785\u20131797 (2012)","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"47_CR35","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10270-008-0102-3","volume":"8","author":"F Seehusen","year":"2009","unstructured":"Seehusen, F., Solhaug, B., St\u00f8len, K.: Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies. Softw. Syst. Model. 8(1), 45\u201365 (2009)","journal-title":"Softw. Syst. Model."},{"key":"47_CR36","doi-asserted-by":"crossref","unstructured":"Steward, C., et al.: Software security: The dangerous afterthought. In: ITNG 2012, pp. 815\u2013818. IEEE Computer Society (2012)","DOI":"10.1109\/ITNG.2012.60"},{"issue":"1","key":"47_CR37","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MS.2008.19","volume":"25","author":"IA T\u00f8ndel","year":"2008","unstructured":"T\u00f8ndel, I.A., Jaatun, M.G., Meland, P.H.: Security requirements for the rest of us: a survey. IEEE Softw. 25(1), 20\u201327 (2008)","journal-title":"IEEE Softw."},{"key":"47_CR38","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.jss.2018.06.073","volume":"144","author":"K Tuma","year":"2018","unstructured":"Tuma, K., Calikli, G., Scandariato, R.: Threat analysis of software systems: a systematic literature review. J. Syst. Softw. 144, 275\u2013294 (2018)","journal-title":"J. Syst. Softw."},{"key":"47_CR39","doi-asserted-by":"crossref","unstructured":"T\u00fcrpe, S.: The trouble with security requirements. In: RE 2017, pp. 122\u2013133. IEEE Computer Society (2017)","DOI":"10.1109\/RE.2017.13"},{"issue":"20","key":"47_CR40","first-page":"2920","volume":"18","author":"AV Uzunov","year":"2012","unstructured":"Uzunov, A.V., Fern\u00e1ndez, E.B., Falkner, K.: Engineering security into distributed systems: a survey of methodologies. J. Univers. Comput. Sci. 18(20), 2920\u20133006 (2012)","journal-title":"J. Univers. Comput. Sci."},{"key":"47_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-319-24255-2_25","volume-title":"Computer Safety, Reliability, and Security","author":"M Vasilevskaya","year":"2015","unstructured":"Vasilevskaya, M., Nadjm-Tehrani, S.: Quantifying risks to data assets using formal metrics in embedded system design. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9337, pp. 347\u2013361. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24255-2_25"}],"container-title":["Lecture Notes in Computer Science","Software Technologies: Applications and Foundations"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04771-9_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T21:16:21Z","timestamp":1694466981000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04771-9_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030047702","9783030047719"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04771-9_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"STAF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Federation of International Conferences on Software Technologies: Applications and Foundations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"staf2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.staf2018.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}