{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:55:13Z","timestamp":1740099313998,"version":"3.37.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030134983"},{"type":"electronic","value":"9783030134990"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-13499-0_9","type":"book-chapter","created":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T06:02:55Z","timestamp":1561528975000},"page":"207-253","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Maintaining Security in Software Evolution"],"prefix":"10.1007","author":[{"given":"Jan","family":"J\u00fcrjens","sequence":"first","affiliation":[]},{"given":"Kurt","family":"Schneider","sequence":"additional","affiliation":[]},{"given":"Jens","family":"B\u00fcrger","sequence":"additional","affiliation":[]},{"given":"Fabien Patrick","family":"Viertel","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Str\u00fcber","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Goedicke","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Reussner","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Heinrich","sequence":"additional","affiliation":[]},{"given":"Emre","family":"Ta\u015fpolato\u011flu","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Konersmann","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Fay","sequence":"additional","affiliation":[]},{"given":"Winfried","family":"Lamersdorf","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Ladiges","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Haubeck","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,27]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"C. Aldrich and Lidia Auret.Unsupervised process monitoring and fault diagnosis with machine learning methods. Advances in computer vision and pattern recognition. London, New York: Springer, 2013.isbn: 1447151852.","DOI":"10.1007\/978-1-4471-5185-2"},{"issue":"1","key":"9_CR2","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1093\/comjnl\/bxq042","volume":"54","author":"A. Bauer","year":"2010","unstructured":"A. Bauer, J. J\u00fcrjens, and Y. Yu. \u201cRun-Time Security Traceability for Evolving Systems\u201d. In:The Computer Journal54.1 (2011), pp. 58\u201387.http:\/\/dx.doi.org\/10.1093\/comjnl\/bxq042.","journal-title":"The Computer Journal"},{"key":"9_CR3","unstructured":"A. Averbakh, K. Niklas, and K. Schneider. \u201cKnowledge from Document Annotations as By-Product in Distributed Software Engineering\u201d. In:The 26th Int. Conf. on Software Eng. and Knowledge Engineering(2014)."},{"issue":"3","key":"9_CR4","doi-asserted-by":"publisher","first-page":"654","DOI":"10.1109\/TSMCA.2011.2170418","volume":"42","author":"Lindsay V. Allen","year":"2012","unstructured":"L. V. Allen and D. M. Tilbury. \u201cAnomaly Detection Using Model Generation for Event-Based Systems Without a Preexisting Formal Model\u201d. In:Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on42.3 (2012), pp. 654\u2013668.issn: 1083\u20134427.\n                  https:\/\/doi.org\/10.1109\/TSMCA.2011.2170418\n                  \n                .","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.jss.2018.02.003","volume":"139","author":"Jens B\u00fcrger","year":"2018","unstructured":"Jens B\u00fcrger et al. \u201cA framework for semi-automated co-evolution of security knowledge and system models\u201d. In:Journal of Systems and Software139 (2018), pp. 142\u2013160.issn: 0164-1212.\n                  https:\/\/doi.org\/10.1016\/j.jss.2018.02.003\n                  \n                .","journal-title":"Journal of Systems and Software"},{"key":"9_CR6","unstructured":"Brian Chess and Gary McGraw. \u201cStatic Analysis for Security\u201d. In:IEEE Security & Privacy2.6 (2004), pp. 76\u201379."},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.976940","volume":"19","author":"D. Evans","year":"2002","unstructured":"David Evans and David Larochelle. \u201cImproving Security using Extensible Lightweight Static Analysis\u201d. In:IEEE Software 19.1 (2002), pp. 42\u201351.","journal-title":"IEEE Software"},{"key":"9_CR8","unstructured":"Stefan G\u00e4rtner. \u201cHeuristische und wissensbasierte Sicherheitspr\u00fcfung von Softwareentwicklungsartefakten basierend auf nat\u00fcrlichsprachlichen Informationen\u201d. PhD thesis. 2016."},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"C. Haubeck et al. \u201cAn active service-component architecture to enable self-awareness of evolving production systems\u201d. In:IEEE International Conference on Emerging Technology and Factory Automation (ETFA). 2014.\n                  https:\/\/doi.org\/10.1109\/ETFA.2014.7005157\n                  \n                .","DOI":"10.1109\/ETFA.2014.7005157"},{"issue":"7","key":"9_CR10","doi-asserted-by":"publisher","first-page":"1199","DOI":"10.1109\/TAC.2003.814099","volume":"48","author":"S.H. Zad","year":"2003","unstructured":"S. Hashtrudi Zad, R. H. Kwong, and W. M. Wonham. \u201cFault diagnosis in discreteevent systems: framework and model reduction\u201d. In:IEEE Transactions on Automatic Control 48.7 (2003), pp. 1199\u20131212.\n                  https:\/\/doi.org\/10.1109\/TAC.2003.814099\n                  \n                .","journal-title":"IEEE Transactions on Automatic Control"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-319-91764-1_22","volume-title":"Service-Oriented Computing \u2013 ICSOC 2017 Workshops","author":"Christopher Haubeck","year":"2018","unstructured":"Christopher Haubeck, Winfried Lamersdorf, and Alexander Fay. \u201cA Knowledge Carrying Service-Component Architecture for Smart Cyber Physical Systems: An Example based on self-documenting production systems\u201d. In:International Workshop on Engineering Service-Oriented Applications and Cloud Services, in conjunction with ICSOC. 2018."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Rolf Isermann.Fault-Diagnosis Systems: An Introduction from Fault Detection to Fault Tolerance. Berlin and Heidelberg: Springer-Verlag Berlin Heidelberg, 2006.isbn: 3540241124.url:\n                  http:\/\/dx.doi.org\/10.1007\/3-540-30368-5\n                  \n                .","DOI":"10.1007\/3-540-30368-5"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"J. B\u00fcrger et al. \u201cRestoring Security of Long-Living Systems by Co-Evolution\u201d. In:39th Annual IEEE Computer Software and Applications Conf. (COMPSAC 2015). 6 pp. IEEE Computer Soc. 2015.","DOI":"10.1109\/COMPSAC.2015.72"},{"key":"9_CR14","unstructured":"J. B\u00fcrger, J. J\u00fcrjens, and S.Wenzel. \u201cRestoring Security of Evolving Software Models using Graph-Transformation\u201d. In:Int. Journal on Software Tools for Technology Transfer (STTT) (2015). Springer Online First.\n                  https:\/\/doi.org\/10.1007\/s1000901403648\n                  \n                ."},{"key":"9_CR15","unstructured":"Marco Konersmann. \u201cA Process for Explicitly Integrated Software Architecture\u201d. In:Softwaretechnik-Trends 36.2 (2016). ISSN: 0720\u20138928.url:\n                  http:\/\/pi.informatik.uni-siegen.de\/stt\/36_2\/01_Fachgruppenberichte\/WSRE2016\/WSRE2016_24_DFF_2016_paper_4.pdf\n                  \n                ."},{"key":"9_CR16","unstructured":"Marco Konersmann. \u201cExplicitly Integrated Architecture - An Approach for Integrating Software Architecture Model Information with Program Code\u201d. PhD thesis. University of Duisburg-Essen, Mar. 2018."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"L. Montrieux et al. \u201cTool Support for Code Generation from a UMLsec Property\u201d. In:25th IEEE\/ACM Int. Conf. on Automated Software Eng. (ASE\u201910). 2010.\n                  http:\/\/doi.acm.org\/10.1145\/1858996.1859074\n                  \n                .","DOI":"10.1145\/1858996.1859074"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"J. Ladiges et al. \u201cEvolution of Production Facilities and its Impact on Non-Functional Requirements\u201d. In:IEEE International Conference on Industrial Informatics (INDIN). 2013.","DOI":"10.1109\/INDIN.2013.6622886"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Jan Ladiges et al. \u201cEvolution Management of Production Facilities by Semi-Automated Requirement Verification\u201d. In:at - Automatisierungstechnik. Vol. 62. 11. Berlin, Oct. 2014, pp. 781\u2013793.","DOI":"10.1515\/auto-2014-1100"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"J. Ladiges et al. \u201cSupporting Commissioning of Production Plants by Model-Based Testing and Model Learning\u201d. In:International Symposium on Industrial Electronics (ISIE). 2015.","DOI":"10.1109\/ISIE.2015.7281537"},{"issue":"2","key":"9_CR21","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s40903-016-0048-7","volume":"2","author":"Jan Ladiges","year":"2016","unstructured":"Jan Ladiges, Alexander Fay, and Winfried Lamersdorf. \u201cAutomated Determining of Manufacturing Properties and Their Evolutionary Changes from Event Traces\u201d. In:Intelligent Industrial Systems2.2 (2016), pp. 163\u2013178.issn: 2199-854X.url:\n                  http:\/\/dx.doi.org\/10.1007\/s40903-016-0048-7\n                  \n                .","journal-title":"Intelligent Industrial Systems"},{"issue":"2","key":"9_CR22","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1109\/TSMCA.2010.2058102","volume":"41","author":"Dimitri Lefebvre","year":"2011","unstructured":"D. Lefebvre and E. Leclercq. \u201cStochastic Petri Net Identification for the Fault Detection and Isolation of Discrete Event Systems\u201d. In:IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans41.2 (2011), pp. 213\u2013225.\n                  https:\/\/doi.org\/10.1109\/TSMCA.2010.2058102\n                  \n                .","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"},{"key":"9_CR23","unstructured":"Heiko Mantel. \u201cA Uniform Framework for the Formal Specification and Verification of Information Flow Security\u201d. In: (2003)."},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Gail C. Murphy et al. \u201cAn Empirical Study of Static Call Graph Extractors\u201d. In:ACM Transactions on Software Engineering and Methodology (TOSEM)7.2 (1998), pp. 158\u2013191.","DOI":"10.1145\/279310.279314"},{"key":"9_CR25","doi-asserted-by":"publisher","unstructured":"Oliver Niggemann and Christian Frey. \u201cData-driven anomaly detection in cyberphysical production systems\u201d. In:at - Automatisierungstechnik 63.10 (2015).issn: 0178-2312.\n                  https:\/\/doi.org\/10.1515\/auto-2015-0060\n                  \n                .","DOI":"10.1515\/auto-2015-0060"},{"key":"9_CR26","unstructured":"Object Management Group.OMG Meta Object Facility (MOF) Core Specification, Version 2.5.1. Object Management Group (OMG), Nov. 2016.url:\n                  http:\/\/www.omg.org\/spec\/MOF\/2.5.1\n                  \n                ."},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"I. Omoronyia et al. \u201cCaprice: a tool for engineering adaptive privacy\u201d. In:Proc. of the 27th IEEE\/ACM Int. Conf. on Automated Software Eng. - ASE 2012 (2012), p. 354.\n                  https:\/\/doi.org\/10.1145\/2351676.2351745\n                  \n                .url:\n                  http:\/\/dl.acm.org\/citation.cfm?doid=2351676.2351745\n                  \n                .","DOI":"10.1145\/2351676.2351745"},{"key":"9_CR28","doi-asserted-by":"publisher","unstructured":"I. Omoronyia et al. \u201cEngineering adaptive privacy: On the role of privacy awareness requirements\u201d. In:Proc. - Int. Conf. on Software Engineering(2013), pp. 632\u2013641.issn: 02705257.\n                  https:\/\/doi.org\/10.1109\/ICSE.2013.6606609\n                  \n                .","DOI":"10.1109\/ICSE.2013.6606609"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"R. Pham et al. \u201cTailoring video recording to support efficient GUI testing and debugging\u201d. In:Software Quality Journal(June 2013), pp. 1\u201320.url:\n                  http:\/\/dx.doi.org\/10.1007\/s11219-013-9206-2\n                  \n                .","DOI":"10.1007\/s11219-013-9206-2"},{"key":"9_CR30","doi-asserted-by":"publisher","unstructured":"T. Ruhroth and J. J\u00fcrjens. \u201cSupporting Security Assurance in the Context of Evolution: Modular Modeling and Analysis with UMLsec\u201d. In: IEEE: 14th Int. Symp. on High-Assurance Systems Eng. (HASE 2012). IEEE CS, Oct. 2012.\n                  https:\/\/doi.org\/10.1109\/HASE.2012.35\n                  \n                .","DOI":"10.1109\/HASE.2012.35"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"M. Roth, J.-J Lesage, and L. Litz. \u201cBlack-box identification of discrete event systems with optimal partitioning of concurrent subsystems\u201d. In:American Control Conference (ACC). 2010.","DOI":"10.1109\/ACC.2010.5530540"},{"key":"9_CR32","first-page":"239","volume-title":"Product-Focused Software Process Improvement","author":"Thomas Ruhroth","year":"2014","unstructured":"T. Ruhroth et al. \u201cTowards Adaptation and Evolution of Domain-specific Knowledge for Maintaining Secure Systems\u201d. In:15th Int. Conf. of Product Focused Software Development and Process Improvement (Profes\u201914). Vol. 8892. LNCS. Springer, 2014, pp. 239\u2013253.\n                  https:\/\/doi.org\/10.1007\/978-3-319-13835-0_17\n                  \n                ."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Kurt Schneider. \u201cRationale as a By-Product\u201d. In:Rationale Management in Software Engineering. Ed. by Allen H. Dutoit et al. Springer-Verlag Berlin Heidelberg, 2006, pp. 91\u2013109.isbn: 978-3-540-30997-0.\n                  https:\/\/doi.org\/10.1007\/978-3-540-30998-7_4\n                  \n                .","DOI":"10.1007\/978-3-540-30998-7_4"},{"key":"9_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-95880-2","volume-title":"Experience and Knowledge Management in Software Engineering","author":"Kurt Schneider","year":"2009","unstructured":"Kurt Schneider.Experience and Knowledge Management in Software Engineering. Springer-Verlag, 2009."},{"key":"9_CR35","unstructured":"Fabien Patrick Viertel, Oiver Karras, and Schneider Kurt. \u201cVulnerability Recognition by Execution Trace Difierentiation\u201d. In:2017 ACM\/IEEE International Symposium on Software Performance (SSP), Karlsruhe. Software Technik Trends, 2017."},{"key":"9_CR36","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.jss.2015.08.026","volume":"110","author":"Birgit Vogel-Heuser","year":"2015","unstructured":"Birgit Vogel-Heuser et al. \u201cEvolution of software in automated production systems: Challenges and Research Directions\u201d. In:Journal of Systems and Software 110 (2015), pp. 54\u201384.issn: 0164-1212.","journal-title":"Journal of Systems and Software"}],"container-title":["Managed Software Evolution"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-13499-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,26]],"date-time":"2019-06-26T06:31:51Z","timestamp":1561530711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-13499-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030134983","9783030134990"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-13499-0_9","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"27 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}