{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:46:18Z","timestamp":1743014778520,"version":"3.40.3"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030614690"},{"type":"electronic","value":"9783030614706"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-61470-6_18","type":"book-chapter","created":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T18:03:12Z","timestamp":1603735392000},"page":"295-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Capturing Dynamicity and Uncertainty in Security and Trust via Situational Patterns"],"prefix":"10.1007","author":[{"given":"Tomas","family":"Bures","sequence":"first","affiliation":[]},{"given":"Petr","family":"Hnetynka","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Heinrich","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Seifermann","sequence":"additional","affiliation":[]},{"given":"Maximilian","family":"Walter","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,27]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Abreu, V., Santin, A.O., Viegas, E.K., Stihler, M.: A multi-domain role activation model. In: Proceedings of ICC 2017, Paris, France, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICC.2017.7997247"},{"key":"18_CR2","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-030-02852-7_11","volume-title":"New Trends in Model and Data Engineering","author":"M Ahmad","year":"2018","unstructured":"Ahmad, M., Gnaho, C., Bruel, J.-M., Laleau, R.: Towards a requirements engineering approach for capturing uncertainty in cyber-physical systems environment. In: Abdelwahed, E.H., et al. (eds.) MEDI 2018. CCIS, vol. 929, pp. 115\u2013129. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-02852-7_11"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-030-03424-5_12","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Distributed Systems","author":"R Al Ali","year":"2018","unstructured":"Al Ali, R., Bures, T., Hnetynka, P., Krijt, F., Plasil, F., Vinarek, J.: Dynamic security specification through autonomic component ensembles. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11246, pp. 172\u2013185. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-030-03424-5_12"},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/s10009-020-00556-1","volume":"22","author":"R Al Ali","year":"2020","unstructured":"Al Ali, R., Bures, T., Hnetynka, P., Matejek, J., Plasil, F., Vinarek, J.: Toward autonomically composable and context-dependent access control specification through ensembles. Int. J. Softw. Tools Technol. Transfer 22(4), 511\u2013522 (2020). \nhttps:\/\/doi.org\/10.1007\/s10009-020-00556-1","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Al-Ali, R., et al.: Dynamic security rules for legacy systems. In: Proceedings of ECSA 2019 - Volume 2, Paris, France, pp. 277\u2013284. ACM (2019)","DOI":"10.1145\/3344948.3344974"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Anaya, I.D.P., Simko, V., Bourcier, J., Plouzeau, N., J\u00e9z\u00e9quel, J.M.: A prediction-driven adaptation approach for self-adaptive sensor networks. In: Proceedings of SEAMS 2014, Hyderabad, India, pp. 145\u2013154 (2014)","DOI":"10.1145\/2593929.2593941"},{"key":"18_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-319-95729-6_7","volume-title":"Data and Applications Security and Privacy XXXII","author":"L Argento","year":"2018","unstructured":"Argento, L., Margheri, A., Paci, F., Sassone, V., Zannone, N.: Towards adaptive access control. In: Kerschbaum, F., Paraboschi, S. (eds.) DBSec 2018. LNCS, vol. 10980, pp. 99\u2013109. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-95729-6_7"},{"issue":"1","key":"18_CR8","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.ejor.2017.06.036","volume":"264","author":"G Baudry","year":"2018","unstructured":"Baudry, G., Macharis, C., Vall\u00e9e, T.: Range-based multi-actor multi-criteria analysis: a combined method of multi-actor multi-criteria analysis and Monte Carlo simulation to support participatory decision making under uncertainty. Eur. J. Oper. Res. 264(1), 257\u2013269 (2018)","journal-title":"Eur. J. Oper. Res."},{"key":"18_CR9","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"1060","DOI":"10.1007\/978-3-319-77703-0_103","volume-title":"Trends and Advances in Information Systems and Technologies","author":"I Ben Abdelkrim","year":"2018","unstructured":"Ben Abdelkrim, I., Baina, A., Feltus, C., Aubert, J., Bellafkih, M., Khadraoui, D.: Coalition-OrBAC: an agent-based access control model for dynamic coalitions. In: Rocha, \u00c1., Adeli, H., Reis, L.P., Costanzo, S. (eds.) WorldCIST\u201918 2018. AISC, vol. 745, pp. 1060\u20131070. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-77703-0_103"},{"issue":"12","key":"18_CR10","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MC.2016.377","volume":"49","author":"T Bures","year":"2016","unstructured":"Bures, T., Plasil, F., Kit, M., Tuma, P., Hoch, N.: Software abstractions for component interaction in the Internet of Things. Computer 49(12), 50\u201359 (2016)","journal-title":"Computer"},{"issue":"4","key":"18_CR11","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/3282517.3302401","volume":"43","author":"T Bures","year":"2019","unstructured":"Bures, T., Weyns, D., Schmer, B., Fitzgerald, J.: Software engineering for smart cyber-physical systems: models, system-environment boundary, and social aspects. ACM SIGSOFT Softw. Eng. Not. 43(4), 42\u201344 (2019)","journal-title":"ACM SIGSOFT Softw. Eng. Not."},{"volume-title":"Pattern-Oriented Software Architecture: A System of Patterns","year":"1996","key":"18_CR12","unstructured":"Buschmann, F. (ed.): Pattern-Oriented Software Architecture: A System of Patterns. Wiley, Hoboken (1996)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Cheng, P.C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: an experiment on quantified risk-adaptive access control. In: Proceedings of SP 2007, Berkeley, USA, pp. 222\u2013227 (2007)","DOI":"10.1109\/SP.2007.21"},{"issue":"12","key":"18_CR14","doi-asserted-by":"publisher","first-page":"2860","DOI":"10.1016\/j.jss.2012.02.060","volume":"85","author":"SW Cheng","year":"2012","unstructured":"Cheng, S.W., Garlan, D.: Stitch: a language for architecture-based self-adaptation. J. Syst. Softw. 85(12), 2860\u20132875 (2012)","journal-title":"J. Syst. Softw."},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Cotrini, C., Weghorn, T., Basin, D.: Mining ABAC rules from sparse logs. In: Proceedings of EURO S&P 2018, London, UK, pp. 31\u201346 (2018)","DOI":"10.1109\/EuroSP.2018.00011"},{"key":"18_CR16","unstructured":"C\u00e1mara, J., Garlan, D., Kang, W.G., Peng, W., Schmerl, B.R.: Uncertainty in self-adaptive systems categories, management, and perspectives. Report CMU-ISR-17-110, Institute for Software Research School of Computer Science Carnegie Mellon University, Pittsburgh, PA 15213 (2017)"},{"key":"18_CR17","doi-asserted-by":"publisher","unstructured":"De Capitani di Vimercati, S., Samarati, P.: Mandatory access control policy (MAC). In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, p. 758. Springer, Boston (2011). \nhttps:\/\/doi.org\/10.1007\/978-1-4419-5906-5_822","DOI":"10.1007\/978-1-4419-5906-5_822"},{"key":"18_CR18","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, R., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley Professional, Boston (1994)"},{"key":"18_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-35813-5_9","volume-title":"Software Engineering for Self-Adaptive Systems II","author":"N Esfahani","year":"2013","unstructured":"Esfahani, N., Malek, S.: Uncertainty in self-adaptive software systems. In: de Lemos, R., Giese, H., M\u00fcller, H.A., Shaw, M. (eds.) Software Engineering for Self-Adaptive Systems II. LNCS, vol. 7475, pp. 214\u2013238. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-35813-5_9"},{"key":"18_CR20","unstructured":"Fowler, M.: Writing Software Patterns (2006). \nhttps:\/\/www.martinfowler.com\/articles\/writingPatterns.html"},{"issue":"3","key":"18_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2823345","volume":"1","author":"I Gerostathopoulos","year":"2017","unstructured":"Gerostathopoulos, I., Bures, T., Hnetynka, P., Hujecek, A., Plasil, F., Skoda, D.: Strengthening adaptation in cyber-physical systems via meta-adaptation strategies. ACM Trans. Cyber-Phys. Syst. 1(3), 1\u201325 (2017)","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.jss.2018.10.051","volume":"148","author":"I Gerostathopoulos","year":"2019","unstructured":"Gerostathopoulos, I., \u0160koda, D., Pl\u00e1\u0161il, F., Bure\u0161, T., Knauss, A.: Tuning self-adaptation in cyber-physical systems through architectural homeostasis. J. Syst. Softw. 148, 37\u201355 (2019)","journal-title":"J. Syst. Softw."},{"key":"18_CR23","doi-asserted-by":"publisher","first-page":"110722","DOI":"10.1016\/j.jss.2020.110722","volume":"169","author":"R Heinrich","year":"2020","unstructured":"Heinrich, R.: Architectural runtime models for integrating runtime observations and component-based models. J. Syst. Softw. 169, 110722 (2020)","journal-title":"J. Syst. Softw."},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Hnetynka, P., Bures, T., Gerostathopoulos, I., Pacovsky, J.: Using component ensembles for modeling autonomic component collaboration in smart farming. In: Proceedings of SEAMS 2020, Seoul, Republic of Korea (2020)","DOI":"10.1145\/3387939.3391599"},{"issue":"2","key":"18_CR25","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MC.2015.33","volume":"48","author":"VC Hu","year":"2015","unstructured":"Hu, V.C., Kuhn, D.R., Ferraiolo, D.F.: Attribute-based access control. Computer 48(2), 85\u201388 (2015)","journal-title":"Computer"},{"issue":"23","key":"18_CR26","doi-asserted-by":"publisher","first-page":"1547","DOI":"10.1080\/01691864.2014.985335","volume":"28","author":"G Kruijff","year":"2014","unstructured":"Kruijff, G., et al.: Designing, developing, and deploying systems to support human-robot teams in disaster response. Adv. Robot. 28(23), 1547\u20131570 (2014)","journal-title":"Adv. Robot."},{"key":"18_CR27","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.pmcj.2014.09.009","volume":"17","author":"C Krupitzer","year":"2015","unstructured":"Krupitzer, C., Roth, F.M., VanSyckel, S., Schiele, G., Becker, C.: A survey on engineering approaches for self-adaptive systems. Pervasive Mob. Comput. 17, 184\u2013206 (2015)","journal-title":"Pervasive Mob. Comput."},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Latella, D., Loreti, M., Massink, M., Senni, V.: Stochastically timed predicate-based communication primitives for autonomic computing. In: Electronic Proceedings in Theoretical Computer Science, vol. 154, pp. 1\u201316 (2014)","DOI":"10.4204\/EPTCS.154.1"},{"issue":"8","key":"18_CR29","doi-asserted-by":"publisher","first-page":"20570","DOI":"10.3390\/s150820570","volume":"15","author":"X Li","year":"2015","unstructured":"Li, X., Eckert, M., Martinez, J.F., Rubio, G.: Context aware middleware architectures: survey and challenges. Sensors 15(8), 20570\u201320607 (2015)","journal-title":"Sensors"},{"key":"18_CR30","first-page":"1","volume":"6","author":"Y Lu","year":"2017","unstructured":"Lu, Y.: Industry 4.0: a survey on technologies, applications and open research issues. J. Ind. Inf. Integration 6, 1\u201310 (2017)","journal-title":"J. Ind. Inf. Integration"},{"key":"18_CR31","doi-asserted-by":"crossref","unstructured":"Mahdavi-Hezavehi, S., Avgeriou, P., Weyns, D.: A classification framework of uncertainty in architecture-based self-adaptive systems with multiple quality requirements. In: Managing Trade-Offs in Adaptable Software Architectures, pp. 45\u201377. Elsevier (2017)","DOI":"10.1016\/B978-0-12-802855-1.00003-4"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Perez-Palacin, D., Mirandola, R.: Uncertainties in the modeling of self-adaptive systems: a taxonomy and an example of availability evaluation. In: Proceedings of ICPE 2014, Dublin, Ireland, pp. 3\u201314 (2014)","DOI":"10.1145\/2568088.2568095"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Peruma, A., Krutz, D.E.: Security: a critical quality attribute in self-adaptive systems. In: Proceedings of SEAMS 2018, Gothenburg, Sweden, pp. 188\u2013189 (2018)","DOI":"10.1145\/3194133.3194134"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Ramirez, A.J., Jensen, A.C., Cheng, B.H.C.: A taxonomy of uncertainty for dynamically adaptive systems. In: Proceedings of SEAMS 2012, Zurich, Switzerland, pp. 99\u2013108 (2012)","DOI":"10.1109\/SEAMS.2012.6224396"},{"key":"18_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-50230-4_7","volume-title":"Software Technologies: Applications and Foundations","author":"D Reijsbergen","year":"2016","unstructured":"Reijsbergen, D.: Probabilistic modelling of station locations in bicycle-sharing systems. In: Milazzo, P., Varr\u00f3, D., Wimmer, M. (eds.) STAF 2016. LNCS, vol. 9946, pp. 83\u201397. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-50230-4_7"},{"key":"18_CR36","first-page":"49","volume":"44","author":"S Sartoli","year":"2019","unstructured":"Sartoli, S., Namin, A.S.: Modeling adaptive access control policies using answer set programming. J. Inf. Secur. Appl. 44, 49\u201363 (2019)","journal-title":"J. Inf. Secur. Appl."},{"issue":"1","key":"18_CR37","doi-asserted-by":"publisher","first-page":"e1233","DOI":"10.1002\/widm.1233","volume":"8","author":"M Sharif","year":"2018","unstructured":"Sharif, M., Alesheikh, A.A.: Context-aware movement analytics: implications, taxonomy, and design framework: context-aware movement analytics. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 8(1), e1233 (2018)","journal-title":"Wiley Interdiscip. Rev. Data Min. Knowl. Discov."},{"key":"18_CR38","unstructured":"Somenzi, F., Touri, B., Trivedi, A.: Almost-sure reachability in stochastic multi-mode system. \narXiv:1610.05412\n\n (2016)"},{"key":"18_CR39","doi-asserted-by":"crossref","unstructured":"Verma, D., et al.: Generative policy model for autonomic management. In: Proceedings of IEEE SmartWorld 2017, San Francisco, USA, pp. 1\u20136 (2017)","DOI":"10.1109\/UIC-ATC.2017.8397410"},{"key":"18_CR40","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-1-4419-5906-5_817","volume-title":"Encyclopedia of Cryptography and Security","author":"SDC Vimercati","year":"2011","unstructured":"Vimercati, S.D.C.: Discretionary access control policies (DAC). In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 356\u2013358. Springer, Boston (2011). \nhttps:\/\/doi.org\/10.1007\/978-1-4419-5906-5_817"},{"key":"18_CR41","doi-asserted-by":"crossref","unstructured":"Whittle, J., Sawyer, P., Bencomo, N., Cheng, B.H., Bruel, J.M.: RELAX: incorporating uncertainty into the specification of self-adaptive systems. In: Proceedings of RE 2009, Atlanta, USA, pp. 79\u201388 (2009)","DOI":"10.1109\/RE.2009.36"},{"key":"18_CR42","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.ins.2018.02.005","volume":"479","author":"Y Yang","year":"2019","unstructured":"Yang, Y., Zheng, X., Guo, W., Liu, X., Chang, V.: Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf. Sci. 479, 567\u2013592 (2019)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-61470-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T18:10:55Z","timestamp":1603735855000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-61470-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030614690","9783030614706"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-61470-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"27 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISoLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Leveraging Applications of Formal Methods","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isola2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isola-conference.org\/isola2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}