{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:11:09Z","timestamp":1743142269309,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031085291"},{"type":"electronic","value":"9783031085307"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08530-7_47","type":"book-chapter","created":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T12:13:00Z","timestamp":1661775180000},"page":"555-567","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Formal Modelling and\u00a0Security Analysis of\u00a0Inter-Operable Systems"],"prefix":"10.1007","author":[{"given":"Abdelhakim","family":"Baouya","sequence":"first","affiliation":[]},{"given":"Samir","family":"Ouchani","sequence":"additional","affiliation":[]},{"given":"Saddek","family":"Bensalem","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,30]]},"reference":[{"key":"47_CR1","unstructured":"Stride threats in BIP. https:\/\/github.com\/hakimuga\/Threat_Modeling_BIP"},{"key":"47_CR2","unstructured":"Amir, P.: The temporal logic of programs. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 46\u201357. IEEE Computer Society, October 1977"},{"key":"47_CR3","unstructured":"Baouya, A., Chehida, S., Bensalem, S., Bozga, M.: Formal modeling and verification of blockchain consensus protocol for IoT systems. In: Proceedings of the 19th International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2020, 22\u201324 September 2020, vol. 327, pp. 330\u2013342. IOS Press (2020)"},{"key":"47_CR4","doi-asserted-by":"crossref","unstructured":"van den Berghe, A., Yskout, K., Scandariato, R., Joosen, W.: A lingua franca for security by design. In: 2018 IEEE Cybersecurity Development (SecDev), pp. 69\u201376 (2018)","DOI":"10.1109\/SecDev.2018.00017"},{"key":"47_CR5","doi-asserted-by":"crossref","unstructured":"Chondamrongkul, N., Sun, J., Warren, I.: PAT approach to architecture behavioural verification, pp. 187\u2013192, July 2019","DOI":"10.18293\/SEKE2019-041"},{"key":"47_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2021.102631","volume":"206","author":"N Chondamrongkul","year":"2021","unstructured":"Chondamrongkul, N., Sun, J., Warren, I.: Formal security analysis for software architecture design: an expressive framework to emerging architectural styles. Sci. Comput. Program. 206, 102631 (2021)","journal-title":"Sci. Comput. Program."},{"key":"47_CR7","doi-asserted-by":"crossref","unstructured":"Crnkovic, I.: Component-based software engineering for embedded systems. In: ICSE 2005, pp. 712\u2013713 (2005)","DOI":"10.1145\/1062455.1062631"},{"key":"47_CR8","doi-asserted-by":"crossref","unstructured":"Hussain, S., Erwin, H., Dunne, P.: Threat modeling using formal methods: a new approach to develop secure web applications. In: 2011 7th International Conference on Emerging Technologies, ICET 2011, September 2011","DOI":"10.1109\/ICET.2011.6048492"},{"key":"47_CR9","unstructured":"Kent, S.: Sherman Kent and the profession of intelligence analysis, center for the study of intelligence, central intelligence agency, p. 55, November 2002. https:\/\/www.cia.gov\/library\/kent-center-occasional-papers\/vol1no5.htm"},{"issue":"6","key":"47_CR10","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/52.469759","volume":"12","author":"P Kruchten","year":"1995","unstructured":"Kruchten, P.: The 4+1 view model of architecture. IEEE Softw. 12(6), 42\u201350 (1995)","journal-title":"IEEE Softw."},{"key":"47_CR11","doi-asserted-by":"crossref","unstructured":"Liu, Y., Sun, J., Dong, J.S.: PAT 3: An extensible architecture for building multi-domain model checkers. In: 22nd ISSRE 2011, pp. 190\u2013199. IEEE (2011)","DOI":"10.1109\/ISSRE.2011.19"},{"key":"47_CR12","unstructured":"McGraw, G.: Software Security: Building Security in. Addison-Wesley Professional Computing Series. Addison-Wesley, United States (2006)"},{"key":"47_CR13","unstructured":"Microsoft, the STRIDE Threat Model: Microsoft corporation (2009). https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)?redirectedfrom=MSDN"},{"key":"47_CR14","doi-asserted-by":"crossref","unstructured":"Nouri, A., Mediouni, B.L., Bozga, M., Combaz, J., Bensalem, S., Legay, A.: Performance evaluation of stochastic real-time systems with the SBIP framework. Int. J. Crit. Comput. Based Syst. 8, 1\u201333 (2018)","DOI":"10.1504\/IJCCBS.2018.096439"},{"key":"47_CR15","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.4304\/jsw.7.7.1488-1495","volume":"7","author":"S Ouchani","year":"2012","unstructured":"Ouchani, S., Jarraya, Y., Ait Mohamed, O., Debbabi, M.: Probabilistic attack scenarios to evaluate policies over communication protocols. J. Softw. 7, 1488\u20131495 (2012)","journal-title":"J. Softw."},{"key":"47_CR16","doi-asserted-by":"crossref","unstructured":"Ouchani, S., Mohamed, O.A., Debbabi, M.: A security risk assessment framework for SysML activity diagrams. In: IEEE 7th International Conference on Software Security and Reliability, pp. 227\u2013236 (2013)","DOI":"10.1109\/SERE.2013.11"},{"key":"47_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102073","volume":"117","author":"Q Rouland","year":"2021","unstructured":"Rouland, Q., Hamid, B., Jaskolka, J.: Specification, detection, and treatment of stride threats for software components: modeling, formal methods, and tool support. J. Syst. Archit. 117, 102073 (2021)","journal-title":"J. Syst. Archit."},{"key":"47_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-41483-6_18","volume-title":"Data and Applications Security and Privacy XXX","author":"D Sgandurra","year":"2016","unstructured":"Sgandurra, D., Karafili, E., Lupu, E.: Formalizing threat models for virtualized systems. In: Ranise, S., Swarup, V. (eds.) DBSec 2016. LNCS, vol. 9766, pp. 251\u2013267. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41483-6_18"},{"key":"47_CR19","unstructured":"U.S. Department of Homeland Security: Common attack pattern enumeration and classification, November 2002. http:\/\/capec.mitre.org"}],"container-title":["Lecture Notes in Computer Science","Advances and Trends in Artificial Intelligence. Theory and Practices in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08530-7_47","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:04:36Z","timestamp":1710259476000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08530-7_47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031085291","9783031085307"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08530-7_47","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"30 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IEA\/AIE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ieaaie2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ieaaie2022.wordpress.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Microsoft CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"127","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}