{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T05:49:47Z","timestamp":1762062587020,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031151156"},{"type":"electronic","value":"9783031151163"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15116-3_14","type":"book-chapter","created":{"date-parts":[[2022,8,18]],"date-time":"2022-08-18T17:17:53Z","timestamp":1660843073000},"page":"309-332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Architectural Optimization for\u00a0Confidentiality Under Structural Uncertainty"],"prefix":"10.1007","author":[{"given":"Maximilian","family":"Walter","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Hahner","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Seifermann","sequence":"additional","affiliation":[]},{"given":"Tomas","family":"Bures","sequence":"additional","affiliation":[]},{"given":"Petr","family":"Hnetynka","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Pacovsk\u00fd","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Heinrich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,19]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Aleti, A., Bjornander, S., Grunske, L., Meedeniya, I.: ArcheOpterix: an extendable tool for architecture optimization of AADL models. In: ICSE Workshop on Model-Based Methodologies for Pervasive and Embedded Software, pp. 61\u201371 (2009). https:\/\/doi.org\/10.1109\/MOMPES.2009.5069138","DOI":"10.1109\/MOMPES.2009.5069138"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Armour, P.G.: The five orders of ignorance. Commun. ACM 43(10), 17\u201320 (2000). https:\/\/doi.org\/10.1145\/352183.352194","DOI":"10.1145\/352183.352194"},{"key":"14_CR3","unstructured":"Basili, G., Caldiera, V.R., Rombach, H.D.: The goal question metric approach. Encycl. Softw. Eng. pp. 528\u2013532 (1994)"},{"issue":"1","key":"14_CR4","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/2.962984","volume":"34","author":"B Boehm","year":"2001","unstructured":"Boehm, B., Basili, V.: Software defect reduction top 10 list. Computer 34(1), 135\u2013137 (2001). https:\/\/doi.org\/10.1109\/2.962984","journal-title":"Computer"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Boltz, N., et al.: Handling environmental uncertainty in design time access control analysis. In: 2022 48th Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE (2022, accepted, to appear)","DOI":"10.1109\/SEAA56994.2022.00067"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-030-61470-6_18","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation: Engineering Principles","author":"T Bures","year":"2020","unstructured":"Bures, T., Hnetynka, P., Heinrich, R., Seifermann, S., Walter, M.: Capturing dynamicity and uncertainty in security and trust via situational patterns. In: Margaria, T., Steffen, B. (eds.) ISoLA 2020. LNCS, vol. 12477, pp. 295\u2013310. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-61470-6_18"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Bure\u0161, T., Gerostathopoulos, I., Hn\u011btynka, P., Seifermann, S., Walter, M., Heinrich, R.: Aspect-oriented adaptation of access control rules. In: 2021 47th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), pp. 363\u2013370 (2021). https:\/\/doi.org\/10.1109\/SEAA53835.2021.00054","DOI":"10.1109\/SEAA53835.2021.00054"},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Busch, A., Schneider, Y., Koziolek, A., Rostami, K., Kienzle, J.: Modelling the structure of reusable solutions for architecture-based quality evaluation. In: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), pp. 521\u2013526 (2016). https:\/\/doi.org\/10.1109\/CloudCom.2016.0091","DOI":"10.1109\/CloudCom.2016.0091"},{"issue":"1","key":"14_CR9","first-page":"150","volume":"11","author":"V Casola","year":"2005","unstructured":"Casola, V., Preziosi, R., Rak, M., Troiano, L.: A reference model for security level evaluation: policy and fuzzy techniques. J. Univers. Comput. Sci. 11(1), 150\u2013174 (2005)","journal-title":"J. Univers. Comput. Sci."},{"key":"14_CR10","unstructured":"Council of European Union: REGULATION (EU) 2016\/679. (general data protection regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/2016-05-04"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-35813-5_9","volume-title":"Software Engineering for Self-Adaptive Systems II","author":"N Esfahani","year":"2013","unstructured":"Esfahani, N., Malek, S.: Uncertainty in self-adaptive software systems. In: de Lemos, R., Giese, H., M\u00fcller, H.A., Shaw, M. (eds.) Software Engineering for Self-Adaptive Systems II. LNCS, vol. 7475, pp. 214\u2013238. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35813-5_9"},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"Esfahani, N., Malek, S., Razavi, K.: GuideArch: guiding the exploration of architectural solution space under uncertainty. In: 2013 35th International Conference on Software Engineering (ICSE), pp. 43\u201352. IEEE (2013). https:\/\/doi.org\/10.1109\/ICSE.2013.6606550, https:\/\/ieeexplore.ieee.org\/document\/6606550","DOI":"10.1109\/ICSE.2013.6606550"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Famelis, M., Chechik, M.: Managing design-time uncertainty. In: MODELS, p. 179. IEEE Press (2017). https:\/\/doi.org\/10.1109\/MODELS.2017.24","DOI":"10.1109\/MODELS.2017.24"},{"key":"14_CR14","unstructured":"Ferraiolo, D., Cugini, J., Kuhn, D.R.: Role-based access control (RBAC): features and motivations. In: ACSAC 1995, pp. 241\u2013248 (1995)"},{"key":"14_CR15","volume-title":"A language for quality of service specification","author":"S Frolund","year":"1998","unstructured":"Frolund, S., Koistinen, J.: A language for quality of service specification. Tech. rep, HP Labs Technical Report, California, USA (1998)"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Garlan, D.: Software engineering in an uncertain world. In: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research, FoSER 2010, pp. 125\u2013128. Association for Computing Machinery, New York, NY, USA (2010). https:\/\/doi.org\/10.1145\/1882362.1882389","DOI":"10.1145\/1882362.1882389"},{"key":"14_CR17","doi-asserted-by":"publisher","unstructured":"Gerking, C., Schubert, D.: Component-based refinement and verification of information-flow security policies for cyber-physical microservice architectures. In: ICSA2019, pp. 61\u201370. IEEE, March 2019. https:\/\/doi.org\/10.1109\/ICSA.2019.00015, https:\/\/ieeexplore.ieee.org\/document\/8703909","DOI":"10.1109\/ICSA.2019.00015"},{"key":"14_CR18","unstructured":"Hahner, S.: Architectural access control policy refinement and verification under uncertainty. In: Companion Proceedings of the 15th European Conference on Software Architecture. CEUR Workshop Proceedings, vol. 2978. RWTH Aachen (2021), 46.23.03; LK 01"},{"key":"14_CR19","unstructured":"Hahner, S.: Dealing with uncertainty in architectural confidentiality analysis. In: Proceedings of the Software Engineering 2021 Satellite Events. pp. 1\u20136. Gesellschaft f\u00fcr Informatik, Virtual (2021)"},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Hahner, S., Seifermann, S., Heinrich, R., Walter, M., Bures, T., Hnetynka, P.: Modeling data flow constraints for design-time confidentiality analyses. In: 2021 IEEE International Conference on Software Architecture Companion (ICSA-C), pp. 15\u201321. IEEE (2021). https:\/\/doi.org\/10.1109\/ICSA-C52384.2021.00009","DOI":"10.1109\/ICSA-C52384.2021.00009"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Heinrich, R., et al.: Dynamic access control in industry 4.0 systems. In: Digital Transformation, Chap. 6. Springer, Heidelberg (2022, accepted, to appear)","DOI":"10.1007\/978-3-662-65004-2_6"},{"key":"14_CR22","doi-asserted-by":"publisher","unstructured":"Hezavehi, S.M., Weyns, D., Avgeriou, P., Calinescu, R., Mirandola, R., Perez-Palacin, D.: Uncertainty in self-adaptive systems: a research community perspective. ACM Trans. Auton. Adapt. Syst. 15(4) (2021). https:\/\/doi.org\/10.1145\/3487921","DOI":"10.1145\/3487921"},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/11691372_29","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A Hinton","year":"2006","unstructured":"Hinton, A., Kwiatkowska, M., Norman, G., Parker, D.: PRISM: a tool for automatic verification of probabilistic systems. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006. LNCS, vol. 3920, pp. 441\u2013444. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11691372_29"},{"key":"14_CR24","unstructured":"ISO Central Secretary: Information technology - security techniques - information security management systems - overview and vocabulary. Standard ISO\/IEC 27000:2018. International Organization for Standardization, Geneva, CH (2018). https:\/\/www.iso.org\/standard\/73906.html"},{"key":"14_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"2002 \u2014 The Unified Modeling Language","author":"J J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412\u2013425. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45800-X_32"},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"Katkalov, K., Stenzel, K., Borek, M., Reif, W.: Model-driven development of information flow-secure systems with IFLOW. In: SOCIALCOM, pp. 51\u201356 (2013). https:\/\/doi.org\/10.1109\/SocialCom.2013.14","DOI":"10.1109\/SocialCom.2013.14"},{"key":"14_CR27","unstructured":"Katkalov, K.: Ein modellgetriebener Ansatz zur Entwicklung informationsfluss-sicherer Systeme. doctoralthesis, Universit\u00e4t Augsburg (2017)"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Konersmann, M., et al.: Evaluation methods and replicability of software architecture research objects. In: ICSA. IEEE (2022)","DOI":"10.1109\/ICSA53651.2022.00023"},{"key":"14_CR29","doi-asserted-by":"publisher","unstructured":"Koziolek, A.: Automated improvement of software architecture models for performance and other quality attributes. Ph.D. thesis, Karlsruher Institut f\u00fcr Technologie (KIT) (2011). https:\/\/doi.org\/10.5445\/IR\/1000024955","DOI":"10.5445\/IR\/1000024955"},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Koziolek, A., Koziolek, H., Reussner, R.: PerOpteryx: automated application of tactics in multi-objective software architecture optimization. In: Proceedings of the joint ACM SIGSOFT Conference-QoSA and ACM SIGSOFT Symposium-ISARCS on Quality of Software Architectures-QoSA and Architecting Critical Systems - ISARCS, pp. 33\u201342 (2011)","DOI":"10.1145\/2000259.2000267"},{"key":"14_CR31","doi-asserted-by":"publisher","unstructured":"Kramer, M., Hecker, M., Greiner, S., Bao, K., Yurchenko, K.: Model-driven specification and analysis of confidentiality in component-based systems. Tech. Rep. 12, KIT-Department of Informatics (2017). https:\/\/doi.org\/10.5445\/IR\/1000076957","DOI":"10.5445\/IR\/1000076957"},{"key":"14_CR32","doi-asserted-by":"publisher","DOI":"10.5445\/IR\/1000139590","author":"O Liu","year":"2021","unstructured":"Liu, O.: Design space evaluation for confidentiality under architectural uncertainty (2021). https:\/\/doi.org\/10.5445\/IR\/1000139590","journal-title":"Design space evaluation for confidentiality under architectural uncertainty"},{"key":"14_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"2002 \u2014 The Unified Modeling Language","author":"T Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: a UML-based modeling language for model-driven security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426\u2013441. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45800-X_33"},{"key":"14_CR34","doi-asserted-by":"publisher","unstructured":"Lytra, I., Zdun, U.: Supporting architectural decision making for systems-of-systems design under uncertainty. In: Proceedings of the First International Workshop on Software Engineering for Systems-of-Systems, SESoS 2013, pp. 43\u201346. Association for Computing Machinery, July 2013. https:\/\/doi.org\/10.1145\/2489850.2489859","DOI":"10.1145\/2489850.2489859"},{"key":"14_CR35","doi-asserted-by":"publisher","unstructured":"Monschein, D., Mazkatli, M., Heinrich, R., Koziolek, A.: Enabling consistency between software artefacts for software adaption and evolution. In: ICSA, pp. 1\u201312 (2021). https:\/\/doi.org\/10.1109\/ICSA51549.2021.00009","DOI":"10.1109\/ICSA51549.2021.00009"},{"key":"14_CR36","doi-asserted-by":"publisher","unstructured":"Noorshams, Q., Martens, A., Reussner, R.: Using quality of service bounds for effective multi-objective software architecture optimization. In: Proceedings of the 2nd International Workshop on the Quality of Service-Oriented Software Systems. QUASOSS 2010, Association for Computing Machinery, New York, NY, USA (2010). https:\/\/doi.org\/10.1145\/1858263.1858265","DOI":"10.1145\/1858263.1858265"},{"key":"14_CR37","unstructured":"OWASP: A04:2021 - insecure design. https:\/\/owasp.org\/Top10\/A04_2021-Insecure_Design\/"},{"key":"14_CR38","unstructured":"OWASP: Top ten web application security risks, https:\/\/owasp.org\/www-project-top-ten\/"},{"key":"14_CR39","doi-asserted-by":"publisher","unstructured":"Perez-Palacin, D., Mirandola, R.: Uncertainties in the modeling of self- adaptive systems: a taxonomy and an example of availability evaluation. pp. 3\u201314. In: Proceedings of the 5th ACM\/SPEC International Conference on Performance Engineering, ICPE 2014, pp. 3\u201314. Association for Computing Machinery, New York, NY, USA (2014). https:\/\/doi.org\/10.1145\/2568088.2568095","DOI":"10.1145\/2568088.2568095"},{"key":"14_CR40","unstructured":"Piper, D.: DLA Piper GDPR fines and data breach survey: January GDPR fines and data breach survey: January 2022. www.dlapiper.com\/de\/germany\/insights\/publications\/2022\/1\/dla-piper-gdpr-fines-and-data-breach-survey-2022"},{"key":"14_CR41","doi-asserted-by":"publisher","unstructured":"Ramirez, A.J., Jensen, A.C., Cheng, B.H.C.: A taxonomy of uncertainty for dynamically adaptive systems. In: 2012 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), pp. 99\u2013108 (June 2012). https:\/\/doi.org\/10.1109\/SEAMS.2012.6224396","DOI":"10.1109\/SEAMS.2012.6224396"},{"key":"14_CR42","doi-asserted-by":"publisher","unstructured":"Reiche, F., Schiffl, J., Weigl, A., Heinrich, R., Beckert, B., Reussner, R.: Model-driven quantification of correctness with palladio and key. Tech. rep., Karlsruher Institut f\u00fcr Technologie (KIT) (2021). https:\/\/doi.org\/10.5445\/IR\/1000128855","DOI":"10.5445\/IR\/1000128855"},{"key":"14_CR43","unstructured":"Reussner, R., et al.: Modeling and Simulating Software Architecture - The Palladio Approach. MIT Press, Cambridge. October 2016. http:\/\/mitpress.mit.edu\/books\/modeling-and-simulating-software-architectures"},{"issue":"2","key":"14_CR44","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2008","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Emp. Softw. Eng. 14(2), 131 (2008). https:\/\/doi.org\/10.1007\/s10664-008-9102-8","journal-title":"Emp. Softw. Eng."},{"key":"14_CR45","unstructured":"Schulz, S., Reiche, F., Hahner, S., Schiffl, J.: Continuous secure software development and analysis. In: Proceedings of Symposium on Software Performance 2021. Leipzig, Germany, November 2021"},{"key":"14_CR46","doi-asserted-by":"publisher","unstructured":"Seifermann, S., Heinrich, R., Werle, D., Reussner, R.: A unified model to detect information flow and access control violations in software architectures. In: Proceedings of the 18th International Conference on Security and Cryptography, SECRYPT 2021, Virtual, Online, 6 July 2021\u20138 July 2021. pp. 26\u201337. SciTePress (2021). https:\/\/doi.org\/10.5220\/0010515300260037","DOI":"10.5220\/0010515300260037"},{"key":"14_CR47","unstructured":"Seifermann, S., Walter, M., Hahner, S., Heinrich, R., Reussner, R.: Identifying confidentiality violations in architectural design using palladio. In: ECSA-C202021, vol. 2978. CEUR-WS.org (2021). 46.23.03; LK 01"},{"key":"14_CR48","doi-asserted-by":"publisher","unstructured":"Seifermann, S., Heinrich, R., Reussner, R.: Data-driven software architecture for analyzing confidentiality. In: ICSA, pp. 1\u201310. IEEE (2019). https:\/\/doi.org\/10.1109\/ICSA.2019.00009, https:\/\/ieeexplore.ieee.org\/document\/8703910","DOI":"10.1109\/ICSA.2019.00009"},{"key":"14_CR49","doi-asserted-by":"crossref","unstructured":"Seifermann, S., Heinrich, R., Werle, D., Reussner, R.: Detecting violations of access control and information flow policies in data flow diagrams. JSS 184 (2021)","DOI":"10.1016\/j.jss.2021.111138"},{"issue":"1","key":"14_CR50","first-page":"50","volume":"1","author":"D Sobhy","year":"2021","unstructured":"Sobhy, D., Bahsoon, R., Minku, L., Kazman, R.: Evaluation of software architectures under Uncertainty: a systematic literature review. ACM Trans. Softw. Eng. Methodol. 1(1), 50 (2021)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"4","key":"14_CR51","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1007\/s10270-020-00842-1","volume":"20","author":"J Troya","year":"2021","unstructured":"Troya, J., Moreno, N., Bertoa, M.F., Vallecillo, A.: Uncertainty representation in software models: a survey. Softw. Syst. Model. 20(4), 1183\u20131213 (2021). https:\/\/doi.org\/10.1007\/s10270-020-00842-1","journal-title":"Softw. Syst. Model."},{"key":"14_CR52","doi-asserted-by":"publisher","unstructured":"Tuma, K., Scandariato, R., Balliu, M.: Flaws in flows: unveiling design flaws via information flow analysis. In: ICSA, pp. 191\u2013200 (2019). https:\/\/doi.org\/10.1109\/ICSA.2019.00028","DOI":"10.1109\/ICSA.2019.00028"},{"key":"14_CR53","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-030-88189-4_15","volume-title":"Information Retrieval","author":"M Qian","year":"2021","unstructured":"Qian, M., Wang, J., Lin, H., Zhao, D., Zhang, Y., Tang, W., Yang, Z.: Auto-learning convolution-based graph convolutional network for medical relation extraction. In: Lin, H., Zhang, M., Pang, L. (eds.) CCIR 2021. LNCS, vol. 13026, pp. 195\u2013207. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-88189-4_15"},{"key":"14_CR54","doi-asserted-by":"publisher","unstructured":"Walker, W., et al.: Defining uncertainty: a conceptual basis for uncertainty management in model-based decision support. Integr. Assess. 4 (2003). https:\/\/doi.org\/10.1076\/iaij.4.1.5.16466","DOI":"10.1076\/iaij.4.1.5.16466"},{"key":"14_CR55","doi-asserted-by":"publisher","unstructured":"Walter, M., et al.: Dataset: architectural optimization for confidentiality under structural uncertainty. https:\/\/doi.org\/10.5281\/zenodo.6569353","DOI":"10.5281\/zenodo.6569353"},{"key":"14_CR56","doi-asserted-by":"crossref","unstructured":"Walter, M., Heinrich, R., Reussner, R.: Architectural attack propagation analysis for identifying confidentiality issues. In: ICSA (2022)","DOI":"10.1109\/ICSA53651.2022.00009"},{"key":"14_CR57","unstructured":"Yurchenko, K., et al.: Architecture-driven reduction of specification overhead for verifying confidentiality in component-based software systems. In: MODELS (Satellite Events), pp. 321\u2013323 (2017)"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15116-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T06:04:14Z","timestamp":1676441054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15116-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031151156","9783031151163"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15116-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Software Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"V\u00e4xj\u00f6","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/ecsa-2021","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Workshops were held virtually. For the workshop, 17 papers were submitted and 15 papers were selected.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}