{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T04:09:32Z","timestamp":1744862972774,"version":"3.40.4"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031853555","type":"print"},{"value":"9783031853562","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-85356-2_10","type":"book-chapter","created":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T11:44:41Z","timestamp":1744803881000},"page":"143-158","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Formal Approach for\u00a0Verifying and\u00a0Validating Security Objectives in\u00a0Software Architecture"],"prefix":"10.1007","author":[{"given":"Lo\u00efc","family":"Thierry","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2199-3916","authenticated-orcid":false,"given":"Brahim","family":"Hamid","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6316-3040","authenticated-orcid":false,"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,17]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139195881","volume-title":"Modeling in Event-B: System and Software Engineering","author":"JR Abrial","year":"2010","unstructured":"Abrial, J.R.: Modeling in Event-B: System and Software Engineering. Cambridge University Press, Cambridge (2010)"},{"issue":"6","key":"10_CR2","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s10009-010-0145-y","volume":"12","author":"JR Abrial","year":"2010","unstructured":"Abrial, J.R., Butler, M., Hallerstede, S., Hoang, T.S., Mehta, F., Voisin, L.: Rodin: an open toolset for modelling and reasoning in Event-B. Int. J. Softw. Tools Technol. Transfer 12(6), 447\u2013466 (2010)","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Babin, G., Ameur, Y., Pantel, M.: Formal verification of runtime compensation of web service compositions: a refinement and proof based proposal with Event-B. In: 2015 IEEE International Conference on Services Computing, pp. 98\u2013105 (2015)","DOI":"10.1109\/SCC.2015.23"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Benaissa, N., M\u00e9ry, D.: Cryptographic protocols analysis in Event B. In: Perspectives of Systems Informatics, pp. 282\u2013293. Springer, Heidelberg (2010)","DOI":"10.1007\/978-3-642-11486-1_24"},{"issue":"1","key":"10_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Crnkovic, I.: Component-based software engineering for embedded systems. In: 27th International Conference on Software Engineering, pp. 712\u2013713. ACM (2005)","DOI":"10.1145\/1062455.1062631"},{"issue":"6","key":"10_CR7","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1007\/s00165-017-0425-3","volume":"29","author":"M Graiet","year":"2017","unstructured":"Graiet, M., Hamel, L., Mammar, A., Tata, S.: A verification and deployment approach for elastic component-based applications. Formal Aspects Comput. 29(6), 987\u20131011 (2017)","journal-title":"Formal Aspects Comput."},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.cose.2018.03.016","volume":"77","author":"B Hamid","year":"2018","unstructured":"Hamid, B., Weber, D.: Engineering secure systems: models, patterns and empirical validation. Comput. Secur. 77, 315\u2013348 (2018)","journal-title":"Comput. Secur."},{"key":"10_CR9","unstructured":"International Organization for Standardization: ISO\/IEC 27000:2018 Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Overview and vocabulary (2018)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Laibinis, L., Troubitsyna, E., Pereverzeva, I., Oliver, I., Holtmanns, S.: A formal approach to identifying security vulnerabilities in telecommunication networks. In: Formal Methods and Software Engineering, pp. 141\u2013158 (2016)","DOI":"10.1007\/978-3-319-47846-3_10"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1007\/978-3-540-45236-2_46","volume-title":"FME 2003: Formal Methods","author":"M Leuschel","year":"2003","unstructured":"Leuschel, M., Butler, M.: ProB: a model checker for B. In: Araki, K., Gnesi, S., Mandrioli, D. (eds.) FME 2003: Formal Methods, pp. 855\u2013874. Springer, Heidelberg (2003)"},{"key":"10_CR12","first-page":"1","volume-title":"Formal Methods for Components and Objects","author":"D von Oheimb","year":"2012","unstructured":"von Oheimb, D., M\u00f6dersheim, S.: ASLan++ \u2013 a formal security specification language for distributed systems. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) Formal Methods for Components and Objects, pp. 1\u201322. Springer, Heidelberg (2012)"},{"key":"10_CR13","volume-title":"Software Architecture: Foundation, Theory, and Practice","author":"RN Taylor","year":"2010","unstructured":"Taylor, R.N., Medvidovic, N.: Software Architecture: Foundation, Theory, and Practice. Wiley, Hoboken (2010)"},{"key":"10_CR14","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.procs.2013.09.263","volume":"20","author":"M Rodano","year":"2013","unstructured":"Rodano, M., Giammarc, K.: A formal method for evaluation of a modeled system architecture. Procedia Comput. Sci. 20, 210\u2013215 (2013)","journal-title":"Procedia Comput. Sci."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Ross, R., Winstead, M., McEvilley, M.: Engineering trustworthy secure systems. Special Publication (NIST SP) 800-160 Volume 1, Revision 1, National Institute of Standards and Technology (2022)","DOI":"10.6028\/NIST.SP.800-160v1r1.fpd"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Rouland, Q., Hamid, B., Bodeveix, J.P., Jaskolka, J.: Formalizing the relationship between security policies and objectives in software architectures. In: IEEE 20th International Conference on Software Architecture Companion (ICSA-C), pp. 151\u2013158 (2023)","DOI":"10.1109\/ICSA-C57050.2023.00042"},{"key":"10_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102073","volume":"117","author":"Q Rouland","year":"2021","unstructured":"Rouland, Q., Hamid, B., Jaskolka, J.: Specification, detection, and treatment of stride threats for software components: modeling, formal methods, and tool support. J. Syst. Architect. 117, 102073 (2021)","journal-title":"J. Syst. Architect."},{"issue":"2","key":"10_CR18","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s00766-013-0195-2","volume":"20","author":"R Scandariato","year":"2015","unstructured":"Scandariato, R., Wuyts, K., Joosen, W.: A descriptive study of Microsoft\u2019s threat modeling technique. Requirements Eng. 20(2), 163\u2013180 (2015)","journal-title":"Requirements Eng."},{"issue":"5","key":"10_CR19","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MS.2003.1231146","volume":"20","author":"B Selic","year":"2003","unstructured":"Selic, B.: The pragmatics of model-driven development. IEEE Softw. 20(5), 19\u201325 (2003)","journal-title":"IEEE Softw."},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Thierry, L., Jaskolka, J., Hamid, B., Bodeveix, J.P.: Specification and verification of communication paradigms for CBSE in Event B. In: 27th International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 157\u2013166 (2023)","DOI":"10.1109\/ICECCS59891.2023.00028"},{"key":"10_CR21","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.jss.2018.06.073","volume":"144","author":"K Tuma","year":"2018","unstructured":"Tuma, K., Calikli, G., Scandariato, R.: Threat analysis of software systems: a systematic literature review. J. Syst. Softw. 144, 275\u2013294 (2018)","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Verification and Evaluation of Computer and Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-85356-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T11:44:50Z","timestamp":1744803890000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-85356-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031853555","9783031853562"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-85356-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VECoS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Verification and Evaluation of Computer and Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Djerba","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tunisia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vecos2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.vecos-world.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}