{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:28:25Z","timestamp":1744172905267,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877186","type":"print"},{"value":"9783031877193","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87719-3_4","type":"book-chapter","created":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:36:49Z","timestamp":1744148209000},"page":"55-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reusable Formal Model Libraries for\u00a0Specifying and\u00a0Analyzing Security Objectives in\u00a0Event-B"],"prefix":"10.1007","author":[{"given":"Lo\u00efc","family":"Thierry","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2199-3916","authenticated-orcid":false,"given":"Brahim","family":"Hamid","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6316-3040","authenticated-orcid":false,"given":"Jason","family":"Jaskolka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,9]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Abrial, J.R.: Modeling in Event-B: System and Software Engineering. Cambridge University Press (2010)","DOI":"10.1017\/CBO9781139195881"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1016\/j.cose.2018.03.016","volume":"77","author":"B Hamid","year":"2018","unstructured":"Hamid, B., Weber, D.: Engineering secure systems: models, patterns and empirical validation. Comput. Secur. 77, 315\u2013348 (2018)","journal-title":"Comput. Secur."},{"key":"4_CR3","unstructured":"International Organization for Standardization: ISO\/IEC 27000:2018 Information technology \u2013 Security techniques \u2013 Information security management systems \u2013 Overview and vocabulary (2018)"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2013.04.002","volume":"295","author":"S Kounev","year":"2013","unstructured":"Kounev, S., Rathfelder, C., Klatt, B.: Modeling of event-based communication in component-based architectures: state-of-the-art and future directions. Electron. Notes Theor. Comput. Sci. 295, 3\u20139 (2013)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Laibinis, L., Troubitsyna, E., Pereverzeva, I., Oliver, I., Holtmanns, S.: A formal approach to identifying security vulnerabilities in telecommunication networks. In: Formal Methods and Software Engineering, pp. 141\u2013158 (2016)","DOI":"10.1007\/978-3-319-47846-3_10"},{"issue":"10","key":"4_CR6","first-page":"2780","volume":"65","author":"A Mammar","year":"2021","unstructured":"Mammar, A., Hamel, L., Graiet, M.: An event-b-based approach to model and verify behaviors for component-based applications. Comput. J. 65(10), 2780\u20132800 (2021)","journal-title":"Comput. J."},{"key":"4_CR7","unstructured":"Periyasamy, K., Chidambaram, J.: Software reuse using formal specification of requirements. In: Proceedings of the 1996 Conference of the Centre for Advanced Studies on Collaborative research, p.\u00a031 (1996)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Rivera, J.: Cyber security via formal methods: a framework for implementing formal methods. In: 2017 International Conference on Cyber Conflict (CyCon US), pp. 76\u201381. IEEE (2017)","DOI":"10.1109\/CYCONUS.2017.8167500"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"R.N.Taylor, Medvidovic, N.: Software Architecture: Foundation, Theory, and Practice. Wiley (2010)","DOI":"10.1145\/1810295.1810435"},{"key":"4_CR10","volume-title":"Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems","author":"R Ross","year":"2016","unstructured":"Ross, R., McEvilley, M., Oren, J.: Systems security engineering: considerations for a multidisciplinary approach in the engineering of trustworthy secure systems. Tech. rep, National Institute of Standards and Technology (2016)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-030-64694-3_4","volume-title":"Reuse in Emerging Software Engineering Practices","author":"Q Rouland","year":"2020","unstructured":"Rouland, Q., Hamid, B., Jaskolka, J.: Reusable formal models for threat specification, detection, and treatment. In: Ben Sassi, S., Ducasse, S., Mili, H. (eds.) ICSR 2020. LNCS, vol. 12541, pp. 52\u201368. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64694-3_4"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Thierry, L., Jaskolka, J., Hamid, B., Bodeveix, J.P.: Specification and verification of communication paradigms for CBSE in Event B. In: 2023 27th International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 157\u2013166 (2023)","DOI":"10.1109\/ICECCS59891.2023.00028"}],"container-title":["Lecture Notes in Computer Science","Model and Data Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87719-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T21:36:53Z","timestamp":1744148213000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87719-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877186","9783031877193"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87719-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MEDI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Model and Data Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"medi2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/medi2024.dieti.unina.it\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}