{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T08:40:08Z","timestamp":1746348008624,"version":"3.40.4"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319097695"},{"type":"electronic","value":"9783319097701"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09770-1_10","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T07:25:20Z","timestamp":1408433120000},"page":"106-118","source":"Crossref","is-referenced-by-count":2,"title":["Closing the Gap between the Specification and Enforcement of Security Policies"],"prefix":"10.1007","author":[{"given":"Jos\u00e9-Miguel","family":"Horcas","sequence":"first","affiliation":[]},{"given":"M\u00f3nica","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Lidia","family":"Fuentes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"INTER-TRUST Project: Interoperable Trust Assurance Infrastructure, http:\/\/www.inter-trust.eu\/"},{"key":"10_CR2","unstructured":"Kalam, A., Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: POLICY, pp. 120\u2013131 (2003)"},{"issue":"3","key":"10_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"11","key":"10_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"R. Sandhu","year":"1993","unstructured":"Sandhu, R.: Lattice-based access control models. Computer\u00a026(11), 9\u201319 (1993)","journal-title":"Computer"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Pohl, K., B\u00f6ckle, G., van der Linden, F.J.: Software Product Line Engineering: Foundations, Principles and Techniques. Springer-Verlag New York, Inc. (2005)","DOI":"10.1007\/3-540-28901-1"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"G. Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-Oriented Programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol.\u00a01241, pp. 220\u2013242. Springer, Heidelberg (1997)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Kang, K., Cohen, S., Hess, J., Novak, W., Peterson, A.: Feature-Oriented Domain Analysis (FODA) feasibility study. Technical Report CMU\/SEI-90-TR-021, Soft. Eng. Institute, Carnegie Mellon University, Pittsburgh, Pennsylvania (1990)","DOI":"10.21236\/ADA235785"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Haugen, O., W\u0105sowski, A., Czarnecki, K.: CVL: Common Variability Language. In: SPLC, vol.\u00a02, pp. 266\u2013267. ACM (2012)","DOI":"10.1145\/2364412.2364462"},{"key":"10_CR9","unstructured":"OMG: Meta Object Facility (MOF) Core Specification Version 2.0 (2006)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Win, B.D., Piessens, F., Joosen, W.: How secure is AOP and what can we do about it? In: SESS, pp. 27\u201334. ACM (2006)","DOI":"10.1145\/1137627.1137633"},{"key":"10_CR11","series-title":"SCI","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-13273-5_13","volume-title":"Software Engineering Research, Management and Applications 2010","author":"D. Mouheb","year":"2010","unstructured":"Mouheb, D., Talhi, C., Nouh, M., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: Aspect-oriented modeling for representing and integrating security concerns in UML. In: Lee, R., Ormandjieva, O., Abran, A., Constantinides, C. (eds.) SERA 2010. SCI, vol.\u00a0296, pp. 197\u2013213. Springer, Heidelberg (2010)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Classen, A., Boucher, Q., Heymans, P.: A text-based approach to feature modelling: Syntax and semantics of TVL. Science of Computer Programming\u00a076(12), 1130\u20131143 (2011); Special Issue on Software Evolution, Adaptability and Variability","DOI":"10.1016\/j.scico.2010.10.005"},{"key":"10_CR13","unstructured":"Gordon, T.J.: The delphi method. Futures Research Methodology 2 (1994)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-642-11747-3_10","volume-title":"Engineering Secure Software and Systems","author":"S. Preda","year":"2010","unstructured":"Preda, S., Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J., Toutain, L.: Model-driven security policy deployment: Property oriented approach. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol.\u00a05965, pp. 123\u2013139. Springer, Heidelberg (2010)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Ayed, S., Idrees, M.S., Cuppens-Boulahia, N., Cuppens, F., Pinto, M., Fuentes, L.: Security aspects: A framework for enforcement of security policies using aop. In: SITIS, pp. 301\u2013308 (2013)","DOI":"10.1109\/SITIS.2013.57"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/978-3-540-87875-9_38","volume-title":"Model Driven Engineering Languages and Systems","author":"T. Mouelhi","year":"2008","unstructured":"Mouelhi, T., Fleurey, F., Baudry, B., Le Traon, Y.: A model-based framework for security policy specification, deployment and testing. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V\u00f6lter, M. (eds.) MODELS 2008. LNCS, vol.\u00a05301, pp. 537\u2013552. Springer, Heidelberg (2008)"},{"key":"10_CR17","unstructured":"Cetina, C., Haugen, O., Zhang, X., Fleurey, F., Pelechano, V.: Strategies for variability transformation at run-time. In: SPLC, pp. 61\u201370 (2009)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Horcas, J.M., Pinto, M., Fuentes, L.: An aspect-oriented model transformation to weave security using CVL. In: MODELSWARD, pp. 138\u2013147 (2014)","DOI":"10.5220\/0004890601380147"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Combemale, B., Barais, O., Alam, O., Kienzle, J.: Using cvl to operationalize product line development with reusable aspect models. In: VARY, pp. 9\u201314 (2012)","DOI":"10.1145\/2425415.2425418"},{"issue":"4","key":"10_CR20","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/MC.2008.123","volume":"41","author":"S. Hallsteinsen","year":"2008","unstructured":"Hallsteinsen, S., Hinchey, M., Park, S., Schmid, K.: Dynamic Software Product Lines. Computer\u00a041(4), 93\u201395 (2008)","journal-title":"Computer"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09770-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T08:06:15Z","timestamp":1746345975000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09770-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319097695","9783319097701"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09770-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}