{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T04:01:54Z","timestamp":1746417714060,"version":"3.40.4"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319099699"},{"type":"electronic","value":"9783319099705"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09970-5_29","type":"book-chapter","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T06:02:38Z","timestamp":1407823358000},"page":"340-356","source":"Crossref","is-referenced-by-count":3,"title":["Runtime Enforcement of Dynamic Security Policies"],"prefix":"10.1007","author":[{"given":"Jose-Miguel","family":"Horcas","sequence":"first","affiliation":[]},{"given":"M\u00f3nica","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Lidia","family":"Fuentes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"FP7 European Project INTER-TRUST: Interoperable Trust Assurance Infrastructure, http:\/\/www.inter-trust.eu\/"},{"key":"29_CR2","unstructured":"Kalam, A., Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: POLICY, pp. 120\u2013131 (2003)"},{"issue":"3","key":"29_CR3","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"11","key":"29_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/2.241422","volume":"26","author":"R. Sandhu","year":"1993","unstructured":"Sandhu, R.: Lattice-based access control models. Computer\u00a026(11), 9\u201319 (1993)","journal-title":"Computer"},{"key":"29_CR5","unstructured":"IBM: Autonomic Computing White Paper - An architectural blueprint for autonomic computing. IBM Corp. (2005)"},{"issue":"4","key":"29_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/MC.2008.123","volume":"41","author":"S. Hallsteinsen","year":"2008","unstructured":"Hallsteinsen, S., Hinchey, M., Park, S., Schmid, K.: Dynamic Software Product Lines. Computer\u00a041(4), 93\u201395 (2008)","journal-title":"Computer"},{"key":"29_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"G. Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-Oriented Programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol.\u00a01241, pp. 220\u2013242. Springer, Heidelberg (1997)"},{"key":"29_CR8","unstructured":"Mallouli, W., de\u00a0Oca, E.M., Wehbi, B., Fuentes, L., Pinto, M., Horcas, J.M., Benab, J.B., Prez, J.M.M., Ayed, S., Cuppens, N., Cuppens, F., Toumi, K., Cavalli, A., Kerezsi, E.: Specification and design of the secure interoperability framework and tools - first version. Deliverable D4.2.1, FP7 European Project INTER-TRUST (2013), http:\/\/inter-trust.lcc.uma.es\/documents\/10180\/15714\/INTER-TRUST-T4.2-MI-DELV-D4.2.1-SpecDesSecInterFram"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Haugen, O., W\u0105sowski, A., Czarnecki, K.: CVL: Common Variability Language. In: SPLC 2012, vol.\u00a02, pp. 266\u2013267 (2012)","DOI":"10.1145\/2364412.2364462"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Horcas, J.M., Pinto, M., Fuentes, L.: Closing the gap between the specification and enforcement of security policies. In: TrustBus (2014)","DOI":"10.1007\/978-3-319-09770-1_10"},{"key":"29_CR11","doi-asserted-by":"crossref","unstructured":"Andrade, R., Ribeiro, M., Gasiunas, V., Satabin, L., Rebelo, H., Borba, P.: Assessing idioms for implementing features with flexible binding times. In: CSMR, pp. 231\u2013240 (2011)","DOI":"10.1109\/CSMR.2011.29"},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Andrade, R., Rebelo, H., Ribeiro, M., Borba, P.: Aspectj-based idioms for flexible feature binding. In: SBCARS, pp. 59\u201368 (2013)","DOI":"10.1109\/SBCARS.2013.17"},{"key":"29_CR13","unstructured":"Arrazola, J., Merle, L.: Specification of the evaluation criteria. Deliverable D5.2, FP7 European Project INTER-TRUST (2013), http:\/\/inter-trust.lcc.uma.es\/documents\/10180\/15714\/INTER-TRUST+-++D5.2+Specification+of+the+evaluation+criteria\/72c26aff-51fa-4117-b9ba-7afcac8468e0"},{"key":"29_CR14","unstructured":"Bernab, J.B., Perez, J.M.M., Skarmeta, A.F., Pasini, R., Viszlai, E., Mallouli, W., Toumi, K., Ayed, S., Pinto, M., Fuentes, L., Horcas, J.M., Arrazola, J., Merle, L., Frontanta, J.L.V.: Results of first evaluation. Deliverable D5.3, FP7 European Project INTER-TRUST (2013), http:\/\/inter-trust.lcc.uma.es\/documents\/10180\/15714\/INTER-TRUST-T5.3-UMU-DELV-D5.3-ResultsFirstEval-V1.00.pdf\/f8547c6e-bdbe-4be2-ade9-0698876d4423"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Win, B.D., Piessens, F., Joosen, W.: How secure is AOP and what can we do about it? In: SESS, pp. 27\u201334. ACM (2006)","DOI":"10.1145\/1137627.1137633"},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-319-04897-0_2","volume-title":"Engineering Secure Software and Systems","author":"Y. Elrakaiby","year":"2014","unstructured":"Elrakaiby, Y., Amrani, M., Le Traon, Y.: Security@runtime: A flexible mde approach to enforce fine-grained security policies. In: J\u00fcrjens, J., Piessens, F., Bielova, N. (eds.) ESSoS. LNCS, vol.\u00a08364, pp. 19\u201334. Springer, Heidelberg (2014)"},{"issue":"7","key":"29_CR17","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1016\/j.engappai.2004.08.036","volume":"17","author":"J.J. Tan","year":"2004","unstructured":"Tan, J.J., Poslad, S.: Dynamic security reconfiguration for the semantic web. Engineering Applications of Artificial Intelligence\u00a017(7), 783\u2013797 (2004)","journal-title":"Engineering Applications of Artificial Intelligence"},{"issue":"2-4","key":"29_CR18","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1080\/08839510500484298","volume":"20","author":"J.J. Tan","year":"2006","unstructured":"Tan, J.J., Poslad, S., Titkov, L.: A semantic approach to harmonizing security models for open services. Applied Artificial Intelligence\u00a020(2-4), 353\u2013379 (2006)","journal-title":"Applied Artificial Intelligence"},{"key":"29_CR19","unstructured":"Jrjens, J.: Secure Systems Development with UML. Springer (2010)"},{"issue":"1","key":"29_CR20","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol.\u00a015(1), 39\u201391 (2006)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Lang, U.: OpenPMF SCaaS: Authorization as a service for cloud amp; SOA applications. In: CloudCom, pp. 634\u2013643 (2010)","DOI":"10.1109\/CloudCom.2010.13"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Lang, U.: Cloud & SOA application security as a service. In: ISSE 2010 Securing Electronic Business Processes, pp. 61\u201371 (2011)","DOI":"10.1007\/978-3-8348-9788-6_6"},{"key":"29_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-642-35194-5_13","volume-title":"FMCO 2011","author":"B. Katt","year":"2012","unstructured":"Katt, B., Gander, M., Breu, R., Felderer, M.: Enhancing model driven security through pattern refinement techniques. In: Beckert, B., Bonsangue, M.M. (eds.) FMCO 2011. LNCS, vol.\u00a07542, pp. 169\u2013183. Springer, Heidelberg (2012)"},{"key":"29_CR24","doi-asserted-by":"crossref","unstructured":"Morin, B., Mouelhi, T., Fleurey, F., Traon, Y.L., Barais, O., J\u00e9z\u00e9quel, J.M.: Security-driven model-based dynamic adaptation. In: ASE, pp. 205\u2013214 (2010)","DOI":"10.1145\/1858996.1859040"},{"key":"29_CR25","doi-asserted-by":"crossref","unstructured":"Dong, W.: Dynamic reconfiguration method for web service based on policy. In: Electronic Commerce and Security, 61\u201365 (2008)","DOI":"10.1109\/ISECS.2008.193"},{"key":"29_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-642-25821-3_18","volume-title":"Middleware 2011","author":"G. Gheorghe","year":"2011","unstructured":"Gheorghe, G., Crispo, B., Carbone, R., Desmet, L., Joosen, W.: Deploy, adjust and readjust: Supporting dynamic reconfiguration of policy enforcement. In: Kon, F., Kermarrec, A.-M. (eds.) Middleware 2011. LNCS, vol.\u00a07049, pp. 350\u2013369. Springer, Heidelberg (2011)"},{"key":"29_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/978-3-642-32645-5_80","volume-title":"Convergence and Hybrid Information Technology","author":"H.S. Cho","year":"2012","unstructured":"Cho, H.S., Hwang, S.M.: Mobile cloud policy decision management for mds. In: Lee, G., Howard, D., Kang, J.J., \u015al\u0119zak, D. (eds.) ICHIT 2012. LNCS, vol.\u00a07425, pp. 645\u2013649. Springer, Heidelberg (2012)"},{"key":"29_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-21347-2_9","volume-title":"Top Productivity through Software Reuse","author":"N. Gamez","year":"2011","unstructured":"Gamez, N., Fuentes, L.: Software product line evolution with cardinality-based feature models. In: Schmid, K. (ed.) ICSR 2011. LNCS, vol.\u00a06727, pp. 102\u2013118. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Software Architecture"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09970-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:24:57Z","timestamp":1746332697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09970-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319099699","9783319099705"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09970-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}