{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:13:07Z","timestamp":1742958787118,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319229058"},{"type":"electronic","value":"9783319229065"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22906-5_14","type":"book-chapter","created":{"date-parts":[[2015,8,4]],"date-time":"2015-08-04T10:27:48Z","timestamp":1438684068000},"page":"180-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Deployment and Monitoring of Security Policies"],"prefix":"10.1007","author":[{"given":"Jose-Miguel","family":"Horcas","sequence":"first","affiliation":[]},{"given":"M\u00f3nica","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Lidia","family":"Fuentes","sequence":"additional","affiliation":[]},{"given":"Wissam","family":"Mallouli","sequence":"additional","affiliation":[]},{"given":"Edgardo Montes","family":"de Oca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,5]]},"reference":[{"issue":"15","key":"14_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"14_CR2","unstructured":"FP7 European Project INTER-TRUST: Interoperable Trust Assurance Infrastructure. http:\/\/www.inter-trust.eu\/"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Ayed, S., Idrees, M.S., Cuppens-Boulahia, N., Cuppens, F., Pinto, M., Fuentes, L.: Security aspects: a framework for enforcement of security policies using AOP. In: Signal-Image Technology & Internet-Based Systems, SITIS, pp. 301\u2013308 (2013)","DOI":"10.1109\/SITIS.2013.57"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"G Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220\u2013242. Springer, Heidelberg (1997)"},{"key":"14_CR5","unstructured":"Kalam, A., Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: Policies for Distributed Systems and Networks (2003)"},{"key":"14_CR6","unstructured":"Autrel, F., Cuppens, F., Cuppens, N., Coma, C.: MotOrBAC 2: a security policy tool. In: Third Joint Conference on Security in Networks Architectures and Security of Information Systems, SARSSI (2008)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Morales, G., Maag, S., Cavalli, A., Mallouli, W., de Oca, E., Wehbi, B.: Timed extended invariants for the passive testing of web services. In: IEEE International Conference on Web Services, pp. 592\u2013599 (2010)","DOI":"10.1109\/ICWS.2010.17"},{"key":"14_CR8","unstructured":"Mallouli, W., Wehbi, B., de Oca, E.M., Bourdelles, M.: Online network traffic security inspection using MMT tool. In: System Testing and Validation (2012)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Wehbi, B., de Oca, E., Bourdelles, M.: Events-based security monitoring using MMT Tool. In: Software Testing, Verification and Validation (2012)","DOI":"10.1109\/ICST.2012.188"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/MSECP.2003.1176996","volume":"1","author":"M Howard","year":"2003","unstructured":"Howard, M., Lipner, S.: Inside the windows security push. IEEE Secur. Priv. 1(1), 57\u201361 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Cavalli, A., de Oca, E., Mallouli, W., Lallali, M.: Two complementary tools for the formal testing of distributed systems with time constraints. In: Distributed Simulation and Real-Time Applications(2008)","DOI":"10.1109\/DS-RT.2008.43"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Andrade, R., Rebelo, H., Ribeiro, M., Borba, P.: AspectJ-based idioms for flexible feature binding. In: VII Brazilian Symposium on Software Components, Architectures and Reuse, SBCARS, pp. 59\u201368 (2013)","DOI":"10.1109\/SBCARS.2013.17"},{"key":"14_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/978-3-540-87875-9_38","volume-title":"Model Driven Engineering Languages and Systems","author":"T Mouelhi","year":"2008","unstructured":"Mouelhi, T., Fleurey, F., Baudry, B., Le Traon, Y.: A model-based framework for security policy specification, deployment and testing. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V\u00f6lter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 537\u2013552. Springer, Heidelberg (2008)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"De Borger, W., De Win, B., Lagaisse, B., Joosen, W.: A permission system for secure AOP. In: Aspect-Oriented Software Development (2010)","DOI":"10.1145\/1739230.1739254"},{"key":"14_CR15","unstructured":"Abadi, M., Fournet, C.: Access control based on execution history. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium, NDSS, pp. 107\u2013121 (2003)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, S., Zhao, J.: On identifying bug patterns in aspect-oriented programs.In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, vol. 1, pp. 431\u2013438 (2007)","DOI":"10.1109\/COMPSAC.2007.159"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"De Win, B., Piessens, F., Joosen, W.: How secure is AOP and what can we do about it? In: Software Engineering for Secure Systems, pp. 27\u201334 (2006)","DOI":"10.1145\/1137627.1137633"},{"key":"14_CR18","unstructured":"Serme, G., De Oliveira, A.S., Guarnieriy, M., El Khoury, P.: Towards assisted remediation of security vulnerabilities. In: 6th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE (2012)"},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-1-4020-6268-1_49","volume-title":"Innovations and Advanced Techniques in Computer and Information Sciences and Engineering","author":"K Padayachee","year":"2007","unstructured":"Padayachee, K., Eloff, J.: An aspect-oriented model to monitor misuse. In: Sobh, T. (ed.) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, pp. 273\u2013278. Springer, Netherlands (2007)"},{"issue":"3","key":"14_CR20","doi-asserted-by":"publisher","first-page":"5251","DOI":"10.3390\/s150305251","volume":"15","author":"M Pinto","year":"2015","unstructured":"Pinto, M., G\u00e1mez, N., Fuentes, L., Amor, M., Horcas, J.M., Ayala, I.: Dynamic reconfiguration of security policies in wireless sensor networks. Sens. 15(3), 5251 (2015)","journal-title":"Sens."},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1007\/978-3-319-09970-5_29","volume-title":"Software Architecture","author":"J-M Horcas","year":"2014","unstructured":"Horcas, J.-M., Pinto, M., Fuentes, L.: Runtime enforcement of dynamic security policies. In: Avgeriou, P., Zdun, U. (eds.) ECSA 2014. LNCS, vol. 8627, pp. 340\u2013356. Springer, Heidelberg (2014)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22906-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T13:50:36Z","timestamp":1676469036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22906-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319229058","9783319229065"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22906-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"5 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}