{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:04:56Z","timestamp":1725854696408},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319351216"},{"type":"electronic","value":"9783319351223"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-35122-3_13","type":"book-chapter","created":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T08:40:26Z","timestamp":1462783226000},"page":"181-196","source":"Crossref","is-referenced-by-count":2,"title":["Reusable Secure Connectors for Secure Software Architecture"],"prefix":"10.1007","author":[{"given":"Michael","family":"Shin","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Gomaa","sequence":"additional","affiliation":[]},{"given":"Don","family":"Pathirage","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,10]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Al-Azzani, S., Bahsoon, R.: SecArch: Architecture-level evaluation and testing for security. In: Joint Working IEEE\/IFIP Conference on Software Architecture (WICSA) and European Conference on Software Architecture (ECSA), August 2012","DOI":"10.1109\/WICSA-ECSA.212.13"},{"key":"13_CR2","unstructured":"Baker, C., Shin M.: Aspect-oriented secure connectors for implementation of secure software architecture. In: International Conference on Software Engineering and Knowledge Engineering (SEKE 2014), Vancouver, 1\u20133 July 2014"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Banerjee, S., Mattmann, C.A., Medvidovic, N., Golubchik, L.: Leveraging architectural models to inject trust into software systems. In: Proceedings of the ICSE 2005 Workshop on Software Engineering for Secure Systems, St. Louis, Missouri, May 2005","DOI":"10.1145\/1083200.1083213"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Basin, D., Clavel, M., Egea, M.: A decade of model-driven security. In: 16th ACM Symposium on Access Control Models and Technologies (SACMAT 2011), Innsbruck, 15\u201317 June 2011","DOI":"10.1145\/1998441.1998443"},{"issue":"5","key":"13_CR5","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1109\/TKDE.2003.1232267","volume":"15","author":"Y Deng","year":"2003","unstructured":"Deng, Y., Wang, J., Tsai, J.J.P., Beznosov, K.: An approach for modeling and analysis of security system architectures. IEEE Trans. Knowl. Data Eng. 15(5), 1099\u20131119 (2003)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"13_CR6","volume-title":"Security Patterns in Practice","author":"EB Fernandez","year":"2013","unstructured":"Fernandez, E.B.: Security Patterns in Practice. Wiley, New York (2013)"},{"key":"13_CR7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511779183","volume-title":"Software Modeling and Design: UML, Use Cases, Patterns, and Software Architectures","author":"H Gomaa","year":"2011","unstructured":"Gomaa, H.: Software Modeling and Design: UML, Use Cases, Patterns, and Software Architectures. Cambridge University Press, Cambridge (2011)"},{"key":"13_CR8","unstructured":"Gomaa, H., Shin, M.E.: Modeling complex systems by separating application and security concerns. In: 9th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS 2004), Italy, April 2004"},{"key":"13_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00a0\u00bb\u00a02002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Ren, J., Taylor, R., Dourish, P., Redmiles, D.: Towards an architectural treatment of software security: A connector-centric approach. In: Proceedings of the Workshop on Software Engineering for Secure Systems, St. Louis, Missouri, 15\u201316 May 2005","DOI":"10.1145\/1083200.1083203"},{"key":"13_CR11","volume-title":"Security Patterns","author":"M Schumacher","year":"2006","unstructured":"Schumacher, M., Fernandez, E.B., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns. Wiley, New York (2006)"},{"issue":"1","key":"13_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.scico.2006.10.009","volume":"66","author":"ME Shin","year":"2007","unstructured":"Shin, M.E., Gomaa, H.: Software modeling of evolution to a secure application: From requirements model to software architecture. Sci. Comput. Program. 66(1), 60\u201370 (2007)","journal-title":"Sci. Comput. Program."},{"key":"13_CR13","unstructured":"Shin, M.E., Malhotra, B., Gomaa, H., Kang, T.: Connectors for secure software architectures. In: 24th International Conference on Software Engineering and Knowledge Engineering (SEKE 2012), San Francisco, 1\u20133 July 2012"},{"key":"13_CR14","volume-title":"Software Architecture: Foundations, Theory, and Practice","author":"RN Taylor","year":"2010","unstructured":"Taylor, R.N., Medvidovic, N., Dashofy, E.M.: Software Architecture: Foundations, Theory, and Practice. Wiley, Chichester (2010)"}],"container-title":["Lecture Notes in Computer Science","Software Reuse: Bridging with Social-Awareness"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-35122-3_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T23:09:13Z","timestamp":1559430553000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-35122-3_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319351216","9783319351223"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-35122-3_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}