{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,5]],"date-time":"2025-06-05T04:14:03Z","timestamp":1749096843287,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319443409"},{"type":"electronic","value":"9783319443416"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-44341-6_2","type":"book-chapter","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T15:05:38Z","timestamp":1470409538000},"page":"19-31","source":"Crossref","is-referenced-by-count":1,"title":["Automatic Enforcement of Security Properties"],"prefix":"10.1007","author":[{"given":"Jose-Miguel","family":"Horcas","sequence":"first","affiliation":[]},{"given":"M\u00f3nica","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Lidia","family":"Fuentes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,6]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-642-11747-3_10","volume-title":"Engineering Secure Software and Systems","author":"S Preda","year":"2010","unstructured":"Preda, S., Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J., Toutain, L.: Model-driven security policy deployment: property oriented approach. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 123\u2013139. Springer, Heidelberg (2010)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Ayed, S., Idrees, M.S., Cuppens-Boulahia, N., Cuppens, F., Pinto, M., Fuentes, L.: Security aspects: a framework for enforcement of security policies using AOP. In: SITIS, pp. 301\u2013308 (2013)","DOI":"10.1109\/SITIS.2013.57"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1007\/978-3-540-87875-9_38","volume-title":"Model Driven Engineering Languages and Systems","author":"T Mouelhi","year":"2008","unstructured":"Mouelhi, T., Fleurey, F., Baudry, B., Le Traon, Y.: A model-based framework for security policy specification, deployment and testing. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V\u00f6lter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 537\u2013552. Springer, Heidelberg (2008)"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1007\/978-3-642-41533-3_37","volume-title":"Model-Driven Engineering Languages and Systems","author":"O Alam","year":"2013","unstructured":"Alam, O., Kienzle, J., Mussbacher, G.: Concern-oriented software design. In: Moreira, A., Sch\u00e4tz, B., Gray, J., Vallecillo, A., Clarke, P. (eds.) MODELS 2013. LNCS, vol. 8107, pp. 604\u2013621. Springer, Heidelberg (2013)"},{"key":"2_CR5","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.jss.2015.11.005","volume":"112","author":"JM Horcas","year":"2016","unstructured":"Horcas, J.M., Pinto, M., Fuentes, L.: An automatic process for weaving functional quality attributes using a software product line approach. J. Syst. Softw. 112, 78\u201395 (2016)","journal-title":"J. Syst. Softw."},{"issue":"8","key":"2_CR6","doi-asserted-by":"crossref","first-page":"1211","DOI":"10.1016\/j.jss.2009.03.102","volume":"82","author":"S Kim","year":"2009","unstructured":"Kim, S., Kim, D.K., Lu, L., Park, S.: Quality-driven architecture development using architectural tactics. J. Syst. Softw. 82(8), 1211\u20131231 (2009)","journal-title":"J. Syst. Softw."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Cuevas, A., Khoury, P.E., Gomez, L., Laube, A.: Security patterns for capturing encryption-based access control to sensor data. In: SECURWARE, pp. 62\u201367 (2008)","DOI":"10.1109\/SECURWARE.2008.17"},{"key":"2_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-28901-1","volume-title":"Software Product Line Engineering: Foundations, Principles and Techniques","author":"K Pohl","year":"2005","unstructured":"Pohl, K., B\u00f6ckle, G., van der Linden, F.J.: Software Product Line Engineering: Foundations, Principles and Techniques. Springer, New York (2005)"},{"key":"2_CR9","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"M Schumacher","year":"2005","unstructured":"Schumacher, M., Fernandez, E., Hybertson, D., Buschmann, F.: Security Patterns: Integrating Security and Systems Engineering. Wiley, Chichester (2005)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Haugen, \u00d8., Wasowski, A., Czarnecki, K.: CVL: common variability language. In: Software Product Line Conference, SPLC, vol. 2, pp. 266\u2013267 (2012)","DOI":"10.1145\/2364412.2364462"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Mendonca, M., Branco, M., Cowan, D.: S.P.L.O.T.: software product lines online tools. In: Object Oriented Programming Systems Languages and Applications, OOPSLA, pp. 761\u2013762. ACM (2009)","DOI":"10.1145\/1639950.1640002"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-642-16145-2_9","volume-title":"Model Driven Engineering Languages and Systems","author":"T Arendt","year":"2010","unstructured":"Arendt, T., Biermann, E., Jurack, S., Krause, C., Taentzer, G.: Henshin: advanced concepts and tools for in-place EMF model transformations. In: Petriu, D.C., Rouquette, N., Haugen, \u00d8. (eds.) MODELS 2010, Part I. LNCS, vol. 6394, pp. 121\u2013135. Springer, Heidelberg (2010)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Yu, H., Liu, D., He, X., Yang, L., Gao, S.: Secure software architectures design by aspect orientation. In: ICECCS, pp. 47\u201355 (2005)","DOI":"10.1109\/ICECCS.2005.75"},{"issue":"4","key":"2_CR14","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MS.2007.114","volume":"24","author":"M Hafiz","year":"2007","unstructured":"Hafiz, M., Adamczyk, P., Johnson, R.E.: Organizing security patterns. IEEE Softw. 24(4), 52\u201360 (2007)","journal-title":"IEEE Softw."},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Horcas, J.M., Pinto, M., Fuentes, L.: An aspect-oriented model transformation to weave security using CVL. In: MODELSWARD, pp. 138\u2013147 (2014)","DOI":"10.5220\/0004890601380147"},{"key":"2_CR16","unstructured":"Matinlassi, M., Niemel\u00e4, E., Dobrica, L.: Quality-driven Architecture Design and Quality Analysis Method: A Revolutionary Initiation Approach to a Product Line Architecture (2002)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Pires, P.F., Delicato, F.C., Pinto, M., Fuentes, L., Marinho, \u00c9.: Software evolution in AOSD: a MDA-based approach. In: CBSE, pp. 193\u2013198 (2011)","DOI":"10.1145\/2000229.2000257"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-44341-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T15:25:27Z","timestamp":1749050727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-44341-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319443409","9783319443416"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-44341-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}