{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:17:52Z","timestamp":1743153472230,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319566597"},{"type":"electronic","value":"9783319566603"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-56660-3_42","type":"book-chapter","created":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T03:20:29Z","timestamp":1490152829000},"page":"489-498","source":"Crossref","is-referenced-by-count":1,"title":["Checking Compliance of Program with SecureUML Model"],"prefix":"10.1007","author":[{"given":"Thanh-Nhan","family":"Luong","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Van-Khanh","family":"To","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ninh-Thuan","family":"Truong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,3,23]]},"reference":[{"key":"42_CR1","unstructured":"Mead, N.R., Allen, J.H.,\u00a0Barnum, S., Ellison, R.J.,\u00a0McGraw, G.: Software Security Engineering: A Guide for Project Managers. Addison-Wesley Professional (2004)"},{"key":"42_CR2","unstructured":"Ferraiolo, D., Kuhn, D.R.,\u00a0Chandramouli, R.: Role-Based Access Control. Artech House (2003)"},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Lodderstedt, T.,\u00a0Basin, D.,\u00a0Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: International Conference on the Unified Modeling Language, pp. 426\u2013441. Springer (2002)","DOI":"10.1007\/3-540-45800-X_33"},{"issue":"3","key":"42_CR4","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 4(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"2","key":"42_CR5","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coynek, E.J., Feinsteink, H.L., Youmank, C.E.: Role-based access control models. IEEE Comput. 29(2), 38\u201347 (1996)","journal-title":"IEEE Comput."},{"issue":"1","key":"42_CR6","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: from UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. (TOSEM) 15(1), 39\u201391 (2006)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"42_CR7","unstructured":"Matulevi\u010dius, R.,\u00a0Dumas, M.: A comparison of secureUML and UMLsec for rolebased access control. In: Proceedings of the 9th Conference on Databases and Information Systems, pp. 171\u2013185 (2010)"},{"key":"42_CR8","first-page":"53","volume":"3","author":"EO Boadu","year":"2014","unstructured":"Boadu, E.O., Armah, G.K.: Role-based access control (RBAC) based in hospital management. Int. J. Softw. Eng. Knowl. Eng. 3, 53\u201367 (2014)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"42_CR9","doi-asserted-by":"crossref","unstructured":"Fisler, K.,\u00a0Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: Proceedings of the 27th International Conference on Software Engineering, pp. 196\u2013205. ACM (2005)","DOI":"10.1145\/1062455.1062502"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Clarke, E.,\u00a0Kroening, D.,\u00a0Lerda, F.: A tool for checking ANSI-C programs. In: International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp. 168\u2013176. Springer (2004)","DOI":"10.1007\/978-3-540-24730-2_15"},{"key":"42_CR11","doi-asserted-by":"crossref","unstructured":"Qamar, N.,\u00a0Ledru, Y.,\u00a0Idani, A.: Validation of security-design models using z. In: International Conference on Formal Engineering Methods, pp. 259\u2013274. Springer (2011)","DOI":"10.1007\/978-3-642-24559-6_19"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Qamar, N.,\u00a0Faber, J.,\u00a0Ledru, Y.,\u00a0Liu, Z.: Automated reviewing of healthcare security policies. In: International Symposium on Foundations of Health Informatics Engineering and Systems, pp. 176\u2013193. Springer (2012)","DOI":"10.1007\/978-3-642-39088-3_12"},{"issue":"1","key":"42_CR13","doi-asserted-by":"crossref","first-page":"e3","DOI":"10.2196\/jmir.7.1.e3","volume":"7","author":"TD Gunter","year":"2005","unstructured":"Gunter, T.D., Terry, N.P.: The emergence of national electronic health record architectures in the United States and Australia: models, costs, and questions. J. Med. Internet Res. 7(1), e3 (2005)","journal-title":"J. Med. Internet Res."},{"issue":"5","key":"42_CR14","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/j.clsr.2011.07.013","volume":"27","author":"P Kierkegaard","year":"2011","unstructured":"Kierkegaard, P.: Electronic health record: wiring Europes healthcare. Comput. Law Secur. Rev. 27(5), 503\u2013515 (2011)","journal-title":"Comput. Law Secur. Rev."},{"key":"42_CR15","unstructured":"M.\u00a0University: Soot: a Java optimization framework. https:\/\/www.sable.mcgill.ca\/soot\/index.html (2012)"}],"container-title":["Studies in Computational Intelligence","Advanced Topics in Intelligent Information and Database Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56660-3_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T22:07:38Z","timestamp":1568930858000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56660-3_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319566597","9783319566603"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56660-3_42","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2017]]}}}