{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,26]],"date-time":"2025-10-26T21:07:59Z","timestamp":1761512879252,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540233077"},{"type":"electronic","value":"9783540301875"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30187-5_26","type":"book-chapter","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T19:50:15Z","timestamp":1285185015000},"page":"365-379","source":"Crossref","is-referenced-by-count":23,"title":["Automated Verification of UMLsec Models for Security Requirements"],"prefix":"10.1007","author":[{"given":"Jan","family":"J\u00fcrjens","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pasha","family":"Shabalin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Breu, R., Popp, G.: Actor-centric modeling of user rights. In: Wermelinger and Margaria [WM04], pp. 165\u2013179","DOI":"10.1007\/978-3-540-24721-0_12"},{"key":"26_CR2","first-page":"380","volume-title":"ISADS 1999","author":"S.M. Cho","year":"2001","unstructured":"Cho, S.M., Bae, D.-H., Cha, S.D., Kim, Y.G., Yoo, B.K., Kim, S.T.: Applying model checking to concurrent object-oriented software. In: ISADS 1999, pp. 380\u2013383. IEEE Computer Society, Los Alamitos (2001)"},{"key":"26_CR3","doi-asserted-by":"crossref","first-page":"1519","DOI":"10.1145\/967900.968204","volume-title":"SAC","author":"A. Cavarra","year":"2004","unstructured":"Cavarra, A., Riccobene, E., Scandurra, P.: A framework to simulate UML models: moving from a semi-formal to a formal environment. In: SAC, pp. 1519\u20131523. ACM, New York (2004)"},{"key":"26_CR4","unstructured":"Dirckze, R.: Java Metadata Interface (JMI) API 1.0 Specification (June 2002), Available at http:\/\/jcp.org\/aboutJava\/communityprocess\/final\/jsr040\/index.html"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Engels, G., K\u00fcster, J., Heckel, R., Lohmann, M.: Model-based verification and validation of properties. Electr. Notes Theor. Comput. Sci.\u00a082(7) (2003)","DOI":"10.1016\/S1571-0661(04)80752-7"},{"key":"26_CR6","unstructured":"Gentleware, February 2004 (2003), http:\/\/www.gentleware.com"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"H\u00f6hn, S., J\u00fcrjens, J.: Automated checking of SAP security permissions. In: 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), Lausanne, Switzerland, November 13-14, IFIP, Kluwer (2003)","DOI":"10.1007\/1-4020-7901-X_2"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Huber, F., Molterer, S., Rausch, A., Sch\u00e4tz, B., Sihling, M., Slotosch, O.: Tool supported specification and simulation of distributed systems. In: International Symposium on Software Engineering for Parallel and Distributed Systems, pp. 155\u2013164 (1998)","DOI":"10.1109\/PDSE.1998.668174"},{"key":"26_CR9","volume-title":"The Spin Model Checker","author":"G. Holzmann","year":"2003","unstructured":"Holzmann, G.: The Spin Model Checker. Addison-Wesley, Reading (2003)"},{"key":"26_CR10","unstructured":"Houmb, S., Winther, R.: Security assessment object language (SOL). In: Software and Systems Modeling, Special issue on the CSDUML workshop (2004) (to be published)"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"26_CR12","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2004","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2004)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Kim, D., Ray, I., France, R., Li, N.: Modeling role-based access control using parameterized UML models. In: Wermelinger and Margaria [WM04], pp. 180 \u2013 193","DOI":"10.1007\/978-3-540-24721-0_13"},{"key":"26_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1007\/3-540-46852-8_31","volume-title":"\u00abUML\u00bb \u201999 - The Unified Modeling Language. Beyond the Standard","author":"J. Lilius","year":"1999","unstructured":"Lilius, J., Porres, I.: Formalising UML state machines for model checking. In: France, R.B., Rumpe, B. (eds.) UML 1999. LNCS, vol.\u00a01723, pp. 430\u2013445. Springer, Heidelberg (1999)"},{"key":"26_CR15","unstructured":"Matula, M.: Netbeans Metadata Repository, MDR (2003), Available from http:\/\/mdr.netbeans.org"},{"key":"26_CR16","unstructured":"Object Management Group. OMG XML Metadata Interchange (XMI) Specification (January 2002), Available at http:\/\/www.omg.org\/cgi-bin\/doc?formal\/2002-01-01 (February 2004)"},{"key":"26_CR17","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"26_CR18","series-title":"ENTCS","volume-title":"Workshop on Software Model Checking","author":"T. Sch\u00e4fer","year":"2001","unstructured":"Sch\u00e4fer, T., Knapp, A., Merz, S.: Model checking UML state machines and collaborations. In: Stoller, S.D., Visser, W. (eds.) Workshop on Software Model Checking. ENTCS, vol.\u00a055, Elsevier, Amsterdam (2001)"},{"issue":"1","key":"26_CR19","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1021860700141","volume":"10","author":"P. Stevens","year":"2003","unstructured":"Stevens, P.: Small-scale XMI programming; a revolution in UML tool use? Journal of Automated Software Engineering\u00a010(1), 7\u201321 (2003)","journal-title":"Journal of Automated Software Engineering"},{"key":"26_CR20","unstructured":"http:\/\/www4.in.tum.de\/~umlsec"},{"key":"26_CR21","series-title":"Lecture Notes in Computer Science","volume-title":"Fundamental Approaches to Software Engineering","year":"2004","unstructured":"Wermelinger, M., Margaria, T. (eds.): FASE 2004. LNCS, vol.\u00a02984. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","&lt;\u2009&lt;UML&gt;\u2009&gt; 2004 - The Unified Modeling Language. Modelling Languages and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30187-5_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T00:19:22Z","timestamp":1740529162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30187-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540233077","9783540301875"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30187-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}