{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:48:55Z","timestamp":1760586535444},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540233077"},{"type":"electronic","value":"9783540301875"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30187-5_27","type":"book-chapter","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T19:50:15Z","timestamp":1285185015000},"page":"380-394","source":"Crossref","is-referenced-by-count":13,"title":["Extending OCL for Secure Database Development"],"prefix":"10.1007","author":[{"given":"Eduardo","family":"Fern\u00e1ndez-Medina","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mario","family":"Piattini","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"27_CR1","volume-title":"The Unified Modeling Language, User Guide","author":"G. Booch","year":"1999","unstructured":"Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modeling Language, User Guide. Addison-Wesley, Redwood city (1999)"},{"unstructured":"Charpentier, R., Salois, M.: Security Modelling for C2IS in UML\/OCL. In: 8th ICCRTS, Washington DC (2003)","key":"27_CR2"},{"key":"27_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-functional requirements in software engineering","author":"L. Chung","year":"2000","unstructured":"Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-functional requirements in software engineering. Kluwer Academic Publishers, Dordrecht (2000)"},{"key":"27_CR4","series-title":"Object Technology Series","volume-title":"Building Web Applications with UML","author":"J. Conallen","year":"2000","unstructured":"Conallen, J.: Building Web Applications with UML. Object Technology Series. Addison-Wesley, Reading (2000)"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-45669-4_7","volume-title":"Object Modeling with the OCL","author":"S. Cook","year":"2002","unstructured":"Cook, S., Kleppe, A., Mitchell, R., Rumpe, B., Warmer, J., Wills, A.: The Amsterdam Manifesto on OCL. In: Clark, T., Warmer, J. (eds.) Object Modeling with the OCL, pp. 115\u2013149. Springer, Heidelberg (2002)"},{"issue":"1","key":"27_CR6","first-page":"40","volume":"9","author":"S. Cota","year":"2004","unstructured":"Cota, S.: For Certain Eyes Only. DB2 Magazine\u00a09(1), 40\u201345 (2004)","journal-title":"DB2 Magazine"},{"unstructured":"Database, D.U.: DB2 UDB for Z\/OS v.8 (2004)","key":"27_CR7"},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1007\/3-540-46852-8_42","volume-title":"\u00abUML\u00bb \u201999 - The Unified Modeling Language. Beyond the Standard","author":"B. Demuth","year":"1999","unstructured":"Demuth, B., Hussmann, H.: Using UML\/OCL Constraints for Relational Database Design. In: France, R.B., Rumpe, B. (eds.) UML 1999. LNCS, vol.\u00a01723, pp. 598\u2013613. Springer, Heidelberg (1999)"},{"key":"27_CR9","first-page":"227","volume-title":"The Future of Software Engineering","author":"P. Devanbu","year":"2000","unstructured":"Devanbu, P., Stubblebine, S.: Software engineering for security: a roadmap. In: Finkelstein, A. (ed.) The Future of Software Engineering, pp. 227\u2013239. ACM Press, New York (2000)"},{"issue":"7","key":"27_CR10","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/341852.341877","volume":"43","author":"G. Dhillon","year":"2000","unstructured":"Dhillon, G., Backhouse, J.: Information system security management in the new millennium. Communications of the ACM\u00a043(7), 125\u2013128 (2000)","journal-title":"Communications of the ACM"},{"unstructured":"Fernandez, E.B., Pan, R.Y.: A pattern language for security models. In: 8th Conference on Patterns Languages of Programs (PLOP 2001), Illinois, USA (2001)","key":"27_CR11"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"886","DOI":"10.1007\/978-3-540-45227-0_86","volume-title":"Database and Expert Systems Applications","author":"E. Fern\u00e1ndez-Medina","year":"2003","unstructured":"Fern\u00e1ndez-Medina, E., Piattini, M.: Designing Secure Database for OLS. In: Ma\u0159\u00edk, V., \u0160t\u011bp\u00e1nkov\u00e1, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol.\u00a02736, pp. 886\u2013895. Springer, Heidelberg (2003)"},{"key":"27_CR13","volume-title":"Advanced Databases: Technology Design","author":"E. Ferrari","year":"2000","unstructured":"Ferrari, E., Thuraisingham, B.: Secure Database Systems. In: Piattini, M., D\u00edaz, O. (eds.) Advanced Databases: Technology Design, Artech House, London (2000)"},{"key":"27_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/3-540-45669-4_8","volume-title":"Object Modeling with the OCL","author":"S. Flake","year":"2002","unstructured":"Flake, S., Mueller, W.: An OCL Extension for Real-Time Constraints. In: Clark, A., Warmer, J. (eds.) Object Modeling with the OCL. LNCS, vol.\u00a02263, pp. 150\u2013171. Springer, Heidelberg (2002)"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/3-540-45800-X_8","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"M. Gogolla","year":"2002","unstructured":"Gogolla, M., Henderson-Sellers, B.: Analysis of UML Stereotypes within the UML Metamodel. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, p. 84. Springer, Heidelberg (2002)"},{"issue":"1","key":"27_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/52.976937","volume":"19","author":"A. Hall","year":"2002","unstructured":"Hall, A., Chapman, R.: Correctness by Construction: Developing a Commercial Secure System. IEEE Software\u00a019(1), 18\u201325 (2002)","journal-title":"IEEE Software"},{"doi-asserted-by":"crossref","unstructured":"Hamie, A., Mitchell, R., Howse, J.: Time-Based Constraints in the Object Constraint Language (1999)","key":"27_CR17","DOI":"10.1007\/978-3-540-48480-6_13"},{"key":"27_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"27_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1007\/3-540-40011-7_32","volume-title":"UML 2002","author":"A. Kleppe","year":"2000","unstructured":"Kleppe, A., Warmer, J.: Extending OCL to Include Actions. In: Evans, A., Kent, S., Selic, B. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 440\u2013450. Springer, Heidelberg (2000)"},{"key":"27_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-45669-4_11","volume-title":"Object Modeling with the OCL","author":"A. Kleppe","year":"2002","unstructured":"Kleppe, A., Warmer, J.: The Semantics of the OCL Action Clause. In: Clark, A., Warmer, J. (eds.) Object Modeling with the OCL. LNCS, vol.\u00a02263, pp. 213\u2013227. Springer, Heidelberg (2002)"},{"key":"27_CR21","volume-title":"MDA Explained; The Model Driven Architecture: Practice and Promise","author":"A. Kleppe","year":"2003","unstructured":"Kleppe, A., Warmer, J., Bast, W.: MDA Explained; The Model Driven Architecture: Practice and Promise. Addison-Wesley, Reading (2003)"},{"unstructured":"Levinger, J.: Oracle label security. Administrator\u2019s guide. Release 2 (9.2) (2002), http:\/\/www.csis.gvsu.edu\/GeneralInfo\/Oracle\/network.920\/a96578.pdf","key":"27_CR22"},{"issue":"4","key":"27_CR23","first-page":"22","volume":"9","author":"D. Marks","year":"1996","unstructured":"Marks, D., Sell, P., Thuraisingham, B.: MOMT: A multi-level object modeling tech-nique for designing secure database applications. Journal of Object-Oriented Programming\u00a09(4), 22\u201329 (1996)","journal-title":"Journal of Object-Oriented Programming"},{"key":"27_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-540-45221-8_26","volume-title":"\u00abUML\u00bb 2003 - The Unified Modeling Language. Modeling Languages and Applications","author":"I. Nunes","year":"2003","unstructured":"Nunes, I.: An OCL Extension for Low-coupling Preserving Contracts. In: Stevens, P., Whittle, J., Booch, G. (eds.) UML 2003. LNCS, vol.\u00a02863, pp. 310\u2013324. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Piattini, M., Fern\u00e1ndez-Medina, E.: Specification of Security Constraint in UML. In: 35th Annual 2001 IEEE International Carnahan Conference on Security Technology (ICCST 2001), London, Great Britain (2001)","key":"27_CR25","DOI":"10.1109\/CCST.2001.962829"},{"key":"27_CR26","first-page":"137","volume-title":"Foundations of Security Analysis and Design","author":"P. Samarati","year":"2000","unstructured":"Samarati, P., De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design, pp. 137\u2013196. Springer, Bertinoro (2000)"},{"issue":"11","key":"27_CR27","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1109\/32.106974","volume":"17","author":"G.W. Smith","year":"1991","unstructured":"Smith, G.W.: Modeling security-relevant data semantics. IEEE Transactions on Software Engineering\u00a017(11), 1195\u20131203 (1991)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"27_CR28","volume-title":"The object constraint language","author":"J. Warmer","year":"1998","unstructured":"Warmer, J., Kleppe, A.: The object constraint language. Addison-Wesley, Massachusetts (1998)"},{"key":"27_CR29","series-title":"Getting Your Models Ready for MDA","volume-title":"The Object Constraint Language","author":"J. Warmer","year":"2003","unstructured":"Warmer, J., Kleppe, A.: The Object Constraint Language, 2nd edn. Getting Your Models Ready for MDA. Addison Wesley, Reading (2003)","edition":"2"},{"key":"27_CR30","series-title":"Lecture Notes in Computer Science","volume-title":"Perspectives of Sys-tems Informatics, 5th International Andrei Ershov Memorial Conference","author":"P. Ziemann","year":"2003","unstructured":"Ziemann, P., Gogolla, M.: OCL Extended with Temporal Logic. In: Perspectives of Sys-tems Informatics, 5th International Andrei Ershov Memorial Conference. LNCS, Springer, Akadem-gorodok (2003)"}],"container-title":["Lecture Notes in Computer Science","&lt;\u2009&lt;UML&gt;\u2009&gt; 2004 - The Unified Modeling Language. Modelling Languages and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30187-5_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:46:26Z","timestamp":1605761186000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30187-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540233077","9783540301875"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30187-5_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}