{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:50:57Z","timestamp":1743141057992,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540203001"},{"type":"electronic","value":"9783540396505"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-39650-5_14","type":"book-chapter","created":{"date-parts":[[2010,6,25]],"date-time":"2010-06-25T15:20:21Z","timestamp":1277479221000},"page":"235-252","source":"Crossref","is-referenced-by-count":9,"title":["Bridging Model-Based and Language-Based Security"],"prefix":"10.1007","author":[{"given":"Rogardt","family":"Heldal","sequence":"first","affiliation":[]},{"given":"Fredrik","family":"Hultin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Bell, D., LaPadula, L.: Secure Computer Systems:Mathematical Foundations and Model. Technical Report MTR 2547 v2, The MITRE Corporation (November 1973)"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1007\/BFb0100652","volume-title":"High-Performance Computing and Networking","author":"B. Blobel","year":"1999","unstructured":"Blobel, B., Pharow, P., Roger-France, F.: Security Analysis and Design Based on a General Conceptual Security Model and UML. In: Sloot, P.M.A., Hoekstra, A.G., Bubak, M., Hertzberger, B. (eds.) HPCN-Europe 1999. LNCS, vol.\u00a01593, pp. 918\u2013930. Springer, Heidelberg (1999)"},{"key":"14_CR3","volume-title":"Writing Effective Use Cases","author":"A. Cockburn","year":"2001","unstructured":"Cockburn, A.: Writing Effective Use Cases. Addison-Wesley, Reading (2001)"},{"issue":"7","key":"14_CR4","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Epstein, P., Sandhu, R.: Towards A UML Based Approach to Role Engineering. In: RBAC 1999, Proceedings of the Fourth ACM Workshop on Role-Based Access Control, October 28-29, pp. 135\u2013143 (1999)","DOI":"10.1145\/319171.319184"},{"key":"14_CR6","volume-title":"The Java Language Specification","author":"J. Gosling","year":"1996","unstructured":"Gosling, J., Joy, B., Steele, G.: The Java Language Specification. Addison-Wesley, Reading (1996)"},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/3-540-45800-X_10","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"G. G\u00e9nova","year":"2002","unstructured":"G\u00e9nova, G., Llorens, J., O\u0327uintana, V.: Digging into use case relationships. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 115\u2013127. Springer, Heidelberg (2002)"},{"key":"14_CR8","unstructured":"Houmb, S.H., Braber, F., Soldal Lund, M., Stolen, K.: Towards a UML Profile for Model-Based Risk Assessment. In: Critical Systems Development with UML-Proceedings of of the UML 2002 workshop, pp. 79\u201391 (September 2002)"},{"key":"14_CR9","series-title":"Number ISBN 0-201-57169-2 in Object Technology","volume-title":"The Unified Software Development Process","author":"I. Jacobson","year":"1999","unstructured":"Jacobson, I., Booch, G., Rumbaugh, J.: The Unified Software Development Process. Number ISBN 0-201-57169-2 in Object Technology. Addison-Wesley, Reading (1999)"},{"key":"#cr-split#-14_CR10.1","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J.: Secure Java Development with UMLsec. In: De Decker, B., Piessens, F., Smits, J., Van Herrenweghen, E. (eds.) Advances in Network and Distributed Systems Security, Leuven (Belgium), November 26-27, pp. 107-124 (2001)","DOI":"10.1007\/0-306-46958-8_8"},{"key":"#cr-split#-14_CR10.2","unstructured":"International Federation for Information Processing (IFIP) TC-11 WG 11.4, klu. Proceedings of the First Annual Working Conference on Network Security (I-NetSec 2001) (2001)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-45314-8_14","volume-title":"Fundamental Approaches to Software Engineering","author":"J. J\u00fcrjens","year":"2001","unstructured":"J\u00fcrjens, J.: Towards Development of Secure Systems using UMLsec. In: Hu\u00dfmann, H. (ed.) FASE 2001. LNCS, vol.\u00a02029, pp. 187\u2013200. Springer, Heidelberg (2001)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for Secure Systems Development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"14_CR13","unstructured":"Biba, K.J.: Integrity consideration for secure computer system. Technical Report ESDTR-76-372,MTR-3153, The MITRE Corporation, Bedford,MA (April 1977)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Kozen, D.: Language-Based Security. In: Mathematical Foundations of Computer Science, pp. 284\u2013298 (1999)","DOI":"10.1007\/3-540-48340-3_26"},{"issue":"10","key":"14_CR15","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/362375.362389","volume":"16","author":"B.W. Lampson","year":"1973","unstructured":"Lampson, B.W.: A Note on the Confinement Problem. Communications of the ACM\u00a016(10), 613\u2013615 (1973)","journal-title":"Communications of the ACM"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UMLBased Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Myers, A.C., Liskov, B.: A Decentralized Model for Information Flow Control. In: Symposium on Operating Systems Principles, pp. 129\u2013142 (1997)","DOI":"10.1145\/269005.266669"},{"key":"14_CR18","unstructured":"Myers, A.C., Liskov, B.: Complete, Safe Information Flow with Decentralized Labels. In: RSP: 19th IEEE Computer Society Symposium on Research in Security and Privacy (1998)"},{"issue":"4","key":"14_CR19","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1145\/363516.363526","volume":"9","author":"A.C. Myers","year":"2000","unstructured":"Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology\u00a09(4), 410\u2013442 (2000)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1109\/CSFW.2001.930142","volume-title":"Proceedings of the 14th IEEE Computer Security Foundations Workshop","author":"H. Mantel","year":"2001","unstructured":"Mantel, H., Sabelfeld, A.: A Generic Approach to the Security of Multi- Threaded Programs. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, pp. 126\u2013142. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Myers, A.: Mostly-Static Decentralized Information Flow Control. Technical Report MIT\/LCS\/TR-783, MIT (1999)","DOI":"10.1145\/292540.292561"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: Practical Mostly-Static Information Flow Control. In: Symposium on Principles of Programming Languages, pp. 228\u2013241 (1999)","DOI":"10.1145\/292540.292561"},{"key":"14_CR23","unstructured":"OMG. Unified Modeling Language Specification"},{"key":"14_CR24","series-title":"Number ISBN 0-201-30998-X in Object Technology","volume-title":"The Unified Modeling Language Reference Manual","author":"J. Rumbaugh","year":"1999","unstructured":"Rumbaugh, J., Jacobson, I., Booch, G.: The Unified Modeling Language Reference Manual. Number ISBN 0-201-30998-X in Object Technology. Addison-Wesley, Reading (1999)"},{"issue":"1","key":"14_CR25","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-Based Information-Flow Security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"14_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/3-540-44577-3_6","volume-title":"Informatics","author":"F.B. Schneider","year":"2001","unstructured":"Schneider, F.B., Morrisett, G., Harper, R.: A Language-Based Approach to Security. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol.\u00a02000, pp. 86\u2013101. Springer, Heidelberg (2001)"},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Volpano, D.M., Smith, G.: Verifying Secrets and Relative Secrecy. In: Symposium on Principles of Programming Languages, pp. 268\u2013276 (2000)","DOI":"10.1145\/325694.325729"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2003"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-39650-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:26:52Z","timestamp":1559507212000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-39650-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540203001","9783540396505"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-39650-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}