{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T05:17:02Z","timestamp":1738300622013,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540682646"},{"type":"electronic","value":"9783540682653"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68265-3_10","type":"book-chapter","created":{"date-parts":[[2008,6,4]],"date-time":"2008-06-04T15:35:39Z","timestamp":1212593739000},"page":"153-168","source":"Crossref","is-referenced-by-count":8,"title":["Advice for Coordination"],"prefix":"10.1007","author":[{"given":"Chris","family":"Hankin","sequence":"first","affiliation":[]},{"given":"Flemming","family":"Nielson","sequence":"additional","affiliation":[]},{"given":"Hanne","family":"Riis Nielson","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Andrews., J.H.: Process-Algebraic Foundations of Aspect-Oriented Programming. Metalevel Architectures and Separation of Crosscutting Concerns: Third International Conference (2001)","DOI":"10.1007\/3-540-45429-2_14"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/11687061_5","volume":"3880","author":"I. Aracic","year":"2006","unstructured":"Aracic, I., Gasiunas, V., Mezini, M., Ostermann, K.: An Overview of CaesarJ. Transactions on Aspect-Oriented Software Development\u00a03880, 135\u2013173 (2006)","journal-title":"Transactions on Aspect-Oriented Software Development"},{"key":"10_CR3","volume-title":"ACM SIGPLAN Conference on Programming Language Design and Implementation","author":"P. Avgustinov","year":"2005","unstructured":"Avgustinov, P., Christensen, A.S., Hendren, L., Kuzins, S., Lhot\u00e1k, J., Lhot\u00e1k, O., de Moor, O., Sereni, D., Sittampalam, G., Tibble, J.: Optimising AspectJ. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, ACM Press, New York (2005)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Avgustinov, P., Hajiyev, E., Ongkingco, N., de Moor, O., Sereni, D., Tibble, J., Verbaere, M.: Semantics of static pointcuts in AspectJ. In: Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 11\u201323 (2007)","DOI":"10.1145\/1190216.1190221"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Bettini, L., Bono, V., De Nicola, R., Ferrari, G., Gorla, D., Loreti, M., Moggi, E., Pugliese, R., Tuosto, E., Venneri, B.: The Klaim Project: Theory and Practice (2003)","DOI":"10.1007\/978-3-540-40042-4_4"},{"key":"10_CR6","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/978-3-540-28644-8_14","volume-title":"Proceedings of the 2004 International Conference on Concurrency Theory","author":"G. Bruns","year":"2004","unstructured":"Bruns, G., Jagadeesan, R., Jeffrey, A., Riely, J.: \u03bcabc: A minimal aspect calculus. In: Proceedings of the 2004 International Conference on Concurrency Theory, pp. 209\u2013224. Springer, Heidelberg (2004)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1007\/978-3-540-30209-4_13","volume-title":"Web Services","author":"A. Charfi","year":"2004","unstructured":"Charfi, A., Mezini, M.: Aspect-oriented web service composition with ao4bpel. In: (LJ) Zhang, L.-J., Jeckle, M. (eds.) ECOWS 2004. LNCS, vol.\u00a03250, pp. 168\u2013182. Springer, Heidelberg (2004)"},{"key":"10_CR8","unstructured":"Dantas, D.S.: Analyzing Security Advice in Functional Aspect-oriented Programming Languages. Ph.D Thesis. Princeton University, Computer Science (2007)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Schneider, F.B.: IRM enforcement of java stack inspection. In: IEEE Symposium on Security and Privacy, pp. 246\u2013255 (2000)","DOI":"10.1109\/SECPRI.2000.848461"},{"key":"10_CR10","unstructured":"Gao, S., Deng, Y., Yu, H., He, X., Beznosov, K., Cooper, K.: Applying Aspect-Orientation in Designing Security Systems: A Case Study. The Sixteenth International Conference on Software Engineering and Knowledge Engineering (2004)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Georg, G., Ray, I., France, R.: Using aspects to design a secure system. Engineering of Complex Computer Systems, 117\u2013126 (2002)","DOI":"10.1109\/ICECCS.2002.1181504"},{"key":"10_CR12","unstructured":"Gligor, V.D.: A Guide to Understanding Covert Channel Analysis of Trusted Systems. National Computer Security Center (US) (1994)"},{"key":"10_CR13","volume-title":"Computer Security","author":"D. Gollmann","year":"2006","unstructured":"Gollmann, D.: Computer Security. Wiley, Chichester (2006)"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Jagadeesan, R., Jeffrey, A., Riely, J.: A Calculus of Untyped Aspect-Oriented Programs. In: Ecoop Object-Oriented Programming 17th European Conference (2003)","DOI":"10.1007\/978-3-540-45070-2_4"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An Overview of AspectJ. In: Ecoop Object-Oriented Programming: 15th European Conference (2001)","DOI":"10.1007\/3-540-45337-7_18"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Kiczales, G., Lamping, J., Menhdhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: Aspect-oriented programming. In: Proceedings European Conference on Object-Oriented Programming, pp. 220\u2013242 (1997)","DOI":"10.1007\/BFb0053381"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Masuhara, H., Kawauchi, K.: Dataflow Pointcut in Aspect-Oriented Programming. Programming Languages and Systems: First Asian Symposium (2003)","DOI":"10.1007\/978-3-540-40018-9_8"},{"issue":"5","key":"10_CR18","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1109\/32.685256","volume":"24","author":"R. Nicola De","year":"1998","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R.: Klaim: a kernel language for agents interaction and mobility. Transactions on Software Engineering\u00a024(5), 315\u2013330 (1998)","journal-title":"Transactions on Software Engineering"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/3-540-44618-4_5","volume-title":"CONCUR 2000: Proceedings of the 11th International Conference on Concurrency Theory","author":"R. Nicola De","year":"2000","unstructured":"De Nicola, R., Ferrari, G., Pugliese, R.: Programming access control: The KLAIM experience. In: CONCUR 2000: Proceedings of the 11th International Conference on Concurrency Theory, pp. 48\u201365. Springer, Heidelberg (2000)"},{"issue":"1","key":"10_CR20","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur.\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Verhanneman, T., Piessens, F., De Win, B., Joosen, W.: Uniform Application-level Access Control Enforcement of Organizationwide Policies. In: Proc. 21st Annual Computer Security Applications Conference, pp. 431\u2013440 (2005)","DOI":"10.1109\/CSAC.2005.59"},{"issue":"9","key":"10_CR22","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1145\/944746.944718","volume":"38","author":"D. Walker","year":"2003","unstructured":"Walker, D., Zdancewic, S., Ligatti, J.: A theory of aspects. ACM SIGPLAN Notices\u00a038(9), 127\u2013139 (2003)","journal-title":"ACM SIGPLAN Notices"},{"issue":"5","key":"10_CR23","doi-asserted-by":"publisher","first-page":"890","DOI":"10.1145\/1018203.1018208","volume":"26","author":"M. Wand","year":"2004","unstructured":"Wand, M., Kiczales, G., Dutchyn, C.: A semantics for advice and dynamic join points in aspect-oriented programming. ACM Trans. Program. Lang. Syst.\u00a026(5), 890\u2013910 (2004)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10_CR24","unstructured":"De Win, B., Joosen, W., Piessens, F.: Developing secure applications through aspect-oriented programming. Aspect-Oriented Software Development, 633\u2013650 (2004)"}],"container-title":["Lecture Notes in Computer Science","Coordination Models and Languages"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68265-3_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T15:26:56Z","timestamp":1738250816000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68265-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540682646","9783540682653"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68265-3_10","relation":{},"subject":[]}}