{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:55:11Z","timestamp":1725530111340},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642005923"},{"type":"electronic","value":"9783642005930"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00593-0_22","type":"book-chapter","created":{"date-parts":[[2009,3,27]],"date-time":"2009-03-27T10:26:08Z","timestamp":1238149568000},"page":"325-339","source":"Crossref","is-referenced-by-count":10,"title":["Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks"],"prefix":"10.1007","author":[{"given":"Frank","family":"Hermann","sequence":"first","affiliation":[]},{"given":"Hartmut","family":"Ehrig","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Ermel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"AGG Homepage, http:\/\/tfs.cs.tu-berlin.de\/agg"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Mouratidis, H., Giorgini, P. (eds.): Integrating Security and Software Engineering: Advances and Future Vision. Idea Group, IGI Publishing Group (2006)","DOI":"10.4018\/978-1-59904-147-6"},{"key":"22_CR3","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)"},{"issue":"1","key":"22_CR4","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"C. Haley","year":"2008","unstructured":"Haley, C., Moffett, J., Nuseibeh, B.: Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Trans. on Software Engineering\u00a034(1), 133\u2013153 (2008)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"22_CR5","unstructured":"Object Management Group: Meta-Object Facility (MOF), Version 2.0. (2006), http:\/\/www.omg.org\/technology\/documents\/formal\/mof.htm"},{"key":"22_CR6","series-title":"EATCS Monographs in Theor. Comp. Science","volume-title":"Fundamentals of Algebraic Graph Transformation","author":"H. Ehrig","year":"2006","unstructured":"Ehrig, H., Ehrig, K., Prange, U., Taentzer, G.: Fundamentals of Algebraic Graph Transformation. EATCS Monographs in Theor. Comp. Science. Springer, Heidelberg (2006)"},{"key":"22_CR7","unstructured":"Braatz, B., Brandt, C., Engel, T., Hermann, F., Ehrig, H.: An approach using formally well-founded domain languages for secure coarse-grained IT system modelling in a real-world banking scenario. In: Proc. 18th Australasian Conference on Information Systems (ACIS 2007) (2007)"},{"key":"22_CR8","unstructured":"Federal Office for Information Security\u00a0(BSI): Chapter IV: Secure Client-Server Architectures for E-Government. In: E-Government Manual. INTESIO 1\u2013179 (2006), http:\/\/www.bsi.bund.de\/english\/topics\/egov\/6verb"},{"issue":"3","key":"22_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.tcs.2007.02.001","volume":"376","author":"J. Lara","year":"2007","unstructured":"Lara, J., Bardohl, R., Ehrig, H., Ehrig, K., Prange, U., Taentzer, G.: Attributed Graph Transformation with Node Type Inheritance. Theoretical Computer Science\u00a0376(3), 139\u2013163 (2007)","journal-title":"Theoretical Computer Science"},{"issue":"3,4","key":"22_CR10","doi-asserted-by":"crossref","first-page":"287","DOI":"10.3233\/FI-1996-263404","volume":"26","author":"A. Habel","year":"1996","unstructured":"Habel, A., Heckel, R., Taentzer, G.: Graph Grammars with Negative Application Conditions. Special issue of Fundamenta Informaticae\u00a026(3,4), 287\u2013313 (1996)","journal-title":"Special issue of Fundamenta Informaticae"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-78743-3_5","volume-title":"Fundamental Approaches to Software Engineering","author":"H. Ehrig","year":"2008","unstructured":"Ehrig, H., Ehrig, K., Ermel, C., Prange, U.: Consistent Integration of Models Based on Views of Visual Languages. In: Fiadeiro, J.L., Inverardi, P. (eds.) FASE 2008. LNCS, vol.\u00a04961, pp. 62\u201376. Springer, Heidelberg (2008)"},{"key":"22_CR12","unstructured":"Object Management Group: Unified Modeling Language: Superstructure \u2013 Version 2.1.1. formal\/07-02-05 (2007), http:\/\/www.omg.org\/technology\/documents\/formal\/uml.htm"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Mens, T., Taentzer, G., M\u00fcller, D.: Model-driven software refactoring. In: Rech, J., Bunse, C. (eds.) Model-Driven Software Development: Integrating Quality Assurance, pp. 170\u2013203. Idea Group Inc. (2008)","DOI":"10.4018\/978-1-60566-006-6.ch008"},{"issue":"3","key":"22_CR14","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10270-006-0044-6","volume":"6","author":"T. Mens","year":"2007","unstructured":"Mens, T., Taentzer, G., Runge, O.: Analysing refactoring dependencies using graph transformation. Software and System Modeling\u00a06(3), 269\u2013285 (2007)","journal-title":"Software and System Modeling"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/3-540-28554-7_5","volume-title":"Model-driven Software Development","author":"L. Grunske","year":"2005","unstructured":"Grunske, L., Geiger, L., Z\u00fcndorf, A., Van Eetvelde, N., Van Gorp, P., Varro, D.: Using Graph Transformation for Practical Model Driven Software Engineering. In: Beydeda, S., Book, M., Gruhn, V. (eds.) Model-driven Software Development, pp. 91\u2013118. Springer, Heidelberg (2005)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Bottoni, P., Parisi-Presicce, P., Mason, G., Taentzer, G.: Specifying Coherent Refactoring of Software Artefacts with Distributed Graph Transformations. In: van Bommel, P. (ed.) Handbook on Transformation of Knowledge, Information, and Data: Theory and Applications, pp. 95\u2013125. Idea Group Publishing (2005)","DOI":"10.4018\/978-1-59140-527-6.ch005"},{"key":"22_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/11880240_30","volume-title":"Model Driven Engineering Languages and Systems","author":"E. Biermann","year":"2006","unstructured":"Biermann, E., Ehrig, K., K\u00f6hler, C., Kuhns, G., Taentzer, G., Weiss, E.: Graphical Definition of In-Place Transformations in the Eclipse Modeling Framework. In: Nierstrasz, O., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol.\u00a04199, pp. 425\u2013439. Springer, Heidelberg (2006)"},{"key":"22_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/3-540-59071-4_45","volume-title":"Graph-Theoretic Concepts in Computer Science","author":"A. Sch\u00fcrr","year":"1995","unstructured":"Sch\u00fcrr, A.: Specification of Graph Translators with Triple Graph Grammars. In: Mayr, E.W., Schmidt, G., Tinhofer, G. (eds.) WG 1994. LNCS, vol.\u00a0903, pp. 151\u2013163. Springer, Heidelberg (1995)"},{"key":"22_CR19","unstructured":"L\u00f6we, M., K\u00f6nig, H., Peters, M., Schulz, C.: Refactoring Information Systems. In: Proc. Software Evolution through Transformations: Embracing the Chance (SeTra 2006). Electronic Communications of the EASST, vol.\u00a03 (2006)"},{"key":"22_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1007\/11841883_4","volume-title":"Graph Transformations","author":"A. Corradini","year":"2006","unstructured":"Corradini, A., Heindel, T., Hermann, F., K\u00f6nig, B.: Sesqui-Pushout Rewriting. In: Corradini, A., Ehrig, H., Montanari, U., Ribeiro, L., Rozenberg, G. (eds.) ICGT 2006. LNCS, vol.\u00a04178, pp. 30\u201345. Springer, Heidelberg (2006)"},{"key":"22_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-540-24721-0_16","volume-title":"Fundamental Approaches to Software Engineering","author":"R. Bardohl","year":"2004","unstructured":"Bardohl, R., Ehrig, H., de Lara, J., Taentzer, G.: Integrating Meta-Modelling with Graph Transformation for Efficient Visual Language Definition and Model Manipulation. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol.\u00a02984, pp. 214\u2013228. Springer, Heidelberg (2004)"},{"key":"22_CR22","unstructured":"Hermann, F., Ehrig, H., Ermel, C.: Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks (Long Version). Technical Report 2008\/07, TU Berlin, Fak. IV (2008), http:\/\/iv.tu-berlin.de\/TechnBerichte\/2008\/2008-07.pdf"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00593-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T04:14:55Z","timestamp":1589688895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00593-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642005923","9783642005930"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00593-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}