{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:42:11Z","timestamp":1755999731660},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642037474"},{"type":"electronic","value":"9783642037481"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03748-1_12","type":"book-chapter","created":{"date-parts":[[2009,8,22]],"date-time":"2009-08-22T01:10:34Z","timestamp":1250903434000},"page":"115-126","source":"Crossref","is-referenced-by-count":3,"title":["An MDA-Based Environment for Generating Access Control Policies"],"prefix":"10.1007","author":[{"given":"Heiko","family":"Klarl","sequence":"first","affiliation":[]},{"given":"Florian","family":"Marm\u00e9","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Wolff","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Emig","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Abeck","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","first-page":"457","volume-title":"Proceedings of the 1st International Conference on Availability, Reliability and Security","author":"T. Neubauer","year":"2006","unstructured":"Neubauer, T., Klemen, M., Biffl, S.: Secure business process management: A roadmap. In: Proceedings of the 1st International Conference on Availability, Reliability and Security, pp. 457\u2013464. IEEE Computer Society, Los Alamitos (2006)"},{"key":"12_CR2","volume-title":"Business Process Management \u2013 Concepts, Languages, Architectures","author":"M. Weske","year":"2007","unstructured":"Weske, M.: Business Process Management \u2013 Concepts, Languages, Architectures. Springer, Berlin (2007)"},{"key":"12_CR3","unstructured":"Object Management Group, Inc.: Model Driven Architecture (MDA) (July 2001)"},{"key":"12_CR4","unstructured":"Object Management Group, Inc.: MDA Guide \u2013 Version 1.0.1 (June 2003)"},{"key":"12_CR5","volume-title":"Model Driven Architecture: Applying MDA to Enterprise Computing","author":"D.S. Frankel","year":"2003","unstructured":"Frankel, D.S.: Model Driven Architecture: Applying MDA to Enterprise Computing. Wiley, Indianapolis (2003)"},{"key":"12_CR6","volume-title":"Proceedings of the International Conference on Software Engineering Advances","author":"C. Emig","year":"2007","unstructured":"Emig, C., Brandt, F., Abeck, S., Biermann, J., Klarl, H.: An access control metamodel for web service-oriented architecture. In: Proceedings of the International Conference on Software Engineering Advances, IEEE Computer Society, Los Alamitos (2007)"},{"key":"12_CR7","unstructured":"Emig, C., Kreuzer, S., Abeck, S., Biermann, J., Klarl, H.: Model-driven development of access control policies for web services. In: Khoshgoftaar, T. (ed.) Proceedings of the 9th IASTED International Conference Software Engineering and Applications, Orlando, Florida, USA, pp. 165\u2013171. IASTED (November 2008)"},{"key":"12_CR8","unstructured":"Klarl, H., Wolff, C., Emig, C.: Abbildung von Zugriffskontrollaussagen in Gesch\u00e4ftsprozessmodellen. In: Modellierung 2008 \u2013 Workshop Verhaltensmodellierung: Best Practices und neue Erkenntnisse, Berlin (March 2008)"},{"key":"12_CR9","unstructured":"Klarl, H., Wolff, C., Emig, C.: Identity management in business process modelling: A model-driven approach. In: 9. Internationale Tagung Wirtschaftsinformatik \u2013 Business Services: Konzepte, Technologien, Anwendungen, Band 1, Vienna, Austria, \u00d6sterreichische Computer Gesellschaft (February 2009), pp. 161\u2013170 (2009)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Lang, U., Schreiner, R.: Model driven security management: Making security management manageable in complex distributed systems. In: Modeling Security Workshop in Association with MODELS 2008, Toulouse, France (2008)","DOI":"10.1145\/1463342.1463344"},{"issue":"7","key":"12_CR11","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/792704.792706","volume":"46","author":"J. Rees","year":"2003","unstructured":"Rees, J., Bandyopadhyay, S., Spafford, E.H.: PFIRES: a policy framework for information security. Communicaiton of the ACM\u00a046(7), 101\u2013106 (2003)","journal-title":"Communicaiton of the ACM"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-540-76292-8_13","volume-title":"Advances in Conceptual Modeling Foundations and Applications","author":"A. Rodr\u00edguez","year":"2007","unstructured":"Rodr\u00edguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: M-BPSec: A method for security requirement elicitation from a UML 2.0 business process specification. In: Hainaut, J.-L., Rundensteiner, E.A., Kirchberg, M., Bertolotto, M., Brochhausen, M., Chen, Y.-P.P., Cherfi, S.S.-S., Doerr, M., Han, H., Hartmann, S., Parsons, J., Poels, G., Rolland, C., Trujillo, J., Yu, E., Zim\u00e1nyie, E. (eds.) ER Workshops 2007. LNCS, vol.\u00a04802, pp. 106\u2013115. Springer, Heidelberg (2007)"},{"issue":"4","key":"12_CR13","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1147\/sj.444.0847","volume":"44","author":"N. Nagaratnam","year":"2005","unstructured":"Nagaratnam, N., Nadalin, A., Hondo, M., McIntosh, M., Austel, P.: Business-driven application security: From modeling to managing secure applications. IBM Systems Journal\u00a044(4), 847\u2013867 (2005)","journal-title":"IBM Systems Journal"},{"key":"12_CR14","volume-title":"Proceedings of the International Conference on Internet and Web Applications and Services","author":"C. Emig","year":"2006","unstructured":"Emig, C., Weisser, J., Abeck, S.: Development of SOA-based software systems - an evolutionary programming approach. In: Proceedings of the International Conference on Internet and Web Applications and Services. IEEE Computer Society, Los Alamitos (2006)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03748-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T23:54:11Z","timestamp":1558482851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03748-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642037474","9783642037481"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03748-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}