{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:06:29Z","timestamp":1725541589726},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108464"},{"type":"electronic","value":"9783642108471"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10847-1_10","type":"book-chapter","created":{"date-parts":[[2009,11,28]],"date-time":"2009-11-28T03:33:01Z","timestamp":1259379181000},"page":"72-85","source":"Crossref","is-referenced-by-count":4,"title":["Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models"],"prefix":"10.1007","author":[{"given":"Linda Ariani","family":"Gunawan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Herrmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frank Alexander","family":"Kraemer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"10_CR1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R.J. Anderson","year":"2008","unstructured":"Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., New York (2008)"},{"key":"10_CR2","series-title":"IFIP","first-page":"317","volume-title":"IFIPTM 2007","author":"P. Herrmann","year":"2007","unstructured":"Herrmann, P., Kraemer, F.A.: Design of Trusted Systems with Reusable Collaboration Models. In: Etalle, S., Marsh, S. (eds.) IFIPTM 2007. IFIP, vol.\u00a0238, pp. 317\u2013332. Springer, Heidelberg (2007)"},{"key":"10_CR3","unstructured":"Kraemer, F.A.: Engineering Reactive Systems: A Compositional and Model-Driven Method Based on Collaborative Building Blocks. PhD thesis, Norwegian University of Science and Technology (August 2008)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Kraemer, F.A., Sl\u00e5tten, V., Herrmann, P.: Tool Support for the Rapid Composition, Analysis and Implementation of Reactive Services. Journal of Systems and Software (2009)","DOI":"10.1016\/j.jss.2009.06.057"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","volume-title":"MODELS 2009","author":"F.A. Kraemer","year":"2009","unstructured":"Kraemer, F.A., Herrmann, P.: Automated Encapsulation of UML Activities for Incremental Development and Verification. In: Sch\u00fcrr, A., Selic, B. (eds.) MODELS 2009. LNCS, vol.\u00a05795. Springer, Heidelberg (2009)"},{"key":"10_CR6","unstructured":"ISO\/IEC: Common Criteria for Information Technology Security Evaluation, International Standard ISO\/IEC 15408 (1998)"},{"issue":"3-4","key":"10_CR7","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s10660-006-8677-7","volume":"6","author":"P. Herrmann","year":"2006","unstructured":"Herrmann, P., Herrmann, G.: Security-Oriented Refinement of Business Processes. Electronic Commerce Research Journal\u00a06(3-4), 305\u2013335 (2006)","journal-title":"Electronic Commerce Research Journal"},{"issue":"4","key":"10_CR8","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/162124.162127","volume":"25","author":"R. Baskerville","year":"1993","unstructured":"Baskerville, R.: Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys\u00a025(4), 375\u2013414 (1993)","journal-title":"ACM Computing Surveys"},{"key":"10_CR9","volume-title":"Designing Information Systems Security","author":"R. Baskerville","year":"1988","unstructured":"Baskerville, R.: Designing Information Systems Security. Wiley & Sons, Chichester (1988)"},{"key":"10_CR10","unstructured":"CCTA: SSADM-CRAMM Subject Guide for SSADM Version\u00a03 and CRAMM Version\u00a02. CCTA, London (1991)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Kienzle, D.M., Wulf, W.A.: A Practical Approach to Security Assessment. In: Proceedings of the Workshop New Security Paradigms 1997, Lake District (1997)","DOI":"10.1145\/283699.283731"},{"key":"10_CR12","unstructured":"Leiwo, J., Gamage, C., Zheng, Y.: Harmonizer \u2014 A Tool for Processing Information Security Requirements in Organization. In: Proceedings of the 3rd Nordic Workshop on Secure Computer Systems (NORDSEC 1998), Trondheim (1998)"},{"key":"10_CR13","first-page":"341","volume-title":"Proceedings of the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003)","author":"M.S. Lund","year":"2003","unstructured":"Lund, M.S., den Braber, F., St\u00f8len, K.: Maintaining Results from Security Assessments. In: Proceedings of the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003), pp. 341\u2013350. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"10_CR14","volume-title":"Trust Management III","author":"A. Refsdal","year":"2009","unstructured":"Refsdal, A., St\u00f8len, K.: Employing key indicators to provide a dynamic risk picture with a notion of confidence. In: Trust Management III, Boston. Springer, Heidelberg (2009)"},{"key":"10_CR15","first-page":"45","volume-title":"Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001)","author":"P. Herrmann","year":"2001","unstructured":"Herrmann, P.: Information Flow Analysis of Component-Structured Applications. In: Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), New Orleans, pp. 45\u201354. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"10_CR16","unstructured":"Herrmann, P., Krumm, H.: Object-oriented security analysis and modeling. In: Proceedings of the 9th International Conference on Telecommunication Systems \u2014 Modelling and Analysis, Dallas, ATSMA, IFIP, March 2001, pp. 21\u201332 (2001)"},{"key":"10_CR17","unstructured":"http:\/\/people.inf.ethz.ch\/cremersc\/scyther\/"},{"key":"10_CR18","unstructured":"http:\/\/web.comlab.ox.ac.uk\/people\/gavin.lowe\/Security\/Casper\/"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Courtney, R.: Security Risk Assessment in Electronic Data Processing. In: AFIPS Conference Proceedings of the National Computer Conference, vol. 46, Arlington, pp. 97\u2013104 (1977)","DOI":"10.1145\/1499402.1499424"},{"key":"10_CR20","unstructured":"http:\/\/java.sun.com\/javase\/6\/docs\/technotes\/guides\/security\/crypto\/CryptoSpec.html"},{"key":"10_CR21","unstructured":"http:\/\/java.sun.com\/j2se\/1.5.0\/docs\/guide\/security\/jce\/JCERefGuide.html"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Siponen, M., Heikka, J.: Do secure information system design methods provide adequate modeling support? Information and Software Technology\u00a050(9-10) (2008)","DOI":"10.1016\/j.infsof.2007.10.011"},{"issue":"3","key":"10_CR23","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/S0164-1212(01)00150-9","volume":"61","author":"R.B. Vaughn Jr.","year":"2002","unstructured":"Vaughn Jr., R.B., Henning, R., Fox, K.: An empirical study of industrial security-engineering practices. Journal of System and Software\u00a061(3), 225\u2013232 (2002)","journal-title":"Journal of System and Software"},{"issue":"1","key":"10_CR24","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From uml models to access control infrastructures. ACM Transactions on Software Engineering Methodology\u00a015(1), 39\u201391 (2006)","journal-title":"ACM Transactions on Software Engineering Methodology"},{"key":"10_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D.A., Doser, J.: Secureuml: A uml-based modeling language for model-driven security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"10_CR26","volume-title":"Secure System Development with UML","author":"J. J\u00fcrjens","year":"2004","unstructured":"J\u00fcrjens, J.: Secure System Development with UML. Springer, Heidelberg (2004)"},{"key":"10_CR27","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1509297.1509300","volume-title":"AOM 2009: Proceedings of the 13th workshop on Aspect-oriented modeling","author":"D. Mouheb","year":"2009","unstructured":"Mouheb, D., Talhi, C., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: Weaving security aspects into uml 2.0 design models. In: AOM 2009: Proceedings of the 13th workshop on Aspect-oriented modeling, pp. 7\u201312. ACM, New York (2009)"},{"issue":"5","key":"10_CR28","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.infsof.2008.05.004","volume":"51","author":"G. Georg","year":"2009","unstructured":"Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: An aspect-oriented methodology for designing secure applications. Information and Software Technology\u00a051(5), 846\u2013864 (2009); SPECIAL ISSUE: Model-Driven Development for Secure Information Systems","journal-title":"Information and Software Technology"},{"key":"10_CR29","unstructured":"Pavlich-Mariscal, J., Michel, L., Demurjian, S.: Enchancing uml to model custom security aspects. In: AOM 2007: Proceedings of the 11th workshop on Aspect-oriented modeling (2007)"},{"issue":"1","key":"10_CR30","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s10550-007-0013-9","volume":"25","author":"F. Braber","year":"2007","unstructured":"Braber, F., Hogganvik, I., Lund, M.S., St\u00f8len, K., Vraalsen, F.: Model-based security analysis in seven steps \u2014 a guided tour to the coras method. BT Technology Journal\u00a025(1), 101\u2013117 (2007)","journal-title":"BT Technology Journal"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: Practical Mostly-Static Information Flow Control. In: Proceedings of the 26th ACM Symposium on Principles of Programming Languages (POPL 1999), San Antonio (1999)","DOI":"10.1145\/292540.292561"},{"issue":"2","key":"10_CR32","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s10207-007-0019-9","volume":"6","author":"L. Zheng","year":"2007","unstructured":"Zheng, L., Myers, A.C.: Dynamic security labels and static information flow control. International Journal of Information Security\u00a06(2), 67\u201384 (2007)","journal-title":"International Journal of Information Security"}],"container-title":["Communications in Computer and Information Science","Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10847-1_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:42:43Z","timestamp":1619782963000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10847-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108464","9783642108471"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10847-1_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2009]]}}}