{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:59:01Z","timestamp":1725544741790},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117466"},{"type":"electronic","value":"9783642117473"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11747-3_16","type":"book-chapter","created":{"date-parts":[[2010,1,25]],"date-time":"2010-01-25T01:03:02Z","timestamp":1264381382000},"page":"201-217","source":"Crossref","is-referenced-by-count":9,"title":["Automatic Generation of Smart, Security-Aware GUI Models"],"prefix":"10.1007","author":[{"given":"David","family":"Basin","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Clavel","sequence":"additional","affiliation":[]},{"given":"Marina","family":"Egea","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Schl\u00e4pfer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"16_CR1","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.infsof.2008.05.011","volume":"51","author":"D. Basin","year":"2009","unstructured":"Basin, D., Clavel, M., Doser, J., Egea, M.: Automated analysis of security-design models. Information and Software Technology\u00a051(5), 815\u2013831 (2009)","journal-title":"Information and Software Technology"},{"issue":"1","key":"16_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology\u00a015(1), 39\u201391 (2006)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"doi-asserted-by":"crossref","unstructured":"Blankenhorn, K., Walter, W.: Extending UML to GUI modeling (2004), http:\/\/www.bitfolge.de\/pubs\/MC2004_Poster_Blankenhorn.pdf","key":"16_CR3","DOI":"10.1524\/9783486598773.307"},{"unstructured":"TATA\u00a0Research Development and Design Center. Heavyweight extension of UML for GUI modeling: A template based approach (2001), http:\/\/www.omg.org\/news\/meetings\/workshops\/presentations\/uml2001_presentations\/10-2_Venkatesh_typesasStereotypes.pdf","key":"16_CR4"},{"issue":"3","key":"16_CR5","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for Role-Based access control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"doi-asserted-by":"crossref","unstructured":"Fox, J., J\u00fcrjens, J.: Introducing security aspects with model transformations. In: 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), Greenbelt, MD, USA, April 4-7, pp. 543\u2013549 (2005)","key":"16_CR6","DOI":"10.1109\/ECBS.2005.48"},{"unstructured":"BM1\u00a0Software Group. The SmartGUI Project (2009), http:\/\/www.bm1software.com\/","key":"16_CR7"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1145\/1045446.1045470","volume-title":"TAMODIA 2004: Proceedings of the 3rd annual Conference on Task Models and Diagrams","author":"J. Jelinek","year":"2004","unstructured":"Jelinek, J., Slavik, P.: GUI generation from annotated source code. In: TAMODIA 2004: Proceedings of the 3rd annual Conference on Task Models and Diagrams, pp. 129\u2013136. ACM, New York (2004)"},{"unstructured":"Marschall, F., Braun, P.: Model transformations for the MDA with BOTL. Technical report, University of Twente (2003)","key":"16_CR9"},{"unstructured":"Marschall, F., Braun, P.: Bidirectional object oriented transformation language (2005), http:\/\/sourceforge.net\/projects\/botl\/","key":"16_CR10"},{"key":"16_CR11","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-540-85567-5_21","volume-title":"Knowledge-Based Intelligent Information and Engineering Systems","author":"M. Ogura","year":"2008","unstructured":"Ogura, M., Mineno, H., Ishikaw, N., Osano, T., Mizuno, T.: Automatic GUI Generation for Meta-data Based PUCC Sensor Gateway. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008, Part III. LNCS (LNAI), vol.\u00a05179, pp. 159\u2013166. Springer, Heidelberg (2008)"},{"key":"16_CR12","series-title":"Workshop Proceedings Series","first-page":"42","volume-title":"European Workshop on Security in Model Driven Arquitecture 2009 (SEC-MDA 2009)","author":"M. Schl\u00e4pfer","year":"2009","unstructured":"Schl\u00e4pfer, M., Egea, M., Basin, D., Clavel, M.: Automatic generation of security-aware GUI models. In: Bagnato, A. (ed.) European Workshop on Security in Model Driven Arquitecture 2009 (SEC-MDA 2009). Workshop Proceedings Series, vol.\u00a0WP09-06, pp. 42\u201356. CTIT, Enschede (2009)"},{"key":"16_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1404946.1404947","volume-title":"EA 2008: Proceedings of the 2008 AOSD workshop on Early aspects","author":"A. Yie","year":"2008","unstructured":"Yie, A., Casallas, R., Deridder, D., Van Der Straeten, R.: Multi-step concern refinement. In: EA 2008: Proceedings of the 2008 AOSD workshop on Early aspects, pp. 1\u20138. ACM, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11747-3_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,20]],"date-time":"2021-10-20T18:41:49Z","timestamp":1634755309000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11747-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117466","9783642117473"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11747-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}