{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:57:07Z","timestamp":1725555427503},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642132728"},{"type":"electronic","value":"9783642132735"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13273-5_13","type":"book-chapter","created":{"date-parts":[[2010,5,11]],"date-time":"2010-05-11T15:59:32Z","timestamp":1273593572000},"page":"197-213","source":"Crossref","is-referenced-by-count":9,"title":["Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML"],"prefix":"10.1007","author":[{"given":"D.","family":"Mouheb","sequence":"first","affiliation":[]},{"given":"C.","family":"Talhi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Nouh","sequence":"additional","affiliation":[]},{"given":"V.","family":"Lima","sequence":"additional","affiliation":[]},{"given":"M.","family":"Debbabi","sequence":"additional","affiliation":[]},{"given":"L.","family":"Wang","sequence":"additional","affiliation":[]},{"given":"M.","family":"Pourzandi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"AOM Website: \n                  \n                    http:\/\/www.aspect-modeling.org\/"},{"key":"13_CR2","unstructured":"Bodkin, R.: Enterprise Security Aspects. In: Proc. of the 4th Workshop on AOSD Technology for Application-Level Security (2004)"},{"key":"13_CR3","unstructured":"CUP Parser Generator for Java, \n                  \n                    http:\/\/www2.cs.tum.edu\/projects\/cup\/"},{"key":"13_CR4","first-page":"178","volume-title":"Proc. of the Sixth Intl. Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing","author":"L. Dai","year":"2005","unstructured":"Dai, L., Cooper, K.: Modeling and Analysis of Non-Functional Requirements as Aspects in a UML Based Architecture Design. In: Proc. of the Sixth Intl. Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, pp. 178\u2013183. IEEE Computer Society, Washington (2005)"},{"key":"13_CR5","unstructured":"Dvorak, R.: Model Transformation with Operational QVT (2008), \n                  \n                    http:\/\/www.eclipse.org\/m2m\/qvto\/doc\/M2M-QVTO.pdf"},{"key":"13_CR6","first-page":"7","volume-title":"Proc. of 11th Intl. Workshop on AOM","author":"F. Fleurey","year":"2007","unstructured":"Fleurey, F., Baudry, B., France, R., Ghosh, S.: A Generic Approach for Automatic Model Composition. In: Proc. of 11th Intl. Workshop on AOM, pp. 7\u201315. Springer, Nashville (2007)"},{"issue":"4","key":"13_CR7","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1049\/ip-sen:20040920","volume":"151","author":"R. France","year":"2004","unstructured":"France, R., Ray, I., Georg, G., Ghosh, S.: AO Approach to Early Design Modelling. Software, IEE Proceedings\u00a0151(4), 173\u2013185 (2004)","journal-title":"Software, IEE Proceedings"},{"issue":"7","key":"13_CR8","doi-asserted-by":"crossref","first-page":"109","DOI":"10.5381\/jot.2007.6.7.a5","volume":"6","author":"L. Fuentes","year":"2007","unstructured":"Fuentes, L., S\u00e1nchez, P.: Designing and Weaving AO Executable UML Models. Journal of Object Technology\u00a06(7), 109\u2013136 (2007)","journal-title":"Journal of Object Technology"},{"key":"13_CR9","unstructured":"Gao, S., Deng, Y., Yu, H., He, X., Beznosov, K., Cooper, K.: Applying Aspect-Orientation in Designing Security Systems: A Case Study. In: Proc. of the Intl. Conference of Software Engineering and Knowledge Engineering (2004)"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/11805588_20","volume-title":"Data and Applications Security XX","author":"G. Georg","year":"2006","unstructured":"Georg, G., Houmb, S.H., Ray, I.: Aspect-Oriented Risk-Driven Development of Secure Applications. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol.\u00a04127, pp. 282\u2013296. Springer, Heidelberg (2006)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Groher, I., Voelter, M.: XWeave: Models and Aspects in Concert. In: Proc. of the 10th Workshop on AOM, pp. 35\u201340 (2007)","DOI":"10.1145\/1229375.1229381"},{"key":"13_CR12","unstructured":"IBM-Rational Software Architect, \n                  \n                    http:\/\/www.ibm.com\/software\/awdtools\/architect\/swarchitect\/"},{"key":"13_CR13","unstructured":"Miller, J., Mukerji, J.: MDA Guide Version 1.0.1. Tech. rep., Object Management Group (OMG) (2003)"},{"key":"13_CR14","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1509297.1509300","volume-title":"Proc. of the 13th Workshop on Aspect-Oriented Modeling","author":"D. Mouheb","year":"2009","unstructured":"Mouheb, D., Talhi, C., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: Weaving Security Aspects into UML 2.0 Design Models. In: Proc. of the 13th Workshop on Aspect-Oriented Modeling, pp. 7\u201312. ACM, New York (2009)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/11557432_19","volume-title":"Model Driven Engineering Languages and Systems","author":"P.A. Muller","year":"2005","unstructured":"Muller, P.A., Fleurey, F., J\u00e9z\u00e9quel, J.M.: Weaving Executability into Object-Oriented Meta-Languages. In: Briand, S.K.L. (ed.) MODELS\/UML 2005. LNCS, vol.\u00a03713, pp. 264\u2013278. Springer, Heidelberg (2005)"},{"key":"13_CR16","unstructured":"Pavlich-Mariscal, J., Michel, L., Demurjian, S.: Enhancing UML to Model Custom Security Aspects. In: Proc. of the 11th Workshop on Aspect-Oriented Modeling (2007)"},{"key":"13_CR17","unstructured":"Chitchyan, R., et al.: Survey of Analysis and Design Approaches. Technical Report-AOSD-Europe-ULANC-9 (2005)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-Based Access Control: Towards A Unified Standard. In: Proc. of the fifth ACM workshop on Role-Based Access Control, pp. 47\u201363 (2000)","DOI":"10.1145\/344287.344301"},{"key":"13_CR19","unstructured":"Schauerhuber, A., Schwinger, W., Kapsammer, E., Retschitzegger, W., Wimmer, M., Kappel, G.: A Survey on Aspect-Oriented Modeling Approaches. Technical Report, Vienna University of Technology (2007)"},{"key":"13_CR20","first-page":"31","volume":"14","author":"J. Viega","year":"2001","unstructured":"Viega, J., Bloch, J.T., Chandra, P.: Applying Aspect-Oriented Programming to Security. Cutter IT Journal\u00a014, 31\u201339 (2001)","journal-title":"Cutter IT Journal"},{"key":"13_CR21","unstructured":"Win, B.D.: Engineering Application Level Security through Aspect-Oriented Software Development. PhD Thesis, Katholieke Universiteit Leuven (2004)"},{"issue":"1","key":"13_CR22","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.jss.2008.03.067","volume":"82","author":"M. Woodside","year":"2009","unstructured":"Woodside, M., Petriu, D.C., Petriu, D.B., Xu, J., Israr, T., Georg, G., France, R., Bieman, J.M., Houmb, S.H., J\u00fcrjens, J.: Performance Analysis of Security Aspects by Weaving Scenarios Extracted from UML Models. Journal of Systems and Software\u00a082(1), 56\u201374 (2009)","journal-title":"Journal of Systems and Software"},{"key":"13_CR23","unstructured":"Zhang, G., Baumeister, H., Koch, N., Knapp, A.: AO Modeling of Access Control in Web Applications. In: Proc. of the 6th Workshop on Aspect-Oriented Modeling (2005)"},{"issue":"7","key":"13_CR24","doi-asserted-by":"crossref","first-page":"89","DOI":"10.5381\/jot.2007.6.7.a4","volume":"6","author":"J. Zhang","year":"2007","unstructured":"Zhang, J., Cottenier, T., Berg, A., Gray, J.: Aspect Composition in the Motorola Aspect-Oriented Modeling Weaver. Journal of Object Technology. Special Issue on AOM\u00a06(7), 89\u2013108 (2007)","journal-title":"Journal of Object Technology. Special Issue on AOM"}],"container-title":["Studies in Computational Intelligence","Software Engineering Research, Management and Applications 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13273-5_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T11:59:43Z","timestamp":1619783983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13273-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642132728","9783642132735"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13273-5_13","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2010]]}}}