{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:42:46Z","timestamp":1743050566032,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642191244"},{"type":"electronic","value":"9783642191251"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19125-1_11","type":"book-chapter","created":{"date-parts":[[2011,1,24]],"date-time":"2011-01-24T05:55:45Z","timestamp":1295848545000},"page":"142-155","source":"Crossref","is-referenced-by-count":3,"title":["A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications"],"prefix":"10.1007","author":[{"given":"Linda Ariani","family":"Gunawan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frank Alexander","family":"Kraemer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Herrmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Mouratidis, H., Giorgini, P.: Integrating Security and Software Engineering: Advances and Future Vision. IGI Global (2006)","DOI":"10.4018\/978-1-59904-147-6"},{"key":"11_CR2","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R.J. Anderson","year":"2008","unstructured":"Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, Inc., Chichester (2008)"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MC.2004.17","volume":"37","author":"B.W. Lampson","year":"2004","unstructured":"Lampson, B.W.: Computer Security in the Real World. Computer\u00a037, 37\u201346 (2004)","journal-title":"Computer"},{"key":"11_CR4","volume-title":"SSL and TLS: Designing and Building Secure Systems","author":"E. Rescorla","year":"2001","unstructured":"Rescorla, E.: SSL and TLS: Designing and Building Secure Systems. Addison-Wesley, Reading (2001)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security Protocol (TLS) version 1.2. The Internet Engineering Task Force (IETF), RFC 5246 (August 2008)","DOI":"10.17487\/rfc5246"},{"issue":"5","key":"11_CR6","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.infsof.2008.05.004","volume":"51","author":"G. Georg","year":"2009","unstructured":"Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: An Aspect-Oriented Methodology for Designing Secure Applications. Information and Software Technology, Special Issue: Model-Driven Development for Secure Information Systems\u00a051(5), 846\u2013864 (2009)","journal-title":"Information and Software Technology, Special Issue: Model-Driven Development for Secure Information Systems"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1509297.1509300","volume-title":"Proceedings of the 13th Workshop on Aspect-Oriented Modeling, AOM 2009","author":"D. Mouheb","year":"2009","unstructured":"Mouheb, D., Talhi, C., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: Weaving security aspects into uml 2.0 design models. In: Proceedings of the 13th Workshop on Aspect-Oriented Modeling, AOM 2009, pp. 7\u201312. ACM, New York (2009)"},{"key":"11_CR8","unstructured":"Kraemer, F.A.: Engineering Reactive Systems: A Compositional and Model-Driven Method Based on Collaborative Building Blocks. PhD thesis, Norwegian University of Science and Technology (August 2008)"},{"issue":"12","key":"11_CR9","doi-asserted-by":"publisher","first-page":"2068","DOI":"10.1016\/j.jss.2009.06.057","volume":"82","author":"F.A. Kraemer","year":"2009","unstructured":"Kraemer, F.A., Sl\u00e5tten, V., Herrmann, P.: Tool Support for the Rapid Composition, Analysis and Implementation of Reactive Services. Journal of Systems and Software\u00a082(12), 2068\u20132080 (2009)","journal-title":"Journal of Systems and Software"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/978-3-642-04425-0_44","volume-title":"Model Driven Engineering Languages and Systems","author":"F.A. Kraemer","year":"2009","unstructured":"Kraemer, F.A., Herrmann, P.: Automated Encapsulation of UML Activities for Incremental Development and Verification. In: Sch\u00fcrr, A., Selic, B. (eds.) MODELS 2009. LNCS, vol.\u00a05795, pp. 571\u2013585. Springer, Heidelberg (2009)"},{"key":"11_CR11","unstructured":"Arctis Website, http:\/\/www.arctis.item.ntnu.no\/"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-13464-7_3","volume-title":"Formal Techniques for Distributed Systems","author":"F.A. Kraemer","year":"2010","unstructured":"Kraemer, F.A., Herrmann, P.: Reactive Semantics for Distributed UML Activities. In: Hatcliff, J., Zucca, E. (eds.) FMOODS 2010. LNCS, vol.\u00a06117, pp. 17\u201331. Springer, Heidelberg (2010)"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1035429.1035431","volume-title":"Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, FMSE 2003","author":"A. Datta","year":"2003","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Secure Protocol Composition. In: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, FMSE 2003, pp. 11\u201323. ACM, New York (2003)"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/3-540-44647-8_19","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"H. Krawczyk","year":"2001","unstructured":"Krawczyk, H.: The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 310\u2013331. Springer, Heidelberg (2001)"},{"key":"11_CR15","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.entcs.2004.12.047","volume":"142","author":"C. Cremers","year":"2006","unstructured":"Cremers, C.: Compositionality of Security Protocols: A Research Agenda. Electronic Notes Theoretical Computer Science\u00a0142, 99\u2013110 (2006)","journal-title":"Electronic Notes Theoretical Computer Science"},{"issue":"4","key":"11_CR16","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/162124.162127","volume":"25","author":"R. Baskerville","year":"1993","unstructured":"Baskerville, R.: Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys\u00a025(4), 375\u2013414 (1993)","journal-title":"ACM Computing Surveys"},{"key":"11_CR17","unstructured":"Kraemer, F.A., Herrmann, P.: Transforming Collaborative Service Specifications into Efficiently Executable State Machines. In: Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2007). Electronic Communications of the EASST, vol.\u00a07. EASST (2007)"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1007\/11914952_41","volume-title":"On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE","author":"F.A. Kraemer","year":"2006","unstructured":"Kraemer, F.A., Herrmann, P., Br\u00e6k, R.: Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services. In: Meersman, R., Tari, Z. (eds.) OTM 2006. LNCS, vol.\u00a04276, pp. 1613\u20131632. Springer, Heidelberg (2006)"},{"key":"11_CR19","unstructured":"SSLEngine from JSSE, http:\/\/java.sun.com\/javase\/6\/docs\/api\/javax\/net\/ssl\/SSLEngine.html"},{"key":"11_CR20","unstructured":"Java Remote Method Invocation, http:\/\/java.sun.com\/javase\/technologies\/core\/basic\/rmi\/"},{"key":"11_CR21","unstructured":"Object Management Group: Common Object Request Broker Architecture (CORBA\/IIOP), version 3.1, formal\/2008-01-08 (January 2008)"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Li, N., Mitchell, J.C., Tong, D.: Securing Java RMI-Based Distributed Applications. In: Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC 2004, pp. 262\u2013271. IEEE Computer Society, Los Alamitos (2004)","DOI":"10.1109\/CSAC.2004.34"},{"key":"11_CR23","unstructured":"Object Management Group: CORBA Security Service, version 1.8, formal\/2002-03-11 (March 2002)"},{"key":"11_CR24","unstructured":"OASIS: Web Services Security, version 1.1 (February 2006)"},{"key":"11_CR25","volume-title":"Secure System Development with UML","author":"J. J\u00fcrjens","year":"2004","unstructured":"J\u00fcrjens, J.: Secure System Development with UML. Springer, Heidelberg (2004)"},{"issue":"1","key":"11_CR26","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML Models to Access Control Infrastructures. ACM Transactions on Software Engineering and Methodology\u00a015(1), 39\u201391 (2006)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"11_CR27","unstructured":"Pavlich-Mariscal, J., Michel, L., Demurjian, S.: Enhancing UML to Model Custom Security Aspects. In: Proceedings of the 11th Workshop on Aspect-Oriented Modeling, AOM 2007 (2007)"},{"key":"11_CR28","series-title":"Wiley Software Patterns Series","volume-title":"Security Patterns : Integrating Security and Systems Engineering","author":"M. Schumacher","year":"2006","unstructured":"Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad: Security Patterns: Integrating Security and Systems Engineering. Wiley Software Patterns Series. John Wiley & Sons, Chichester (2006)"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-540-70545-1_38","volume-title":"Computer Aided Verification","author":"C.J. Cremers","year":"2008","unstructured":"Cremers, C.J.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.\u00a05123, pp. 414\u2013418. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19125-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T22:59:21Z","timestamp":1559948361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19125-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642191244","9783642191251"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19125-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}