{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T05:19:34Z","timestamp":1725599974152},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642230813"},{"type":"electronic","value":"9783642230820"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23082-0_4","type":"book-chapter","created":{"date-parts":[[2011,8,9]],"date-time":"2011-08-09T04:24:32Z","timestamp":1312863872000},"page":"101-124","source":"Crossref","is-referenced-by-count":3,"title":["Model-Driven Development of Security-Aware GUIs for Data-Centric Applications"],"prefix":"10.1007","author":[{"given":"David","family":"Basin","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Clavel","sequence":"additional","affiliation":[]},{"given":"Marina","family":"Egea","sequence":"additional","affiliation":[]},{"given":"Miguel A.","family":"Garc\u00eda de Dios","sequence":"additional","affiliation":[]},{"given":"Carolina","family":"Dania","sequence":"additional","affiliation":[]},{"given":"Gonzalo","family":"Ortiz","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Valdazo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","volume-title":"Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT 2011)","author":"D. Basin","year":"2011","unstructured":"Basin, D., Clavel, M., Egea, M.: A decade of model driven security. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT 2011). ACM Press, New York (2011) (invited paper, in press)"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-11747-3_16","volume-title":"Engineering Secure Software and Systems","author":"D. Basin","year":"2010","unstructured":"Basin, D., Clavel, M., Egea, M., Schl\u00e4pfer, M.: Automatic generation of smart, security-aware GUI models. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol.\u00a05965, pp. 201\u2013217. Springer, Heidelberg (2010)"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology\u00a015(1), 39\u201391 (2006)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"4_CR4","unstructured":"Care Technologies. Olivanova \u2013 the programming machine (2011), \n                    \n                      http:\/\/www.care-t.com"},{"key":"4_CR5","unstructured":"Egea, M., Dania, C., Clavel, M.: MySQL4OCL: A stored procedure-based MySQL code generator for OCL. Electronic Communications of the EASST 36 (2010)"},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"4_CR7","volume-title":"MDA Explained: The Model Driven Architecture\u2013Practice and Promise","author":"A. Kleppe","year":"2003","unstructured":"Kleppe, A., Bast, W., Warmer, J.B., Watson, A.: MDA Explained: The Model Driven Architecture\u2013Practice and Promise. Addison-Wesley, Reading (2003)"},{"key":"4_CR8","unstructured":"Microsoft. Visual studio lightswitch (2010), \n                    \n                      http:\/\/www.microsoft.com\/visualstudio\/en-us\/lightswitch"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/978-3-642-04425-0_23","volume-title":"Model Driven Engineering Languages and Systems","author":"R. Mohan","year":"2009","unstructured":"Mohan, R., Kulkarni, V.: Model driven development of graphical user interfaces for enterprise business applications - experience, lessons learnt and a way forward. In: Sch\u00fcrr, A., Selic, B. (eds.) MODELS 2009. LNCS, vol.\u00a05795, pp. 307\u2013321. Springer, Heidelberg (2009)"},{"key":"4_CR10","unstructured":"Object Management Group. Object Constraint Language specification Version 2.2 (February 2010), OMG document, \n                    \n                      http:\/\/www.omg.org\/spec\/OCL\/2.2"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-642-16145-2_19","volume-title":"Model Driven Engineering Languages and Systems","author":"A. Schramm","year":"2010","unstructured":"Schramm, A., Preu\u00dfner, A., Heinrich, M., Vogel, L.: Rapid UI development for enterprise applications: Combining manual and model-driven techniques. In: Petriu, D.C., Rouquette, N., Haugen, \u00d8. (eds.) MODELS 2010. LNCS, vol.\u00a06394, pp. 271\u2013285. Springer, Heidelberg (2010)"},{"key":"4_CR12","unstructured":"Web Models Company. Web ratio \u2013 you think, you get (2010), \n                    \n                      http:\/\/www.webratio.com"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design VI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23082-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,31]],"date-time":"2019-03-31T03:38:17Z","timestamp":1554003497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23082-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642230813","9783642230820"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23082-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}