{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:14:14Z","timestamp":1743066854248,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642244841"},{"type":"electronic","value":"9783642244858"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24485-8_23","type":"book-chapter","created":{"date-parts":[[2011,10,10]],"date-time":"2011-10-10T15:59:05Z","timestamp":1318262345000},"page":"319-333","source":"Crossref","is-referenced-by-count":11,"title":["Enforcing S&amp;D Pattern Design in RCES with Modeling and Formal Approaches"],"prefix":"10.1007","author":[{"given":"Brahim","family":"Hamid","sequence":"first","affiliation":[]},{"given":"Sigrid","family":"G\u00fcrgens","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Jouvray","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Desnos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"AVISPA. The HLPSL Tutorial, A Beginner\u2019s Guide to Modelling and Analysing Internet Security Protocols, http:\/\/www.avispa-project.org"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems\u00a08, 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"key":"23_CR3","unstructured":"Daniels, F., Kim, K., Vouk, M.A.: The Reliable Hybrid Pattern: A Generalized Software Fault Tolerant Design Pattern, pp. 1\u20139 (1997)"},{"key":"23_CR4","volume-title":"Real-time UML: Developing Efficient Objects for Embedded Systems","author":"B.P. Douglass","year":"1998","unstructured":"Douglass, B.P.: Real-time UML: Developing Efficient Objects for Embedded Systems. Addison-Wesley, Reading (1998)"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., Yoshioka, N., Washizaki, H., J\u00fcrjens, J., VanHilst, M., Pernul, G.: Using security patterns to develop secure systems. In: Software Engineering for Secure Systems: Industrial and Research Perspectives. IGI Global (2010)","DOI":"10.4018\/978-1-61520-837-1.ch002"},{"key":"23_CR6","unstructured":"Fuchs, A., G\u00fcrgens, S., Rieke, R., Apvrille, L.: 1st Version Architecture and Protocols Verification and Attack Analysis. Technical Report D3.4.1, EVITA Project (2010)"},{"key":"23_CR7","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-642-13446-3_14","volume-title":"Trust Management IV","author":"A. Fuchs","year":"2010","unstructured":"Fuchs, A., G\u00fcrgens, S., Rudolph, C.: A Formal Notion of Trust \u2013 Enabling Reasoning about Security Properties. In: Nishigaki, M., J\u00f8sang, A., Murayama, Y., Marsh, S. (eds.) IFIPTM 2010. IFIP Advances in Information and Communication Technology, vol.\u00a0321, pp. 200\u2013215. Springer, Heidelberg (2010)"},{"key":"23_CR8","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E. Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R.E., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1995)"},{"key":"23_CR9","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/978-3-540-87730-1_37","volume-title":"Diagrammatic Representation and Inference","author":"E. Gasparis","year":"2008","unstructured":"Gasparis, E., Nicholson, J., Eden, A.H.: LePUS3: An Object-Oriented Design Description Language. In: Stapleton, G., Howse, J., Lee, J. (eds.) Diagrams 2008. LNCS (LNAI), vol.\u00a05223, pp. 364\u2013367. Springer, Heidelberg (2008)"},{"key":"23_CR10","first-page":"482","volume-title":"Precise Modeling of Design Patterns","author":"A.L. Guennec","year":"2000","unstructured":"Guennec, A.L., Suny\u00e9, G., J\u00e9z\u00e9quel, J.-M.: Precise Modeling of Design Patterns, pp. 482\u2013496. Springer, Heidelberg (2000)"},{"key":"23_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/3-540-45831-X_16","volume-title":"Infrastructure Security","author":"S. G\u00fcrgens","year":"2002","unstructured":"G\u00fcrgens, S., Ochsenschl\u00e4ger, P., Rudolph, C.: Authenticity and provability - A formal framework. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol.\u00a02437, pp. 227\u2013245. Springer, Heidelberg (2002)"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/11555827_24","volume-title":"Computer Security \u2013 ESORICS 2005","author":"S. G\u00fcrgens","year":"2005","unstructured":"G\u00fcrgens, S., Ochsenschl\u00e4ger, P., Rudolph, C.: Abstractions Preserving Parameter Confidentiality. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 418\u2013437. Springer, Heidelberg (2005)"},{"issue":"5","key":"23_CR13","first-page":"457","volume":"27","author":"S. G\u00fcrgens","year":"2005","unstructured":"G\u00fcrgens, S., Ochsenschl\u00e4ger, P., Rudolph, C.: On a Formal Framework for Security Properties. International Computer Standards & Interface Journal (CSI), Special issue on formal methods, techniques and tools for secure and reliable applications\u00a027(5), 457\u2013466 (2005)","journal-title":"International Computer Standards & Interface Journal (CSI), Special issue on formal methods, techniques and tools for secure and reliable applications"},{"key":"23_CR14","first-page":"229","volume":"2629","author":"S. G\u00fcrgens","year":"2004","unstructured":"G\u00fcrgens, S., Rudolph, C.: Security Analysis of (Un-) Fair Non-repudiation Protocols. Formal aspects of computing\u00a02629, 229\u2013232 (2004)","journal-title":"Formal aspects of computing"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1007\/978-3-540-74835-9_29","volume-title":"Computer Security \u2013 ESORICS 2007","author":"S. G\u00fcrgens","year":"2007","unstructured":"G\u00fcrgens, S., Rudolph, C., Scheuermann, D., Atts, M., Plaga, R.: Security evaluation of scenarios based on the tCG\u2019s TPM specification. In: Biskup, J., L\u00f3pez, J. (eds.) ESORICS 2007. LNCS, vol.\u00a04734, pp. 438\u2013453. Springer, Heidelberg (2007)"},{"key":"23_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-540-87785-1_2","volume-title":"Software Technologies for Embedded and Ubiquitous Systems","author":"B. Hamid","year":"2008","unstructured":"Hamid, B., Radermacher, A., Jouvray, C., G\u00e9rard, S., Terrier, F.: Designing fault-tolerant component based applications with a model driven approach. In: Brinkschulte, U., Givargis, T., Russo, S. (eds.) SEUS 2008. LNCS, vol.\u00a05287, pp. 9\u201320. Springer, Heidelberg (2008)"},{"key":"23_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for Secure Systems Development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"Kim, D.-K., France, R., Ghosh, S., Song, E.: A UML-based Meta-modeling Language to Specify Design Patterns, vol.\u00a030, pp. 193\u2013206 (2004)","DOI":"10.1109\/TSE.2004.1271174"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Lowe, G.: An Attack on the Needham-Schroeder Public-Key Protocol. Information Processing Letters (1995)","DOI":"10.1016\/0020-0190(95)00144-2"},{"key":"23_CR21","unstructured":"Mapelsden, D., Hosking, J., Grundy, J.: Design Pattern Modelling and Instantiation Using DPML. In: CRPIT 2002: Proceedings of the Fortieth International Conference on Tools Pacific, pp. 3\u201311. Australian Computer Society, Inc. (2002)"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Nhlabatsi, A., Bandara, A., Hayashi, S., Haley, C.B., J\u00fcrjens, J., Kaiya, H., Kubo, A., Laney, R., Mouratidis, H., Nuseibeh, B., Tahara, Y., Tun, T.T., Washizaki, H., Yoshioka, N., Yu, Y.: Security Patterns: Comparing Modeling Approaches. In: Software Engineering for Secure Systems: Industrial and Research Perspectives. IGI Global (2010)","DOI":"10.4018\/978-1-61520-837-1.ch004"},{"key":"23_CR23","unstructured":"OMG. OMG. A UML Profile for MARTE: Modeling and Analysis of Real-Time Embedded Systems,beta 2 (June 2008)"},{"key":"23_CR24","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/CSFW.1997.596788","volume-title":"10th Computer Security Foundations Workshop","author":"L.C. Paulson","year":"1997","unstructured":"Paulson, L.C.: Proving Properties of Security Protocols by Induction. In: 10th Computer Security Foundations Workshop, pp. 70\u201383. IEEE Computer Society Press, Los Alamitos (1997)"},{"issue":"3","key":"23_CR25","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/1015047.1015049","volume":"3","author":"S. Ravi","year":"2004","unstructured":"Ravi, S., Raghunathan, A., Kocher, P., Hattangady, S.: Security in Embedded Systems: Design challenges. ACM Trans. Embed. Comput. Syst.\u00a03(3), 461\u2013491 (2004)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"23_CR26","volume-title":"The Modelling and Analysis of Security Protocols","author":"B. Roscoe","year":"2000","unstructured":"Roscoe, B., Ryan, P., Schneider, S., Goldsmith, M., Lowe, G.: The Modelling and Analysis of Security Protocols. Addison Wesley, Reading (2000)"},{"key":"23_CR27","first-page":"287","volume-title":"Proceedings of 2nd International Workshop on Secure Systems Methodologies Using Patterns (Spattern 2008)","author":"D. Serrano","year":"2008","unstructured":"Serrano, D., Ma\u00f1a, A., Sotirious, A.-D.: Towards Precise and Certified Security Patterns. In: Proceedings of 2nd International Workshop on Secure Systems Methodologies Using Patterns (Spattern 2008), pp. 287\u2013291. IEEE Computer Society, Los Alamitos (2008)"},{"key":"23_CR28","first-page":"105","volume-title":"Design of Self-managing Dependable Systems with UML and Fault Tolerance Patterns","author":"M. Tichy","year":"2004","unstructured":"Tichy, M., Schilling, D., Giese, H.: Design of Self-managing Dependable Systems with UML and Fault Tolerance Patterns, pp. 105\u2013109. ACM, New York (2004)"},{"key":"23_CR29","unstructured":"Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drieslma, P., Mantovani, J., M\u00f6dersheim, S., Vigneron, L.: A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. In: Workshop on Specification and Automated Processing of Security Requirements, SAPS 2004 (2004)"},{"key":"23_CR30","unstructured":"Yoder, J., Barcalow, J.: Architectural Patterns for Enabling Application Security. In: Conference on Pattern Languages of Programs, PLoP 1997 (1998)"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Yoshioka, N., Washizaki, H., Maruyama, K.: A survey of Security Patterns. Progress in Informatics\u00a0(5), 35\u201347 (2008)","DOI":"10.2201\/NiiPi.2008.5.5"},{"key":"23_CR32","doi-asserted-by":"publisher","DOI":"10.1201\/9781420038163","volume-title":"Embedded Systems Handbook","author":"R. Zurawski","year":"2005","unstructured":"Zurawski, R.: Embedded Systems. In: Embedded Systems Handbook. CRC Press Inc., Boca Raton (2005)"}],"container-title":["Lecture Notes in Computer Science","Model Driven Engineering Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24485-8_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T04:33:04Z","timestamp":1560745984000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24485-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642244841","9783642244858"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24485-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}