{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:23:45Z","timestamp":1742963025710,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642298332"},{"type":"electronic","value":"9783642298349"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29834-9_10","type":"book-chapter","created":{"date-parts":[[2012,4,18]],"date-time":"2012-04-18T05:48:22Z","timestamp":1334728102000},"page":"128-142","source":"Crossref","is-referenced-by-count":0,"title":["Domain-Specific Multi-modeling of Security Concerns in Service-Oriented Architectures"],"prefix":"10.1007","author":[{"given":"Juan Pedro","family":"Silva Gallino","sequence":"first","affiliation":[]},{"given":"Miguel","family":"de Miguel","sequence":"additional","affiliation":[]},{"given":"Javier F.","family":"Briones","sequence":"additional","affiliation":[]},{"given":"Alejandro","family":"Alonso","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Apache. Apache CXF (2010)"},{"key":"10_CR2","unstructured":"Berre, A.: Service oriented architecture Modeling Language (SoaML)-Specification for the UML Profile and Metamodel for Services, UPMS (2008)"},{"key":"10_CR3","unstructured":"CDTI. ITECBAN"},{"key":"10_CR4","unstructured":"Dodd, J., Allen, P., Butler, J., Olding, S., Veryard, R., Wilkes, L.: CBDI-SAE Meta Model for SOA Version 2. Technical report, Everware-CBDI (2007)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/3-540-45821-2_12","volume-title":"Generative Programming and Component Engineering","author":"T. Elrad","year":"2002","unstructured":"Elrad, T., Aldawud, O., Bader, A.: Aspect-Oriented Modeling: Bridging the Gap between Implementation and Design. In: Batory, D., Consel, C., Taha, W. (eds.) GPCE 2002. LNCS, vol.\u00a02487, pp. 189\u2013201. Springer, Heidelberg (2002)"},{"key":"10_CR6","unstructured":"Del Fabro, M.D., B\u00e9zivin, J., Jouault, F.: AMW: a generic model weaver. In: Proceedings of the Using Metamodels to Support MDD Workshop, 10th IEEE International Conference on Engineering of Complex Computer Systems, ICECCS 2005 (2005)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Finkelsetin, A., Kramer, J., Nuseibeh, B., Finkelstein, L., Goedicke, M.: Viewpoints: A framework for integrating multiple perspectives in system development. International Journal of Software Engineering and Knowledge Engineering\u00a02 (1992)","DOI":"10.1142\/S0218194092000038"},{"key":"10_CR8","doi-asserted-by":"crossref","DOI":"10.1002\/9780470249260","volume-title":"Domain-specific modeling: enabling full code generation","author":"S. Kelly","year":"2008","unstructured":"Kelly, S., Tolvanen, J.-P.: Domain-specific modeling: enabling full code generation. Wiley-IEEE, Hoboken, New Jersey (2008)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-74987-5_6","volume-title":"Journal on Data Semantics IX","author":"A. Kim","year":"2007","unstructured":"Kim, A., Luo, J., Kang, M.: Security Ontology to Facilitate Web Service Description and Discovery. In: Spaccapietra, S., Atzeni, P., Fages, F., Hacid, M.-S., Kifer, M., Mylopoulos, J., Pernici, B., Shvaiko, P., Trujillo, J., Zaihrayeu, I. (eds.) Journal on Data Semantics IX. LNCS, vol.\u00a04601, pp. 167\u2013195. Springer, Heidelberg (2007)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Larrucea, X., Alonso, R.: Modelling and Deploying Security Policies. In: WEBIST 2009 - Proceedings of the Fifth International Conference on Web Information Systems and Technologies, Lisboa, Portugal, pp. 411\u2013414. INSTICC Press (2009)","DOI":"10.5220\/0001825504110414"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Jensen, M., Feja, S.: A Security Modeling Approach for Web-Service-Based Business Processes. In: 16th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems, ECBS 2009, San Francisco, California, USA, pp. 340\u2013347. IEEE Computer Society (2009)","DOI":"10.1109\/ECBS.2009.14"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Menzel, M., Meinel, C.: A Security Meta-model for Service-Oriented Architectures. In: 2009 IEEE International Conference on Services Computing, Bangalore, India, pp. 251\u2013259. IEEE (September 2009)","DOI":"10.1109\/SCC.2009.57"},{"key":"10_CR14","unstructured":"Miller, J., Mukerji, J.: MDA Guide Version 1.0.1 (2003)"},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1007\/978-3-540-87875-9_38","volume-title":"Model Driven Engineering Languages and Systems","author":"T. Mouelhi","year":"2008","unstructured":"Mouelhi, T., Fleurey, F., Baudry, B., Le Traon, Y.: A Model-Based Framework for Security Policy Specification, Deployment and Testing. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V\u00f6lter, M. (eds.) MODELS 2008. LNCS, vol.\u00a05301, pp. 537\u2013552. Springer, Heidelberg (2008)"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/11948148_42","volume-title":"Service-Oriented Computing \u2013 ICSOC 2006","author":"G. Ortiz","year":"2006","unstructured":"Ortiz, G., Hern\u00e1ndez, J.: Service-Oriented Model-Driven Development: Filling the Extra-Functional Property Gap. In: Dan, A., Lamersdorf, W. (eds.) ICSOC 2006. LNCS, vol.\u00a04294, pp. 471\u2013476. Springer, Heidelberg (2006)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Rashid, A., Sawyer, P., Moreira, A., Ara\u00fajo, J.: Early Aspects: A Model for Aspect-Oriented Requirements Engineering. In: IEEE International Conference on Requirements Engineering, p. 199 (2002)","DOI":"10.1109\/ICRE.2002.1048526"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Satoh, F., Nakamura, Y., Mukhi, N., Tatsubori, M., Ono, K.: Methodology and Tools for End-to-End SOA Security Configurations. In: 2008 IEEE Congress on Services, SERVICES I, Honolulu, Hawaii, USA, pp. 307\u2013314. IEEE Computer Society (2008)","DOI":"10.1109\/SERVICES-1.2008.82"},{"key":"10_CR19","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/ISORC.2010.34","volume-title":"2010 13th IEEE International Symposium on Object\/Component\/Service-Oriented Real-Time Distributed Computing","author":"J.P.S. Gallino","year":"2010","unstructured":"Gallino, J.P.S., de Miguel, M.A., Briones, J.F., Alonso, A.: Model-Driven Development of a Web Service-Oriented Architecture and Security Policies. In: 2010 13th IEEE International Symposium on Object\/Component\/Service-Oriented Real-Time Distributed Computing, Carmona, Spain, pp. 92\u201396. IEEE Computer Society, Los Alamitos (2010)"},{"key":"10_CR20","unstructured":"SpringSource. Spring Framework (2010)"},{"key":"10_CR21","unstructured":"Sutton Jr., S.M.: N degrees of separation: multi-dimensional separation of concerns. In: International Conference on Software Engineering, pp. 107\u2013119 (1999)"},{"key":"10_CR22","unstructured":"The Object Management Group (OMG). UML Profile for Modeling QoS and Fault Tolerance Characteristics and Mechanisms Version 1.1 (2008)"},{"key":"10_CR23","unstructured":"Web Services Interoperability Organization, http:\/\/www.ws-i.org"},{"key":"10_CR24","unstructured":"WS-I. Sample Architecture Usage Scenarios (2003)"},{"key":"10_CR25","unstructured":"WS-I. Supply Chain Management Sample Architecture (2003)"},{"key":"10_CR26","unstructured":"WS-I. Sample Applications Security Architecture Document (2006)"}],"container-title":["Lecture Notes in Computer Science","Web Services and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29834-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:37:29Z","timestamp":1742945849000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29834-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642298332","9783642298349"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29834-9_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}