{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:59:08Z","timestamp":1725465548932},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642308222"},{"type":"electronic","value":"9783642308239"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30823-9_6","type":"book-chapter","created":{"date-parts":[[2012,6,8]],"date-time":"2012-06-08T11:49:52Z","timestamp":1339156192000},"page":"73-86","source":"Crossref","is-referenced-by-count":0,"title":["Behavioral Singletons to Consistently Handle Global States of Security Patterns"],"prefix":"10.1007","author":[{"given":"Linda Ariani","family":"Gunawan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Frank Alexander","family":"Kraemer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Herrmann","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Mouratidis, H., Giorgini, P.: Integrating Security and Software Engineering: Advances and Future Vision. IGI Global (2006)","key":"6_CR1","DOI":"10.4018\/978-1-59904-147-6"},{"issue":"2","key":"6_CR2","first-page":"31","volume":"14","author":"J. Viega","year":"2001","unstructured":"Viega, J., Bloch, J.T., Chandra, P.: Applying Aspect-Oriented Programming to Security. Cutter IT Journal\u00a014(2), 31\u201339 (2001)","journal-title":"Cutter IT Journal"},{"issue":"5","key":"6_CR3","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1016\/j.infsof.2008.05.004","volume":"51","author":"G. Georg","year":"2009","unstructured":"Georg, G., Ray, I., Anastasakis, K., Bordbar, B., Toahchoodee, M., Houmb, S.H.: An Aspect-Oriented Methodology for Designing Secure Applications. Information and Software Technology\u00a051(5), 846\u2013864 (2009); Special Issue: Model-Driven Development for Secure Information Systems","journal-title":"Information and Software Technology"},{"key":"6_CR4","series-title":"SCI","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-13273-5_13","volume-title":"Software Engineering Research, Management and Applications 2010","author":"D. Mouheb","year":"2010","unstructured":"Mouheb, D., Talhi, C., Nouh, M., Lima, V., Debbabi, M., Wang, L., Pourzandi, M.: Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. In: Lee, R., Ormandjieva, O., Abran, A., Constantinides, C. (eds.) SERA 2010. SCI, vol.\u00a0296, pp. 197\u2013213. Springer, Heidelberg (2010)"},{"key":"6_CR5","volume-title":"Component-Based Software Engineering: Putting the Pieces Together","author":"G.T. Heineman","year":"2001","unstructured":"Heineman, G.T., Council, W.T.: Component-Based Software Engineering: Putting the Pieces Together. Addison-Wesley, USA (2001)"},{"issue":"2","key":"6_CR6","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1147\/sj.132.0115","volume":"13","author":"W.P. Stevens","year":"1974","unstructured":"Stevens, W.P., Myers, G.J., Constantine, L.L.: Structured Design. IBM Systems Journal\u00a013(2), 115\u2013139 (1974)","journal-title":"IBM Systems Journal"},{"unstructured":"Kraemer, F.A.: Engineering Reactive Systems: A Compositional and Model-Driven Method Based on Collaborative Building Blocks. PhD thesis, Norwegian University of Science and Technology (August 2008)","key":"6_CR7"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/978-3-642-04425-0_44","volume-title":"Model Driven Engineering Languages and Systems","author":"F.A. Kraemer","year":"2009","unstructured":"Kraemer, F.A., Herrmann, P.: Automated Encapsulation of UML Activities for Incremental Development and Verification. In: Sch\u00fcrr, A., Selic, B. (eds.) MODELS 2009. LNCS, vol.\u00a05795, pp. 571\u2013585. Springer, Heidelberg (2009)"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-13464-7_3","volume-title":"Formal Techniques for Distributed Systems","author":"F.A. Kraemer","year":"2010","unstructured":"Kraemer, F.A., Herrmann, P.: Reactive Semantics for Distributed UML Activities. In: Hatcliff, J., Zucca, E. (eds.) FMOODS 2010. LNCS, vol.\u00a06117, pp. 17\u201331. Springer, Heidelberg (2010)"},{"issue":"12","key":"6_CR10","doi-asserted-by":"publisher","first-page":"2068","DOI":"10.1016\/j.jss.2009.06.057","volume":"82","author":"F.A. Kraemer","year":"2009","unstructured":"Kraemer, F.A., Sl\u00e5tten, V., Herrmann, P.: Tool Support for the Rapid Composition, Analysis and Implementation of Reactive Services. Journal of Systems and Software\u00a082(12), 2068\u20132080 (2009)","journal-title":"Journal of Systems and Software"},{"key":"6_CR11","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E. Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R.E., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Reading (1995)"},{"unstructured":"Google Latitude API, \n                  \n                    http:\/\/code.google.com\/apis\/latitude\/","key":"6_CR12"},{"unstructured":"Google Contacts API, \n                  \n                    http:\/\/code.google.com\/apis\/contacts\/","key":"6_CR13"},{"unstructured":"Hammer-Lahav, E., et al.: The OAuth 2.0 Authorization Protocol. Internet-Draft, draft-ietf-oauth-v2-22 (September 2011)","key":"6_CR14"},{"doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) (August 2008)","key":"6_CR15","DOI":"10.17487\/rfc5246"},{"doi-asserted-by":"crossref","unstructured":"Melnikov, A., Zeilenga, K.: Simple Authentication and Security Layer (SASL). RFC 4422 (Proposed Standard) (June 2006)","key":"6_CR16","DOI":"10.17487\/rfc4422"},{"unstructured":"Cantor, S., et al.: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) v2.0 (March 2005)","key":"6_CR17"},{"unstructured":"Kraemer, F.A., Herrmann, P.: Transforming Collaborative Service Specifications into Efficiently Executable State Machines. In: Proceedings of the 6th International Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2007). Electronic Communications of the EASST, vol.\u00a07. EASST (2007)","key":"6_CR18"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1007\/11914952_41","volume-title":"On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE","author":"F.A. Kraemer","year":"2006","unstructured":"Kraemer, F.A., Herrmann, P., Br\u00e6k, R.: Aligning UML 2.0 State Machines and Temporal Logic for the Efficient Execution of Services. In: Meersman, R., Tari, Z. (eds.) OTM 2006. LNCS, vol.\u00a04276, pp. 1613\u20131632. Springer, Heidelberg (2006)"},{"key":"6_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-21461-5_20","volume-title":"Formal Techniques for Distributed Systems","author":"V. Sl\u00e5tten","year":"2011","unstructured":"Sl\u00e5tten, V., Herrmann, P.: Contracts for Multi-instance UML Activities. In: Bruni, R., Dingel, J. (eds.) FORTE 2011 and FMOODS 2011. LNCS, vol.\u00a06722, pp. 304\u2013318. Springer, Heidelberg (2011)"},{"issue":"2","key":"6_CR21","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/0304-3975(91)90224-P","volume":"82","author":"M. Abadi","year":"1991","unstructured":"Abadi, M., Lamport, L.: The Existence of Refinement Mappings. Theoretical Computer Science\u00a082(2), 253\u2013284 (1991)","journal-title":"Theoretical Computer Science"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/11557432_11","volume-title":"Model Driven Engineering Languages and Systems","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J., Houmb, S.H.: Dynamic Secure Aspect Modeling with UML: From Models to Code. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol.\u00a03713, pp. 142\u2013155. Springer, Heidelberg (2005)"},{"unstructured":"Pavlich-Mariscal, J., Michel, L., Demurjian, S.: Enchancing UML to Model Custom Security Aspects. In: AOM 2007: Proceedings of the 11th Workshop on Aspect-Oriented Modeling (2007)","key":"6_CR23"},{"issue":"2","key":"6_CR24","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s10270-008-0080-5","volume":"7","author":"J.M. J\u00e9z\u00e9quel","year":"2008","unstructured":"J\u00e9z\u00e9quel, J.M.: Model Driven Design and Aspect Weaving. Software and System Modeling\u00a07(2), 209\u2013218 (2008)","journal-title":"Software and System Modeling"},{"unstructured":"Alexander, R.T., Bieman, J.M.: Challenges of Aspect-oriented Technology. In: 24th Int\u2019l Conf. Software Engineering, Workshop on Software Quality (2002)","key":"6_CR25"},{"unstructured":"J\u00fcrjens, J.: Secure System Development with UML. Springer (2004)","key":"6_CR26"},{"issue":"1","key":"6_CR27","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML Models to Access Control Infrastructures. ACM Transactions on Software Engineering and Methodology\u00a015(1), 39\u201391 (2006)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/1029133.1029144","volume-title":"Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004","author":"T. Doan","year":"2004","unstructured":"Doan, T., Demurjian, S., Ting, T.C., Ketterl, A.: MAC and UML for Secure Software Design. In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, pp. 75\u201385. ACM, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Distributed Applications and Interoperable Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30823-9_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:31:11Z","timestamp":1620127871000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30823-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642308222","9783642308239"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30823-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}