{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:50:10Z","timestamp":1725731410534},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642389108"},{"type":"electronic","value":"9783642389115"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38911-5_5","type":"book-chapter","created":{"date-parts":[[2013,6,11]],"date-time":"2013-06-11T21:55:18Z","timestamp":1370987718000},"page":"72-90","source":"Crossref","is-referenced-by-count":5,"title":["Model-Driven Engineering for Trusted Embedded Systems Based on Security and Dependability Patterns"],"prefix":"10.1007","author":[{"given":"Brahim","family":"Hamid","sequence":"first","affiliation":[]},{"given":"Jacob","family":"Geisel","sequence":"additional","affiliation":[]},{"given":"Adel","family":"Ziani","sequence":"additional","affiliation":[]},{"given":"Jean-Michel","family":"Bruel","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Perez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Zurawski, R.: Embedded Systems. CRC Press Inc. (2005)","key":"5_CR1"},{"issue":"3","key":"5_CR2","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/1015047.1015049","volume":"3","author":"S. Ravi","year":"2004","unstructured":"Ravi, S., et al.: Security in embedded systems: Design challenges. Transactions on Embedded Computing Systems (TECS)\u00a03(3), 461\u2013491 (2004)","journal-title":"Transactions on Embedded Computing Systems (TECS)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-642-24485-8_23","volume-title":"Model Driven Engineering Languages and Systems","author":"B. Hamid","year":"2011","unstructured":"Hamid, B., G\u00fcrgens, S., Jouvray, C., Desnos, N.: Enforcing S&D Pattern Design in RCES with Modeling and Formal Approaches. In: Whittle, J., Clark, T., K\u00fchne, T. (eds.) MODELS 2011. LNCS, vol.\u00a06981, pp. 319\u2013333. Springer, Heidelberg (2011)"},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/(SICI)1096-9942(1996)2:1<3::AID-TAPO1>3.0.CO;2-#","volume":"2","author":"D. Riehle","year":"1996","unstructured":"Riehle, D., Z\u00fcllighoven, H.: Understanding and Using Patterns in Software Development. Theory and Practice of Object Systems\u00a02(1), 3\u201313 (1996)","journal-title":"Theory and Practice of Object Systems"},{"unstructured":"Serrano, D., Mana, A., Sotirious, A.-D.: Towards Precise Security Patterns. In: 19th International Conference on Database and Expert Systems Application, DEXA 2008, pp. 287\u2013291. IEEE Computer Society (2008), \n                    \n                      http:\/\/doi.ieeecomputersociety.org\/10.1109\/DEXA.2008.36","key":"5_CR5"},{"doi-asserted-by":"crossref","unstructured":"Crnkovic, I., et al.: Component-Based Development Process and Component Lifecycle. In: Proceedings of the International Conference on Software Engineering Advances, ICSEA 2006, p. 44. IEEE Computer Society (2006)","key":"5_CR6","DOI":"10.1109\/ICSEA.2006.261300"},{"doi-asserted-by":"crossref","unstructured":"Gray, J., et al.: Domain-Specific Modeling. Chapman & Hall\/CRC (2007)","key":"5_CR7","DOI":"10.1201\/9781420010855.pt2"},{"unstructured":"Daniels, F., Kim, K., Vouk, M.A.: The reliable hybrid pattern \u2013 a generalized software fault tolerant design pattern. In: Pattern Language of Programs, PLoP 1997 (1997), \n                    \n                      http:\/\/hillside.net\/plop\/plop97\/Proceedings\/daniels.pdf","key":"5_CR8"},{"doi-asserted-by":"crossref","unstructured":"Tichy, M., Schilling, D., Giese, H.: Design of self-managing dependable systems with UML and fault tolerance patterns. In: Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, WOSS 2004, pp. 105\u2013109. ACM (2004)","key":"5_CR9","DOI":"10.1145\/1075405.1075426"},{"unstructured":"Yoder, J., Barcalow, J.: Architectural patterns for enabling application security. In: Pattern Languages of Programs, PLoP 1998 (1998), \n                    \n                      http:\/\/hillside.net\/plop\/plop97\/Proceedings\/yoder.pdf","key":"5_CR10"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/b11930","volume-title":"Security Engineering with Patterns","author":"M. Schumacher","year":"2003","unstructured":"Schumacher, M.: Security Engineering with Patterns. LNCS, vol.\u00a02754. Springer, Heidelberg (2003)"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"J. J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 412\u2013425. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Hatebur, D., Heisel, M., Schmidt, H.: A security engineering process based on patterns. In: Proceedings of the 18th International Workshop on Database and Expert Systems Applications, DEXA 2007, pp. 734\u2013738. IEEE Computer Society (2007)","key":"5_CR13","DOI":"10.1109\/DEXA.2007.36"},{"issue":"5","key":"5_CR14","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1016\/j.cose.2006.03.002","volume":"25","author":"S.T. Halkidis","year":"2006","unstructured":"Halkidis, S.T., Chatzigeorgiou, A., Stephanides, G.: A qualitative analysis of software security patterns. Computers & Security\u00a025(5), 379\u2013392 (2006)","journal-title":"Computers & Security"},{"unstructured":"Konrad, S., et al.: Using security patterns to model and analyze security requirements. In: Requirements Engineering for High Assurance Systems, RHAS 2003, pp. 13\u201322. Software Engineering Institute (2003)","key":"5_CR15"},{"doi-asserted-by":"crossref","unstructured":"Di Giacomo, V., et al.: Using security and dependability patterns for reaction processes. In: 19th International Workshop on Database and Expert Systems Application, DEXA 2008, pp. 315\u2013319. IEEE Computer Society (2008)","key":"5_CR16","DOI":"10.1109\/DEXA.2008.102"},{"doi-asserted-by":"crossref","unstructured":"Fernandez, E.B., et al.: Using security patterns to develop secure systems. In: Software Engineering for Secure Systems, pp. 16\u201331. Information Science Reference (2011)","key":"5_CR17","DOI":"10.4018\/978-1-61520-837-1.ch002"},{"unstructured":"Alexander, C., Ishikawa, S., Silverstein, M.: A pattern language \u2013 towns, buildings, construction, vol.\u00a02. Oxford University Press (1977)","key":"5_CR18"},{"unstructured":"Buschmann, F., Henney, K., Schmidt, D.C.: Pattern-oriented Software Architecture, vol.\u00a04. John Wiley & Sons (2007)","key":"5_CR19"},{"unstructured":"Gamma, E., et al.: Design patterns \u2013 Elements of reusable object-oriented software. Addison-Wesley (1995)","key":"5_CR20"},{"issue":"1","key":"5_CR21","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., et al.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"unstructured":"Steinberg, D., et al.: EMF: Eclipse Modeling Framework 2.0. Addison-Wesley (2008)","key":"5_CR22"}],"container-title":["Lecture Notes in Computer Science","SDL 2013: Model-Driven Dependability Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38911-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:55:15Z","timestamp":1558302915000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38911-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642389108","9783642389115"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38911-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}