{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:50:23Z","timestamp":1725749423739},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642415326"},{"type":"electronic","value":"9783642415333"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41533-3_44","type":"book-chapter","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:40:59Z","timestamp":1379605259000},"page":"724-739","source":"Crossref","is-referenced-by-count":3,"title":["Contract-Aware Slicing of UML Class Models"],"prefix":"10.1007","author":[{"given":"Wuliang","family":"Sun","sequence":"first","affiliation":[]},{"given":"Robert B.","family":"France","sequence":"additional","affiliation":[]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","doi-asserted-by":"crossref","unstructured":"Androutsopoulos, K., Binkley, D., Clark, D., Gold, N., Harman, M., Lano, K., Li, Z.: Model projection: simplifying models in response to restricting the environment. In: 2011 33rd International Conference on Software Engineering (ICSE), pp. 291\u2013300. IEEE (2011)","DOI":"10.1145\/1985793.1985834"},{"key":"44_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-24485-8_6","volume-title":"Model Driven Engineering Languages and Systems","author":"A. Blouin","year":"2011","unstructured":"Blouin, A., Combemale, B., Baudry, B., Beaudoux, O.: Modeling model slicers. In: Whittle, J., Clark, T., K\u00fchne, T. (eds.) MODELS 2011. LNCS, vol.\u00a06981, pp. 62\u201376. Springer, Heidelberg (2011)"},{"key":"44_CR3","unstructured":"Cormen, T.H.: Introduction to algorithms. The MIT press (2001)"},{"issue":"7","key":"44_CR4","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1109\/TSE.2004.33","volume":"30","author":"R. Eshuis","year":"2004","unstructured":"Eshuis, R., Wieringa, R.: Tool support for verifying UML activity diagrams. IEEE Transactions on Software Engineering\u00a030(7), 437\u2013447 (2004)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"8","key":"44_CR5","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1109\/32.83912","volume":"17","author":"K.B. Gallagher","year":"1991","unstructured":"Gallagher, K.B., Lyle, J.R.: Using program slicing in software maintenance. IEEE Transactions on Software Engineering\u00a017(8), 751\u2013761 (1991)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"44_CR6","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/505145.505149","volume":"11","author":"D. Jackson","year":"2002","unstructured":"Jackson, D.: Alloy: a lightweight object modelling notation. ACM Transactions on Software Engineering and Methodology (TOSEM)\u00a011(2), 256\u2013290 (2002)","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Jeanneret, C., Glinz, M., Baudry, B.: Estimating footprints of model operations. In: 2011 33rd International Conference on Software Engineering (ICSE), pp. 601\u2013610. IEEE (2011)","DOI":"10.1145\/1985793.1985875"},{"key":"44_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-18023-1_5","volume-title":"Generative and Transformational Techniques in Software Engineering III","author":"J.-M. J\u00e9z\u00e9quel","year":"2011","unstructured":"J\u00e9z\u00e9quel, J.-M., Barais, O., Fleurey, F.: Model driven language engineering with kermeta. In: Fernandes, J.M., L\u00e4mmel, R., Visser, J., Saraiva, J. (eds.) Generative and Transformational Techniques in Software Engineering III. LNCS, vol.\u00a06491, pp. 201\u2013221. Springer, Heidelberg (2011)"},{"key":"44_CR9","doi-asserted-by":"crossref","unstructured":"Kagdi, H., Maletic, J.I., Sutton, A.: Context-free slicing of UML class models. In: Proceedings of the 21st IEEE International Conference on Software Maintenance, ICSM 2005, pp. 635\u2013638. IEEE (2005)","DOI":"10.1109\/ICSM.2005.34"},{"key":"44_CR10","unstructured":"Korel, B., Singh, I., Tahat, L., Vaysburg, B.: Slicing of state-based models. In: Proceedings of the International Conference on Software Maintenance, ICSM 2003, pp. 34\u201343. IEEE (2003)"},{"key":"44_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-642-16129-2_17","volume-title":"Model Driven Engineering Languages and Systems","author":"K. Lano","year":"2010","unstructured":"Lano, K., Kolahdouz-Rahimi, S.: Slicing of UML models using model transformations. In: Petriu, D.C., Rouquette, N., Haugen, \u00d8. (eds.) MODELS 2010, Part II. LNCS, vol.\u00a06395, pp. 228\u2013242. Springer, Heidelberg (2010)"},{"key":"44_CR12","doi-asserted-by":"crossref","unstructured":"Lano, K., Kolahdouz-Rahimi, S.: Slicing techniques for UML models. Journal of Object Technology, 10 (2011)","DOI":"10.5381\/jot.2011.10.1.a11"},{"issue":"1","key":"44_CR13","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.cose.2005.06.007","volume":"25","author":"I. Ray","year":"2006","unstructured":"Ray, I., Kumar, M.: Towards a location-based mandatory access control model. Computers & Security\u00a025(1), 36\u201344 (2006)","journal-title":"Computers & Security"},{"key":"44_CR14","doi-asserted-by":"crossref","unstructured":"Ray, I., Kumar, M., Yu, L.: Lrbac: A location-aware role-based access control model. Information Systems Security, 147\u2013161 (2006)","DOI":"10.1007\/11961635_10"},{"key":"44_CR15","unstructured":"Ray, I., Yu, L.: Short paper: Towards a location-aware role-based access control model. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, pp. 234\u2013236. IEEE (2005)"},{"issue":"2","key":"44_CR16","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"},{"key":"44_CR17","doi-asserted-by":"crossref","unstructured":"Shaikh, A., Claris\u00f3, R., Wiil, U.K., Memon, N.: Verification-driven slicing of UML\/OCL models. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, pp. 185\u2013194. ACM (2010)","DOI":"10.1145\/1858996.1859038"},{"key":"44_CR18","doi-asserted-by":"crossref","unstructured":"Shaikh, A., Wiil, U.K., Memon, N.: Evaluation of tools and slicing techniques for efficient verification of UML\/OCL class diagrams. Advances in Software Engineering (2011)","DOI":"10.1155\/2011\/370198"},{"key":"44_CR19","unstructured":"O.M.G.A. Specification. Object constraint language (2007)"},{"key":"44_CR20","unstructured":"Steinberg, D., Budinsky, F., Merks, E., Paternostro, M.: EMF: Eclipse Modeling Framework. Addison-Wesley Professional (2008)"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Sun, W., France, R., Ray, I.: Rigorous analysis of UML access control policy models. In: IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), pp. 9\u201316. IEEE (2011)","DOI":"10.1109\/POLICY.2011.30"},{"key":"44_CR22","unstructured":"Weiser, M.: Program slicing. In: Proceedings of the 5th International Conference on Software Engineering, pp. 439\u2013449. IEEE Press (1981)"}],"container-title":["Lecture Notes in Computer Science","Model-Driven Engineering Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41533-3_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T11:54:15Z","timestamp":1558094055000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41533-3_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642415326","9783642415333"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41533-3_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}