{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T10:00:58Z","timestamp":1710928858063},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2006,10,31]],"date-time":"2006-10-31T00:00:00Z","timestamp":1162252800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2006,11,22]]},"DOI":"10.1007\/s10270-006-0030-z","type":"journal-article","created":{"date-parts":[[2006,10,30]],"date-time":"2006-10-30T17:05:22Z","timestamp":1162227922000},"page":"429-447","source":"Crossref","is-referenced-by-count":19,"title":["UML specification of access control policies and their formal verification"],"prefix":"10.1007","volume":"5","author":[{"given":"Manuel","family":"Koch","sequence":"first","affiliation":[]},{"given":"Francesco","family":"Parisi-Presicce","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,10,31]]},"reference":[{"key":"30_CR1","doi-asserted-by":"crossref","unstructured":"Bottoni, P., Koch, M., Parisi-Presicce, F., Taentzer, G.: A visualization of ocl using collaborations. In: Proceedings of UML 2001 \u2013 The Unified Modeling Language, number 2185 in LNCS, pp. 257\u2013271. Springer, Berlin Heidelberg New York (2001)","DOI":"10.1007\/3-540-45441-1_20"},{"key":"30_CR2","doi-asserted-by":"crossref","unstructured":"Brose, G.: A typed access control model for CORBA. In: Proceedings of ESORICS, LNCS 1895, pp. 88\u2013105. Springer, Berlin Heidelberg New York (2000)","DOI":"10.1007\/10722599_6"},{"key":"30_CR3","unstructured":"Brose, G.: Access control management in distributed object systems. PhD Thesis, Freie Universit\u00e4t (2001)"},{"key":"30_CR4","unstructured":"Brose, G.: Raccoon\u2014An infrastructure for managing access control in CORBA. In: Proceedings of International Conference on Distributed Applications and Interoperable Systems (DAIS). Kluwer, Dordrecht (2001)"},{"key":"30_CR5","doi-asserted-by":"crossref","first-page":"301","DOI":"10.3233\/JCS-2002-10402","volume":"4","author":"G. Brose","year":"2002","unstructured":"Brose G. (2002) Manageable Access Control for CORBA. J. Comput. Secur. 4, 301\u2013337","journal-title":"J. Comput. Secur."},{"key":"30_CR6","unstructured":"Brose, G., Koch, M., L\u00f6hr, K.-P.: Integrating access control design into the software development process. In: Proceedings of 6th International Conference on Integrated Design and Process Technology (IDPT) (2002)"},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"Brose, G., Koch, M., L\u00f6hr, K.-P.: Entwicklung und Verwaltung von Zugriffsschutz in verteilten Objektsystemen \u2013 eine Krankenhausfallstudie. PIK \u2013 Praxis der Informationsverarbeitung und Kommunikation, (1\/03) (2003)","DOI":"10.1515\/PIKO.2003.26"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Devanbu, P.T., Stubblebine, S.: Software engineering for security: a roadmap. In: Finkelstein, A. (ed.), The Future of Software Engineering. ACM Press (2000)","DOI":"10.1145\/336512.336559"},{"key":"30_CR9","volume-title":"Components and Frameworks: The Catalysis Approach","author":"D. D\u2019Souza","year":"1998","unstructured":"D\u2019Souza D., Wills A. (1998) Components and Frameworks: The Catalysis Approach. Addison-Wesley, Reading"},{"key":"30_CR10","volume-title":"Handbook of Graph Grammars and Computing by Graph Transformations, vol. II: Applications, Languages, and Tools","year":"1999","unstructured":"Ehrig H., Engels G., Kreowski H.-J., Rozenberg G. (eds) (1999) Handbook of Graph Grammars and Computing by Graph Transformations, vol. II: Applications, Languages, and Tools. World Scientific, Singapore"},{"key":"30_CR11","doi-asserted-by":"crossref","unstructured":"Epstein, P., Sandhu, R.: Towards a UML based approach to role engineering. In: Proceedings of ACM RBAC (1999)","DOI":"10.1145\/319171.319184"},{"key":"30_CR12","unstructured":"Fernandez-Medina, E., Martinez, A., Medina, C., Piattini, M.: Uml for the design of secure databases: integrating security levels, user roles, and constraints in the database design process. In: J\u00fcrjens, Cengarle, Fernandez, Rumpe, Sandner, (eds) Proceedings of CSDUML02, number TUM-I0208 in technical report TU M\u00fcnchen, pp. 93\u2013106 (2002)"},{"key":"30_CR13","unstructured":"Heckel, R., Wagner, A.: Ensuring consistency of conditional graph grammars \u2013 a constructive approach. In: Proceedings of SEGRAGRA\u201995 Graph Rewriting and Computation, Number 2. Electronic Notes of TCS, 1995. http:\/\/www.elsevier.nl\/locate\/entcs\/volume2.html"},{"key":"30_CR14","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J.: Towards Development of secure systems using UMLsec. In: Proceedings of FASE\u201901, number 2029 in LNCS, pp. 187\u2013200. Springer, Berlin Heidelberg New York (2001)","DOI":"10.1007\/3-540-45314-8_14"},{"key":"30_CR15","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens, J.: UMLsec: Extending UML for Secure Systems Development. In: Proceedings of UML 2002, number 2460 in LNCS, pp. 412\u2013425. Springer, Berlin Heidelberg New York (2002)","DOI":"10.1007\/3-540-45800-X_32"},{"key":"30_CR16","volume-title":"Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS 2001), number 2030 in Lect. Notes in Comp. Sci","author":"M. Koch","year":"2001","unstructured":"Koch M., Mancini L., Parisi-Presicce F. (2001) Foundations for a graph-based approach to the specification of access control policies. In: Honsell F., Miculan M. (eds) Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS 2001), number 2030 in Lect. Notes in Comp. Sci. Springer, Berlin Heidelberg New York"},{"key":"30_CR17","first-page":"223","volume-title":"Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS 2002), number 2303 in Lect. Notes in Comp. Sci","author":"M. Koch","year":"2002","unstructured":"Koch M., Mancini L., Parisi-Presicce F. (2002) Conflict detection and resolution in access control specifications. In: Nielsen M., Engberg U. (eds) Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS 2002), number 2303 in Lect. Notes in Comp. Sci. Springer, Berlin Heidelberg New York, pp. 223\u2013237"},{"key":"30_CR18","doi-asserted-by":"crossref","unstructured":"Koch M., Mancini L., Parisi-Presicce F. (2002) Decidability of safety in graph-based models for access control. In: Proceedings of 7th European Symposium on Research in Computer Security (ESORICS), number 2502 in Lect. Notes in Comp. Sci., pp. 229\u2013243. Springer, Berlin Heidelberg New York","DOI":"10.1007\/3-540-45853-0_14"},{"key":"30_CR19","doi-asserted-by":"crossref","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML:A UML-based modeling language for model-driven security. In: Proceedings of 5th International Conference on the Unified Modeling Language, number 2460 in LNCS. Springer, Berlin Heidelberg New York (2002)","DOI":"10.1007\/3-540-45800-X_33"},{"key":"30_CR20","unstructured":"OMG: CORBA 3.0 New components chapters, TC document ptc\/99-10-04. OMG, (1999)"},{"key":"30_CR21","unstructured":"OMG: OMG Unified Modeling Language Specification, Version 1.5. OMG, (2003)"},{"key":"30_CR22","volume-title":"Handbook of Graph Grammars and Computing by Graph Transformation, Vol. 1: Foundations","year":"1997","unstructured":"Rozenberg G. (ed) (1997) Handbook of Graph Grammars and Computing by Graph Transformation, Vol. 1: Foundations. World Scientific, Singapore"},{"issue":"2","key":"30_CR23","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E. (1996) Role\u2013based access control models. IEEE Comput. 29(2): 38\u201347","journal-title":"IEEE Comput."},{"key":"30_CR24","unstructured":"Sun Microsystems. Enterprise JavaBeans Specification, Version 2.0, Final Draft, (2000)"},{"key":"30_CR25","unstructured":"Taentzer, G.: Towards common exchange formats for graphs and graph transformation systems. In: Proceedings of Uniform Approaches to Graphical Process Specification Techniques UNIGRA\u201901, number 47 in ENTCS (2001)"},{"key":"30_CR26","unstructured":"Tsiolakis, A.: Consistency analysis of UML class and sequence diagrams based on attributed typed graphs and their transformation. Technical Report 2000\/3, TU Berlin (2000)"}],"container-title":["Software &amp; Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-006-0030-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10270-006-0030-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-006-0030-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:55:23Z","timestamp":1559130923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10270-006-0030-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,31]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,11,22]]}},"alternative-id":["30"],"URL":"https:\/\/doi.org\/10.1007\/s10270-006-0030-z","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,10,31]]}}}