{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:57:59Z","timestamp":1770296279575,"version":"3.49.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2009,6,6]],"date-time":"2009-06-06T00:00:00Z","timestamp":1244246400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1007\/s10515-009-0054-z","type":"journal-article","created":{"date-parts":[[2009,6,6]],"date-time":"2009-06-06T01:01:25Z","timestamp":1244250085000},"page":"455-490","source":"Crossref","is-referenced-by-count":53,"title":["Automated software license analysis"],"prefix":"10.1007","volume":"16","author":[{"given":"Timo","family":"Tuunanen","sequence":"first","affiliation":[]},{"given":"Jussi","family":"Koskinen","sequence":"additional","affiliation":[]},{"given":"Tommi","family":"K\u00e4rkk\u00e4inen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,6,6]]},"reference":[{"key":"54_CR1","unstructured":"AFPL Ghostscript. http:\/\/pages.cs.wisc.edu\/~ghost\/doc\/AFPL\/index.htm (2008). Accessed 11 August 2008"},{"key":"54_CR2","volume-title":"Compilers\u2014Principles, Techniques, and Tools","author":"A. Aho","year":"1986","unstructured":"Aho, A., Sethi, R., Ullman, J.: Compilers\u2014Principles, Techniques, and Tools. Addison-Wesley, Reading (1986)"},{"issue":"8","key":"54_CR3","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TSE.2003.1223646","volume":"29","author":"P. Anderson","year":"2003","unstructured":"Anderson, P., Reps, T., Teitelbaum, T.: Design and implementation of a fine-grained software inspection tool. IEEE Trans. Softw. Eng. 29(8), 721\u2013733 (2003)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"54_CR4","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/WPC.2001.921727","volume-title":"Proceedings of the 9th International Workshop on Program Comprehension (IWPC 2001)","author":"P. Andritsos","year":"2001","unstructured":"Andritsos, P., Miller, R.: Reverse engineering meets data analysis. In: Jacobs, A. (ed.) Proceedings of the 9th International Workshop on Program Comprehension (IWPC 2001), pp. 157\u2013166. IEEE Computer Society, Los Alamitos (2001)"},{"key":"54_CR5","unstructured":"Apache. Apache HTTP Server Project. http:\/\/httpd.apache.org\/ (2005). Accessed 12 August 2008"},{"key":"54_CR6","unstructured":"Apache License, Version 2.0. http:\/\/www.opensource.org\/licenses\/apache2.0.php (2007). Accessed 7 October 2007"},{"key":"54_CR7","unstructured":"Azureus. http:\/\/azureus.sourceforge.net\/ (2008). Accessed 11 August 2008"},{"issue":"5","key":"54_CR8","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1002\/(SICI)1096-908X(199809\/10)10:5<305::AID-SMR175>3.0.CO;2-7","volume":"10","author":"B. Bellay","year":"1998","unstructured":"Bellay, B., Gall, H.: An evaluation of reverse engineering tool capabilities. J. Softw. Maint. 10(5), 305\u2013331 (1998)","journal-title":"J. Softw. Maint."},{"key":"54_CR9","unstructured":"Black Duck. http:\/\/www.blackducksoftware.com\/ (2009). Accessed 13 January 2009"},{"key":"54_CR10","unstructured":"BSD, The BSD License. http:\/\/www.opensource.org\/licenses\/bsd-license.php (2007). Accessed 7 October 2007"},{"key":"54_CR11","unstructured":"Bugzilla. http:\/\/www.bugzilla.org\/ (2008). Accessed 11 August 2008"},{"key":"54_CR12","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1109\/CSMR.2003.1192440","volume-title":"Proceedings of the Seventh European Conference on Software Maintenance and Reengineering (CSMR 2003)","author":"A. Capiluppi","year":"2003","unstructured":"Capiluppi, A., Lago, P., Morisio, M.: Characteristics of open source software projects. In: Proceedings of the Seventh European Conference on Software Maintenance and Reengineering (CSMR 2003), pp.\u00a0317\u2013330. IEEE Computer Society, Los Alamitos (2003)"},{"key":"54_CR13","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/S0065-2458(08)60596-3","volume":"35","author":"J. Cross","year":"1992","unstructured":"Cross, J., Chikofsky, J., May, J.: Reverse engineering. Adv. Comput. 35, 199\u2013254 (1992)","journal-title":"Adv. Comput."},{"key":"54_CR14","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"crossref","first-page":"V","DOI":"10.1007\/0-387-34226-5","volume-title":"Open Source Systems","author":"E. Damiani","year":"2006","unstructured":"Damiani, E., Fitzgerald, B., Scacchi, W., Scotto, M., Succi, G.: Preface. In: Damiani, E., Fitzgerald, B., Scacchi, W., Scotto, M., Succi, G. (eds.) Open Source Systems. IFIP International Federation for Information Processing, vol. 203, pp. V\u2013VI. Springer, Berlin (2006)"},{"issue":"7","key":"54_CR15","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1109\/TSE.2005.77","volume":"31","author":"M. Jonge de","year":"2005","unstructured":"de Jonge, M.: Build-level components. IEEE Trans. Softw. Eng. 31(7), 588\u2013600 (2005)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"54_CR16","unstructured":"FOSSology. http:\/\/fossology.org\/ (2009). Accessed 13 January 2009"},{"issue":"7","key":"54_CR17","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TSE.2005.85","volume":"31","author":"W. Frakes","year":"2005","unstructured":"Frakes, W., Kang, K.: Software reuse research: status and future. IEEE Trans. Softw. Eng. 31(7), 529\u2013536 (2005)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"54_CR18","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1145\/234528.234531","volume":"28","author":"W. Frakes","year":"1996","unstructured":"Frakes, W., Terry, C.: Software reuse: Metrics and models. ACM Comput. Surv. 28(2), 415\u2013435 (1996)","journal-title":"ACM Comput. Surv."},{"key":"54_CR19","unstructured":"Free software definition. http:\/\/www.fsf.org\/licensing\/essays\/free-sw.html (2003). Accessed 21 November 2007"},{"issue":"6","key":"54_CR20","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/52.469757","volume":"12","author":"D. Garlan","year":"1995","unstructured":"Garlan, D., Allen, R., Ockerbloom, J.: Architectural mismatch: Why reuse is so hard. IEEE Softw. 12(6), 17\u201326 (1995)","journal-title":"IEEE Softw."},{"key":"54_CR21","unstructured":"GCC, GNU Compiler Collection. http:\/\/gcc.gnu.org (2007). Accessed 13 September 2007"},{"key":"54_CR22","unstructured":"GIMP, GNU image manipulation program. http:\/\/www.gimp.org\/ (2008). Accessed 11 August 2008"},{"key":"54_CR23","unstructured":"GNU Binutils. http:\/\/www.gnu.org\/software\/binutils\/ (2007). Accessed 13 September 2007"},{"key":"54_CR24","unstructured":"GNU Go. http:\/\/www.gnu.org\/software\/gnugo\/ (2008). Accessed 11 August 2008"},{"key":"54_CR25","unstructured":"GNU Libtool. http:\/\/www.gnu.org\/software\/libtool\/ (2008). Accessed 5 May 2008"},{"key":"54_CR26","unstructured":"gnuplot. http:\/\/www.gnuplot.info\/ (2008). Accessed 11 August 2008"},{"key":"54_CR27","unstructured":"GPLToolkit. http:\/\/www.prnewswire.com\/cgi-bin\/stories.pl?ACCT=104&STORY=\/www\/story\/08-28-2001\/0001562502&EDATE= (2007). Accessed 21 November 2007"},{"issue":"4","key":"54_CR28","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1145\/359460.359467","volume":"21","author":"P. Heckel","year":"1978","unstructured":"Heckel, P.: A technique for isolating differences between files. Commun. ACM 21(4), 264\u2013268 (1978)","journal-title":"Commun. ACM"},{"key":"54_CR29","unstructured":"HP may accidentally kill Black Duck & Palamida. http:\/\/hp.sys-con.com\/node\/490782 (2008). Accessed 11 January 2009"},{"key":"54_CR30","unstructured":"JBoss application server. http:\/\/www.jboss.org\/ (2008). Accessed 11 August 2008"},{"key":"54_CR31","unstructured":"Koskinen, J.: Automated transient hypertext support for software maintenance. Jyv\u00e4skyl\u00e4 Studies in Computing 4, Ph.D. thesis, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland (2000)"},{"key":"54_CR32","doi-asserted-by":"crossref","unstructured":"Koskinen, J., Lehmonen, T.: Analysis of ten reverse engineering tools. In: International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE) (2008, in press)","DOI":"10.1007\/978-90-481-3660-5_67"},{"issue":"3","key":"54_CR33","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1002\/smr.292","volume":"16","author":"J. Koskinen","year":"2004","unstructured":"Koskinen, J., Salminen, A., Paakki, J.: Hypertext support for the information needs of software maintainers. J. Softw. Maint. Evol.: Res. Pract. 16(3), 187\u2013215 (2004)","journal-title":"J. Softw. Maint. Evol.: Res. Pract."},{"key":"54_CR34","first-page":"208","volume-title":"Proceedings of the International Conference on Software Maintenance (ICSM 1998)","author":"M. Lehman","year":"1998","unstructured":"Lehman, M., Perry, D., Ramil, J.: Implications of evolution metrics on software maintenance. In: Proceedings of the International Conference on Software Maintenance (ICSM 1998), pp. 208\u2013217. IEEE Computer Society, Los Alamitos (1998)"},{"issue":"3","key":"54_CR35","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MS.1986.233414","volume":"3","author":"S. Letovsky","year":"1986","unstructured":"Letovsky, S., Soloway, E.: Delocalized plans and program comprehension. IEEE Softw. 3(3), 41\u201349 (1986)","journal-title":"IEEE Softw."},{"key":"54_CR36","unstructured":"LIDESC: Librock License Awareness System. http:\/\/www.mibsoftware.com\/librock\/lidesc\/ (2007). Accessed 22 November 2007"},{"issue":"6","key":"54_CR37","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1145\/359511.359522","volume":"21","author":"B. Lientz","year":"1978","unstructured":"Lientz, B., Swanson, E., Tompkins, G.: Characteristics of application software maintenance. Commun. ACM 21(6), 466\u2013471 (1978)","journal-title":"Commun. ACM"},{"key":"54_CR38","first-page":"130","volume":"59","author":"M. Lindvall","year":"2003","unstructured":"Lindvall, M.: Impact analysis in software evolution. Adv. Comput. 59, 130\u2013211 (2003)","journal-title":"Adv. Comput."},{"key":"54_CR39","unstructured":"Microsoft: Microsoft software license terms. Microsoft developer network (MSDN) subscription operating systems, professional, and premium editions. http:\/\/msdnaa.fei.stuba.sk\/MSDN%20EULA%20Eng.pdf (2007). Accessed 1 July 2008"},{"key":"54_CR40","unstructured":"MIT: The MIT License. http:\/\/www.opensource.org\/licenses\/mit-license.php (2007). Accessed 7 October 2007"},{"issue":"3","key":"54_CR41","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/567793.567795","volume":"11","author":"A. Mockus","year":"2002","unstructured":"Mockus, A., Fielding, R., Herbsleb, J.: Two case studies of open source software development: Apache and Mozilla. ACM Trans. Softw. Eng. Methodol. 11(3), 309\u2013346 (2002)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"54_CR42","first-page":"110","volume-title":"Proceedings of the IEEE International Conference on Software\u2014Science, Technology & Engineering","author":"S. Morad","year":"2005","unstructured":"Morad, S., Kuflik, T.: Conventional and open source software reuse at Orbotech\u2014an industrial experience. In: Proceedings of the IEEE International Conference on Software\u2014Science, Technology & Engineering, pp. 110\u2013117. IEEE Computer Society, Los Alamitos (2005)"},{"issue":"4","key":"54_CR43","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TSE.2002.995420","volume":"28","author":"M. Morisio","year":"2002","unstructured":"Morisio, M.: Success and failure factors in software reuse. IEEE Trans. Softw. Eng. 28(4), 340\u2013357 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"54_CR44","unstructured":"Mozilla Firefox. http:\/\/www.mozilla.org\/firefox\/ (2008). Accessed 3 July 2008"},{"key":"54_CR45","unstructured":"MPL, Mozilla Public License 1.1 (MPL 1.1). http:\/\/www.mozilla.org\/MPL (2007). Accessed 22 June 2008"},{"issue":"2","key":"54_CR46","first-page":"101","volume":"19","author":"P. Nordquist","year":"2003","unstructured":"Nordquist, P., Petersen, A., Todorova, A.: License tracing in free, open, and proprietary software. J. Comput. Sci. Coll. 19(2), 101\u2013112 (2003)","journal-title":"J. Comput. Sci. Coll."},{"key":"54_CR47","unstructured":"Opensource org: The Approved Licenses. http:\/\/www.opensource.org\/licenses\/ (2007). Accessed 3 April 2007"},{"key":"54_CR48","unstructured":"OSLC, Open source license checker. http:\/\/sourceforge.net\/projects\/oslc (2007). Accessed 22 November 2007"},{"issue":"1","key":"54_CR49","first-page":"3","volume":"4","author":"J. Paakki","year":"1997","unstructured":"Paakki, J., Koskinen, J., Salminen, A.: From relational program dependencies to hypertextual access structures. Nord. J. Comput. 4(1), 3\u201336 (1997)","journal-title":"Nord. J. Comput."},{"key":"54_CR50","unstructured":"Palamida. http:\/\/www.palamida.com\/ (2009). Accessed 13 January 2009"},{"issue":"30","key":"54_CR51","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/TSE.2004.1274044","volume":"4","author":"J. Paulson","year":"2004","unstructured":"Paulson, J., Succi, G., Eberlein, A.: An empirical study of open-source and closed-source software products. IEEE Trans. Softw. Eng. 4(30), 246\u2013256 (2004)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"54_CR52","unstructured":"Perens, B.: The Open Source Definition. www.opensource.org\/docs\/definition.php , Open Source Initiative (2005). Accessed 13 September 2005"},{"key":"54_CR53","unstructured":"Pidgin IM client. http:\/\/www.pidgin.im\/ (2008). Accessed 11 August 2008"},{"key":"54_CR54","volume-title":"Open Source Licensing. Software Freedom and Intellectual Property Law","author":"L. Rosen","year":"2005","unstructured":"Rosen, L.: Open Source Licensing. Software Freedom and Intellectual Property Law. Prentice Hall, New York (2005)"},{"issue":"10","key":"54_CR55","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/1022594.1022598","volume":"47","author":"I. Samoladas","year":"2004","unstructured":"Samoladas, I., Stamelos, I., Angelis, L., Oikonomou, A.: Open source software development should strive for even greater code maintainability. Commun. ACM 47(10), 83\u201387 (2004)","journal-title":"Commun. ACM"},{"key":"54_CR56","volume-title":"Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices","author":"R. Seacord","year":"2003","unstructured":"Seacord, R., Plakosh, D., Lewis, G.: Modernizing Legacy Systems: Software Technologies, Engineering Processes, and Business Practices. Addison-Wesley, Reading (2003)"},{"issue":"6","key":"54_CR57","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1109\/TSE.2005.69","volume":"31","author":"R. Selby","year":"2005","unstructured":"Selby, R.: Enabling reuse-based software development of large-scale systems. IEEE Trans. Softw. Eng. 31(6), 495\u2013510 (2005)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"54_CR58","unstructured":"Subversion. http:\/\/subversion.tigris.org\/ (2008). Accessed 11 August 2008"},{"key":"54_CR59","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/0-387-34226-5_4","volume-title":"Open Source Systems","author":"T. Tuunanen","year":"2006","unstructured":"Tuunanen, T., Koskinen, J., K\u00e4rkk\u00e4inen, T.: Retrieving open source licenses. In: Damiani, E., Fitzgerald,\u00a0B., Scacchi, W., Scotto, M., Succi, G. (eds.) Open Source Systems. IFIP International Federation for Information Processing, vol. 203, pp. 35\u201346. Springer, Berlin (2006)"},{"issue":"10","key":"54_CR60","doi-asserted-by":"crossref","first-page":"694","DOI":"10.1109\/TSE.2004.58","volume":"30","author":"L. Yu","year":"2004","unstructured":"Yu, L., Schach, S., Chen, K., Offutt, J.: Categorization of common coupling and its application to the maintainability of the Linux kernel. IEEE Trans. Softw. Eng. 30(10), 694\u2013706 (2004)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-009-0054-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10515-009-0054-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-009-0054-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T19:16:10Z","timestamp":1559157370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10515-009-0054-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,6]]},"references-count":60,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2009,12]]}},"alternative-id":["54"],"URL":"https:\/\/doi.org\/10.1007\/s10515-009-0054-z","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,6,6]]}}}