{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T12:25:38Z","timestamp":1687091138068},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T00:00:00Z","timestamp":1422403200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s13198-015-0338-6","type":"journal-article","created":{"date-parts":[[2015,1,26]],"date-time":"2015-01-26T22:20:21Z","timestamp":1422310821000},"page":"208-218","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards designing of SPF based secure web application using UML 2.0"],"prefix":"10.1007","volume":"8","author":[{"given":"Nitish","family":"Pathak","sequence":"first","affiliation":[]},{"given":"Girish","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"B. M.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,1,28]]},"reference":[{"key":"338_CR1","doi-asserted-by":"crossref","unstructured":"Ahrendt W, Baar T, Beckert B, Giese M, H\u00e4hnle R, Menzel W, Mostowski W, Schmitt P (2002) The key system: integrating object-oriented design and formal methods, proceedings of FASE 2002 ETAPS 02, Grenoble, France. Available at http:\/\/i12www.ira.uka.de\/~projekt\/index.html","DOI":"10.1007\/3-540-45923-5_23"},{"key":"338_CR2","doi-asserted-by":"crossref","unstructured":"Baresi L, Garzotto F, Paolini P (2000) From web sites to web applications: new issues for conceptual modeling. ER\u20192000 Workshop on Conceptual Modeling and the Web, LNCS 1921. pp. 89\u2013100. Springer-Verlag","DOI":"10.1007\/3-540-45394-6_9"},{"key":"338_CR3","doi-asserted-by":"crossref","unstructured":"Becker LB, Pereira CE, Dias OP, Teixeira IM, Teixeira JP (2000) MOSYS: a methodology for automatic object identification from system specification. In: 3rd IEEE international symposium on object-oriented real-time distributed computing (ISORC 2000), IEEE CS Press, pp. 198\u2013201","DOI":"10.1109\/ISORC.2000.839529"},{"key":"338_CR4","volume-title":"The UML language users guide","author":"G Booch","year":"1999","unstructured":"Booch G, Jacobson I, Rumbaugh J (1999) The UML language users guide. Addison-Wesley, ACM Press, Redwood City"},{"key":"338_CR5","unstructured":"Breu R, Grosu R, Huber F, Rumpe B, Schwerin W (1997) Towards a precise semantics for object-oriented modeling techniques. In: Proceedings of the ECOOP\u201997, lecture notes in computer science 1241, pp. 314\u2013364, Springer-Verlag"},{"key":"338_CR6","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s10270-012-0278-4","volume":"11","author":"MRV Chaudron","year":"2012","unstructured":"Chaudron MRV, Werner H, Nugroho A (2012) How effective is UML modeling? An empirical perspective on costs and benefits. Softw Syst Model 11:571\u2013580. doi: 10.1007\/s10270-012-0278-4","journal-title":"Softw Syst Model"},{"key":"338_CR7","doi-asserted-by":"crossref","unstructured":"De Pauw W, Helm R, Kimelman D, Vlissides J (1993) Visualizing the behavior of object-oriented systems. In Proceedings OOPSLA\u201993, pp. 326\u2013337. ACM Press","DOI":"10.1145\/165854.165919"},{"key":"338_CR8","doi-asserted-by":"crossref","unstructured":"Epstein P, Sandhu R (1999) Towards a UML based approach to role engineering In: Proceedings of the 4th ACM Workshop on Role-based access control, pp. 135\u2013143. ACM Press","DOI":"10.1145\/319171.319184"},{"key":"338_CR9","doi-asserted-by":"crossref","unstructured":"Favre L, Mart\u00ednez L, Pereira C (2000) Transforming UML static models into object-oriented code. Technology of object oriented languages and systems, Henderson-Sellers B, Meyer B (eds.) TOOLS 37 IEEE Computer Press, Australia, pp. 170\u2013181","DOI":"10.1109\/TOOLS.2000.891367"},{"key":"338_CR10","doi-asserted-by":"crossref","unstructured":"Fernandes JM, Machado RJ (2001) From use cases to objects: an industrial information systems case study analysis. In: 7th international conference on object-oriented information systems (OOIS\u201901). Springer, Berlin, pp. 319\u2013328","DOI":"10.1007\/978-1-4471-0719-4_33"},{"key":"338_CR11","doi-asserted-by":"crossref","unstructured":"Machado RJ. Fernandes, Monteiro JM, Rodrigues P (2005) Transformation of UML models for service-oriented software architectures In: Proceedings of 12th IEEE international conference on the engineering of computer based systems (ECBS 2005), pp. 173\u201382","DOI":"10.1109\/ECBS.2005.73"},{"key":"338_CR12","doi-asserted-by":"crossref","unstructured":"Gogolla M, Henderson-Sellers B (2002) Formal analysis of UML stereotypes within the UML metamodel. In: Proceedings of \u226aUML\u226b 2002, 5th international conference unified modeling language. Cook S, Hussmann H, Jezequel JM (eds.) Lecture notes in computer science, Springer-Verlag","DOI":"10.1007\/3-540-45800-X_8"},{"key":"338_CR13","doi-asserted-by":"crossref","unstructured":"G\u00f3mez J, Cachero C, Pastor O (2000) Extending a conceptual modeling approach to web application design. In proceedings conference on advanced information systems engineering (CAiSE), LNCS 1789, pp. 79\u201393, Springer- Verlag","DOI":"10.1007\/3-540-45140-4_7"},{"key":"338_CR28","unstructured":"http:\/\/cairo.cs.uiuc.edu\/publications\/papers\/thesis-achu.pdf"},{"key":"338_CR14","unstructured":"http:\/\/www.ijmer.com\/papers\/vol%201%20issue%201\/P011113119.34.pdf"},{"key":"338_CR29","unstructured":"http:\/\/www.ijric.org\/volumes\/Vol8\/Vol8No8.pdf"},{"key":"338_CR15","unstructured":"Jacobson I, Magnus C, Patrik J, \u00d6vergaard G (2004) Object-oriented software engineering: a use case driven approach. In: Ferraiolo D and Kuhn R (eds.) Role-based access control. Proceedings of the 15th national computer security conference, Addison-Wesley, Wokingham, England, 1992"},{"key":"338_CR16","doi-asserted-by":"crossref","unstructured":"Joshi JBD, Aref WG, Ghafoor A and Spafford EH (2001) Security models for web-based applications","DOI":"10.1145\/359205.359224"},{"key":"338_CR17","doi-asserted-by":"crossref","unstructured":"J\u00fcrjens J (2001) Towards development of secure systems using UMLsec. In Hussmann H (ed) Fundamental approaches to software engineering, 4th international conference proceedings, LNCS, Spriger, pp. 187\u2013200","DOI":"10.1007\/3-540-45314-8_14"},{"issue":"8","key":"338_CR19","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/s10270-007-0068-6","volume":"2009","author":"P Kosiuczenko","year":"2007","unstructured":"Kosiuczenko P (2007) Redesign of UML class diagrams: a formal approach. Softw Syst Model 2009(8):165\u2013183. doi: 10.1007\/s10270-007-0068-6","journal-title":"Softw Syst Model"},{"key":"338_CR20","unstructured":"Koskimies K, M\u00a8annist\u00a8o T, Syst\u00a8a T, Tuomi J (1998) Automated support for modeling OO software, IEEE Software, 15, 1, January\/February, pp. 87\u201394"},{"key":"338_CR21","doi-asserted-by":"crossref","unstructured":"Marcus A, Ferenc R, Poshyvanyk D (2008) Using the conceptual cohesion of classes for fault prediction in object-oriented systems. IEEE Transact Softw Eng, 34(2), March\/April","DOI":"10.1109\/TSE.2007.70768"},{"key":"338_CR22","doi-asserted-by":"crossref","unstructured":"Pathak N, Sharma G, Singh BM (2014) Forward engineering based implementation of TOS in social networking. Int J Comput App, 102(11), pp. 33\u201338, ISSN: 0975\u20138887","DOI":"10.5120\/17861-8757"},{"key":"338_CR23","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/s10270-007-0053-0","volume":"6","author":"DC Petriu","year":"2007","unstructured":"Petriu DC, Shen H, Sabetta A (2007) Performance analysis of aspect-oriented UML models. Softw Syst Model 6:453\u2013471. doi: 10.1007\/s10270-007-0053-0","journal-title":"Softw Syst Model"},{"key":"338_CR24","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10270-004-0059-9","volume":"4","author":"I Philippow","year":"2005","unstructured":"Philippow I, Streitferdt D, Riebisch M, Naumann S, Naumann S (2005) An approach for reverse engineering of design patterns. Softw Syst Model 4:55\u201370. doi: 10.1007\/s10270-004-0059-9","journal-title":"Softw Syst Model"},{"key":"338_CR25","doi-asserted-by":"crossref","unstructured":"Power JF & Malloy BA (2000) An approach for modeling the name lookup problem in the C++ programming language. In: ACM symposium on applied computing, Como","DOI":"10.1145\/338407.338564"},{"key":"338_CR26","doi-asserted-by":"crossref","unstructured":"Richner T, Ducasse S (1999) Recovering high-level views of object-oriented applications from static and dynamic information. In: Yang H and White L (eds) Proceedings ICSM\u201999 (International Conference on Software Maintenance) IEEE","DOI":"10.1109\/ICSM.1999.792487"},{"issue":"5","key":"338_CR27","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MS.2003.1231150","volume":"20","author":"S Sendall","year":"2003","unstructured":"Sendall S, Kozaczynski W (2003) Model transformation: the heart and soul of model-driven software developement. IEEE Softw 20(5):42\u201345","journal-title":"IEEE Softw"},{"issue":"9","key":"338_CR18","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s00766-004-0203-7","volume":"2004","author":"K Siau","year":"2004","unstructured":"Siau K, Lee L (2004) Are use case and class diagrams complementary in requirements analysis? An experimental study on use case and class diagrams in UML. Requir Eng 2004(9):229\u2013237. doi: 10.1007\/s00766-004-0203-7","journal-title":"Requir Eng"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-015-0338-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13198-015-0338-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-015-0338-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-015-0338-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T00:36:51Z","timestamp":1566261411000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13198-015-0338-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1,28]]},"references-count":29,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["338"],"URL":"https:\/\/doi.org\/10.1007\/s13198-015-0338-6","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,28]]}}}