{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T23:27:02Z","timestamp":1747783622046},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/cimca.2005.1631590","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T16:26:01Z","timestamp":1148574361000},"page":"946-951","source":"Crossref","is-referenced-by-count":5,"title":["Patterning Protection Profiles by UML for Security Specifications"],"prefix":"10.1109","volume":"2","author":[{"given":"S.","family":"Morimoto","sequence":"first","affiliation":[]},{"family":"Jingde Cheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141701"},{"key":"22","article-title":"Database Management System Protection Profile","author":"smith","year":"2000","journal-title":"Oracle Corporation"},{"key":"17","first-page":"90","article-title":"Implementing Statecharts in Promela\/SPIN","author":"mikk","year":"1998","journal-title":"Proc Workshop Industrial-Strength Formal Specification Techniques (WIFT95)"},{"key":"18","first-page":"62","article-title":"A Formal Method for Verifying Security Specifications Based on International Standard ISO\/IEC 15408","author":"morimoto","year":"2005","journal-title":"Supplement of the IEEE-CS 2005 International Conference on Dependable Systems and Networks"},{"year":"0","key":"15"},{"key":"16","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","article-title":"SecureUML: A UML-Based Modeling Language for Model-Driven Security","author":"lodderstedt","year":"2002","journal-title":"UML 2002 - The Unified Modeling Language 5th International Conference"},{"key":"13","article-title":"Secure Systems Development with UML","author":"ju?rjens","year":"2005","journal-title":"Springer-Verlag"},{"year":"2002","key":"14","article-title":"IEC 13568 standard, \"Information Technology - Z Formal Specification Notation - Syntax, Type System and Semantics"},{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1995","author":"gamma","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1938"},{"year":"0","key":"21"},{"key":"3","article-title":"Object-Oriented Analysis and Design with Applications","author":"booch","year":"1993","journal-title":"Addison-Wesley Professional"},{"year":"2004","key":"20","article-title":"UML 2.0 Superstructure Specification"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07964-5"},{"key":"1","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/1035429.1035438","article-title":"authUML: A Three-Phased Framework to Analyze Access Control Specifications in Use Cases","author":"alghathbar","year":"2003","journal-title":"2003 ACM Workshop Formal Methods Sec Eng"},{"key":"10","first-page":"417","article-title":"An Overview of RoZ: A Tool for Integration UML and Z Specifications,''","author":"dupuy","year":"2000","journal-title":"Proceedings of the 12th Conference on Advanced information Systems Engineering"},{"journal-title":"Protection profile files","year":"0","key":"7"},{"journal-title":"Evaluated product files","year":"0","key":"6"},{"key":"5","article-title":"Model Checking","author":"clarke","year":"2000","journal-title":"MIT Press"},{"key":"4","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1007\/3-540-48683-6_44","article-title":"NuSMV: A New Symbolic Model Verifier","author":"cimatti","year":"1999","journal-title":"Proc Int Conf Computer Aided Verification"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029144"}],"event":{"name":"International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)","location":"Vienna, Austria"},"container-title":["International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10869\/34212\/01631590.pdf?arnumber=1631590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T02:02:09Z","timestamp":1497664929000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1631590\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/cimca.2005.1631590","relation":{},"subject":[]}}