{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:51:55Z","timestamp":1730238715426,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/icdim.2012.6360140","type":"proceedings-article","created":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T02:16:48Z","timestamp":1354328208000},"page":"259-265","source":"Crossref","is-referenced-by-count":8,"title":["Specifying security requirements of context aware system using UML"],"prefix":"10.1109","author":[{"given":"Saad","family":"Almutairi","sequence":"first","affiliation":[]},{"given":"Giampaolo","family":"Bella","sequence":"additional","affiliation":[]},{"given":"Ala","family":"Abu-Samaha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2036146.2036153"},{"key":"17","article-title":"Specifying security aspects in UML models","author":"peralta","year":"0","journal-title":"1st International Modeling Security Workshop Toulouse France 2008"},{"key":"18","article-title":"Securing UML information flow using flow UML","volume":"38","author":"alghathber","year":"2006","journal-title":"Research and Practice in Information Technology"},{"key":"15","article-title":"Enhancing UML to Model Custom Security Aspects","author":"mariscal","year":"0","journal-title":"Proc of AOM 2007"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76292-8_13"},{"key":"13","first-page":"412","article-title":"UMLsec: Extending UML for secure systems development","volume":"2460","author":"jurjans","year":"2004","journal-title":"LNCS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0093-9"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"journal-title":"Secure system development with UML","year":"2004","author":"jurjans","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.116"},{"key":"20","article-title":"A Framework for Requirements Engineering for Context-Aware Service","author":"finkelstein","year":"0","journal-title":"First International Workshop from Software Requirements to Architectures 2011"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2007.014070"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04434-2_12"},{"journal-title":"Software Assurance A Curriculum Guide to the Common Body of Knowledge to Produce Acquire and Sustain Secure Software","year":"2007","author":"redwine jr","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70754"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.5121\/ijwmn.2012.4313"},{"key":"3","article-title":"Towards a Better Understanding of Context and Context-Awareness","author":"abowd","year":"0","journal-title":"Proc of 1st International Symposium on Handheld and Ubiquitous Computing 1999"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/65.313011"},{"key":"10","first-page":"104","article-title":"Modelling Mobile Agent Applications in UML 2.0 Activity Diagrams","author":"kang","year":"2004","journal-title":"3rd SELMAS Workshop at ICSE"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"journal-title":"OMG'S Unified Modeling Language (UML)","year":"0","key":"7"},{"key":"6","first-page":"115","article-title":"Generalized role-based access control for securing future applications","author":"covington","year":"2000","journal-title":"23rdNational Information Systems Security Conference"},{"journal-title":"Policy-based Approach for Context-aware System","year":"2001","author":"alsammarraie","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74484-9_63"},{"key":"9","article-title":"Modelling Mobile Agent Applications by Extended UML Activity Diagram","author":"kang","year":"0","journal-title":"6th International Conference on Enterprise Information Systems (ICEIS)' 04 Porto Portugal 2004"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICMB.2005.33"}],"event":{"name":"2012 Seventh International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2012,8,22]]},"location":"Macau, Macao","end":{"date-parts":[[2012,8,24]]}},"container-title":["Seventh International Conference on Digital Information Management (ICDIM 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6341280\/6360086\/06360140.pdf?arnumber=6360140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T21:57:26Z","timestamp":1490133446000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6360140\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icdim.2012.6360140","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}