{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:32:22Z","timestamp":1729665142082,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/rcis.2016.7549284","type":"proceedings-article","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T21:04:18Z","timestamp":1472159058000},"page":"1-12","source":"Crossref","is-referenced-by-count":3,"title":["Combining UML and B for the specification and validation of RBAC policies in business process activities"],"prefix":"10.1109","author":[{"given":"Salim","family":"Chehida","sequence":"first","affiliation":[]},{"given":"Akram","family":"Idani","sequence":"additional","affiliation":[]},{"given":"Yves","family":"Ledru","sequence":"additional","affiliation":[]},{"given":"Mustapha","family":"Kamel Rahmouni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12459-4_6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SECUREWARE.2007.4385334"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19125-1_3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00199-4_1"},{"key":"ref10","first-page":"95","article-title":"On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling","volume":"53","author":"russell","year":"2006","journal-title":"Proceedings of the 3rd Asia-Pacific Conference on Conceptual Modelling"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.01.018"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054234"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/REV.2008.8"},{"key":"ref14","article-title":"The TOPCASED project: a Toolkit in Open source for Critical Aeronautic SystEms Design","author":"farail","year":"2006","journal-title":"European Congress on Embedded Real-Time Software (ERTS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FormaliSE.2015.9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-011-0166-z"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-007-0063-9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45614-7_2"},{"journal-title":"BPMN Business Process Model and Notation (BPMN) Version 2 0","year":"2011","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.011"},{"key":"ref28","first-page":"117","article-title":"Towards a formal semantics of UML 2.0 activities","author":"st\u00f6rrle","year":"2005","journal-title":"Proceedings German Software Engineering Conference Volume P-64 of LNI"},{"journal-title":"UML 2 Unified Modeling Language Superstructure(version 2 4)","year":"2011","key":"ref3"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.09.010"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511624162"},{"key":"ref5","first-page":"151","article-title":"Extensions du diagramme d'activit&#x00E9; pour contr&#x00F4;ler l'acc&#x00E8;s au SI","author":"chehida","year":"2015","journal-title":"INFormatique des ORganisations et Syst&#x00E8;mes d'Information et de D&#x00E9;cision"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2014.7051974"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008680612960"},{"key":"ref7","article-title":"B for Modeling Secure Information Systems - the B4MSecure platform","volume":"4907","author":"idani","year":"2015","journal-title":"The 17th InternationalConference on Formal Engineering Methods ser LNCS"},{"journal-title":"Role-Based Access Control ser Computer Security Series","year":"2003","author":"ferraiolo","key":"ref2"},{"key":"ref1","first-page":"1","article-title":"Role Based Access Control","volume":"359","year":"2004","journal-title":"American National Standard for Information Technology"},{"journal-title":"Object Constraint Language (OCL) Version 2 3 1","article-title":"OCL 2","year":"2012","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e90-d.4.745"},{"journal-title":"Secure Systems Development with UML","year":"2004","author":"jurjens","key":"ref22"},{"key":"ref21","first-page":"637","article-title":"BPMN vs. UML activity diagram for business process modeling","volume":"11","author":"geambasu","year":"2012","journal-title":"Accounting and Management Information Systems"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75183-0_5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.11.015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.02.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295160"}],"event":{"name":"2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2016,6,1]]},"location":"Grenoble, France","end":{"date-parts":[[2016,6,3]]}},"container-title":["2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7541913\/7549273\/07549284.pdf?arnumber=7549284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T14:11:57Z","timestamp":1475158317000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7549284\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/rcis.2016.7549284","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}