{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:01:25Z","timestamp":1762430485224,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T00:00:00Z","timestamp":1284940800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,9,20]]},"DOI":"10.1145\/1858996.1859040","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T12:04:33Z","timestamp":1285157073000},"page":"205-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Security-driven model-based dynamic adaptation"],"prefix":"10.1145","author":[{"given":"Brice","family":"Morin","sequence":"first","affiliation":[{"name":"INRIA, Centre Rennes - Bretagne Atlantique, Rennes, France"}]},{"given":"Tejeddine","family":"Mouelhi","sequence":"additional","affiliation":[{"name":"Telecom Bretagne, Rennes, France"}]},{"given":"Franck","family":"Fleurey","sequence":"additional","affiliation":[{"name":"SINTEF ICT, Oslo, Norway"}]},{"given":"Yves","family":"Le Traon","sequence":"additional","affiliation":[{"name":"University of Luxembourg, Luxembourg, Luxembourg"}]},{"given":"Olivier","family":"Barais","sequence":"additional","affiliation":[{"name":"IRISA, Universit\u00e9 de Rennes, Rennes, France"}]},{"given":"Jean-Marc","family":"J\u00e9z\u00e9quel","sequence":"additional","affiliation":[{"name":"INRIA and IRISA, Universit\u00e9 de Rennes, Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2010,9,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/3127142.3127155"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/950191.950194"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/306686.306687"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770560.1770581"},{"key":"e_1_3_2_1_5_1","first-page":"8","volume-title":"REF'98: 6th Reengineering Forum","author":"Cazzola W.","year":"1998","unstructured":"}} W. Cazzola , A. Savigni , A. Sosio , and F. Tisato . Architectural reflection : Bridging the gap between a running system and its architectural specification . In REF'98: 6th Reengineering Forum , pages 8 -- 11 . IEEE, 1998 . }}W. Cazzola, A. Savigni, A. Sosio, and F. Tisato. Architectural reflection : Bridging the gap between a running system and its architectural specification. In REF'98: 6th Reengineering Forum, pages 8--11. IEEE, 1998."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029144"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_8_1","volume-title":"J-M. J\u00e9z\u00e9quel. Modeling and Validating Dynamic Adaptation. In 3rd International Workshop on Models@Runtime, at MODELS'08","author":"Fleurey F.","year":"2008","unstructured":"}} F. Fleurey , V. Dehlen , N. Bencomo , B. Morin , and J-M. J\u00e9z\u00e9quel. Modeling and Validating Dynamic Adaptation. In 3rd International Workshop on Models@Runtime, at MODELS'08 , Toulouse, France, oct 2008 . }}F. Fleurey, V. Dehlen, N. Bencomo, B. Morin, and J-M. J\u00e9z\u00e9quel. Modeling and Validating Dynamic Adaptation. In 3rd International Workshop on Models@Runtime, at MODELS'08, Toulouse, France, oct 2008."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/383891.383894"},{"key":"e_1_3_2_1_10_1","first-page":"412","volume-title":"UMLsec: Extending UML for Secure Systems Development. In UML'02: 5th International Conference on The UML","author":"J\u00fcrjens J.","year":"2002","unstructured":"}} J. J\u00fcrjens . UMLsec: Extending UML for Secure Systems Development. In UML'02: 5th International Conference on The UML , pages 412 -- 425 , Dresden, Germany , 2002 . Springer-Verlag. }}J. J\u00fcrjens. UMLsec: Extending UML for Secure Systems Development. In UML'02: 5th International Conference on The UML, pages 412--425, Dresden, Germany, 2002. Springer-Verlag."},{"key":"e_1_3_2_1_11_1","volume-title":"Organization Based Access Control","author":"Kalam A. Abou El","year":"2003","unstructured":"}} A. Abou El Kalam , R. El Baida , P. Balbiani , S. Benferhat , F. Cuppens , Y. Deswarte , A. Mi\u00e8ge , C. Saurel , and G. Trouessin . Organization Based Access Control , 2003 . }}A. Abou El Kalam, R. El Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Mi\u00e8ge, C. Saurel, and G. Trouessin. Organization Based Access Control, 2003."},{"key":"e_1_3_2_1_12_1","first-page":"327","volume-title":"An Overview of AspectJ. In ECOOP'01: 15th European Conference on Object-Oriented Programming","author":"Kiczales G.","year":"2001","unstructured":"}} G. Kiczales , E. Hilsdale , J. Hugunin , M. Kersten , J. Palm , and W. G. Griswold . An Overview of AspectJ. In ECOOP'01: 15th European Conference on Object-Oriented Programming , pages 327 -- 353 , London, UK , 2001 . Springer-Verlag. }}G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An Overview of AspectJ. In ECOOP'01: 15th European Conference on Object-Oriented Programming, pages 327--353, London, UK, 2001. Springer-Verlag."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24721-0_13"},{"key":"e_1_3_2_1_14_1","first-page":"426","volume-title":"SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML'02: 5th International Conference on The UML","author":"Lodderstedt T.","year":"2002","unstructured":"}} T. Lodderstedt , D. Basin , and J. Doser . SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML'02: 5th International Conference on The UML , pages 426 -- 441 , Dresden, Germany , 2002 . Springer-Verlag. }}T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML'02: 5th International Conference on The UML, pages 426--441, Dresden, Germany, 2002. Springer-Verlag."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070514"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87875-9_54"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.327"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87875-9_38"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11557432_19"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89897-9_5"},{"key":"e_1_3_2_1_21_1","volume-title":"Release 4.1","author":"Gi Alliance The","year":"2007","unstructured":"}} The OS Gi Alliance . OSGi Service Platform Core Specification , Release 4.1 , May 2007 . http:\/\/www.osgi.org\/Specifications\/. }}The OSGi Alliance. OSGi Service Platform Core Specification, Release 4.1, May 2007. http:\/\/www.osgi.org\/Specifications\/."}],"event":{"name":"ASE10: IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Antwerp Belgium","acronym":"ASE10"},"container-title":["Proceedings of the IEEE\/ACM international conference on Automated software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1858996.1859040","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1858996.1859040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:08:27Z","timestamp":1750248507000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1858996.1859040"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,20]]},"references-count":21,"alternative-id":["10.1145\/1858996.1859040","10.1145\/1858996"],"URL":"https:\/\/doi.org\/10.1145\/1858996.1859040","relation":{},"subject":[],"published":{"date-parts":[[2010,9,20]]},"assertion":[{"value":"2010-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}