{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:25Z","timestamp":1766449705406,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T00:00:00Z","timestamp":1308096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,15]]},"DOI":"10.1145\/1998441.1998443","type":"proceedings-article","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T13:47:14Z","timestamp":1308664034000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["A decade of model-driven security"],"prefix":"10.1145","author":[{"given":"David","family":"Basin","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"given":"Manuel","family":"Clavel","sequence":"additional","affiliation":[{"name":"IMDEA Software &amp; Universidad Complutense de Madrid, Madrid, Spain"}]},{"given":"Marina","family":"Egea","sequence":"additional","affiliation":[{"name":"IMDEA Software, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2011,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"195","volume-title":"Proceedings of the 9th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'00)","author":"Ahn G.-J.","year":"2000","unstructured":"G.-J. Ahn and M. E. Shin . UML-based representation of role-based access control . In Proceedings of the 9th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'00) , pages 195 -- 200 . IEEE Computer Society , June 2000 . G.-J. Ahn and M. E. Shin. UML-based representation of role-based access control. In Proceedings of the 9th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'00), pages 195--200. IEEE Computer Society, June 2000."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/647069.715953"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370687.1370692"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1317532.1318038"},{"key":"e_1_3_2_1_5_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/978-3-540-75209-7_29","volume-title":"Proceedings of the 10th International Conference on Model Driven Engineering Languages and Systems (MODELS '07)","author":"Basin D.","year":"2007","unstructured":"D. Basin , M. Clavel , J. Doser , and M. Egea . A metamodel-based approach for analyzing security-design models . In G. Engels, B. Opdyke, D. Schmidt, and F. Weil, editors, Proceedings of the 10th International Conference on Model Driven Engineering Languages and Systems (MODELS '07) , volume 4735 of LNCS , pages 420 -- 435 . Springer-Verlag , 2007 . D. Basin, M. Clavel, J. Doser, and M. Egea. A metamodel-based approach for analyzing security-design models. In G. Engels, B. Opdyke, D. Schmidt, and F. Weil, editors, Proceedings of the 10th International Conference on Model Driven Engineering Languages and Systems (MODELS '07), volume 4735 of LNCS, pages 420--435. Springer-Verlag, 2007."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.011"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11747-3_16"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775425"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125808.1125810"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-006-0012-5"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-007-0045-y"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/942793.943128"},{"key":"e_1_3_2_1_13_1","first-page":"15","article-title":"Building an efficient component for OCL evaluation","author":"Clavel M.","year":"2008","unstructured":"M. Clavel , M. Egea , and M. A. G. de Dios . Building an efficient component for OCL evaluation . Electronic Communications of the EASST , 15 , 2008 . M. Clavel, M. Egea, and M. A. G. de Dios. Building an efficient component for OCL evaluation. Electronic Communications of the EASST, 15, 2008.","journal-title":"Electronic Communications of the EASST"},{"key":"e_1_3_2_1_14_1","first-page":"24","article-title":"Checking unsatisfiability for OCL constraints","author":"Clavel M.","year":"2009","unstructured":"M. Clavel , M. Egea , and M. A. G. de Dios . Checking unsatisfiability for OCL constraints . Electronic Communications of the EASST , 24 , 2009 . M. Clavel, M. Egea, and M. A. G. de Dios. Checking unsatisfiability for OCL constraints. Electronic Communications of the EASST, 24, 2009.","journal-title":"Electronic Communications of the EASST"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69100-6_22"},{"key":"e_1_3_2_1_16_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"Policies for Distributed Systems and Networks (POLICY '01)","author":"Damianou N.","year":"2001","unstructured":"N. Damianou , N. Dulay , E. Lupu , and M. Sloman . The Ponder policy specification language . In M. Sloman, J. Lobo, and E. C. Lupu, editors, Policies for Distributed Systems and Networks (POLICY '01) , volume 1995 of LNCS , pages 18 -- 38 , Bristol-United Kingdom, 2001 . Springer-Verlag . N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder policy specification language. In M. Sloman, J. Lobo, and E. C. Lupu, editors, Policies for Distributed Systems and Networks (POLICY '01), volume 1995 of LNCS, pages 18--38, Bristol-United Kingdom, 2001. Springer-Verlag."},{"key":"e_1_3_2_1_17_1","volume-title":"The MySQL4OCL code generator","author":"Dania C.","year":"2010","unstructured":"C. Dania and M. Egea . The MySQL4OCL code generator , 2010 . http:\/\/www.bm1software.com\/mysql-ocl\/. C. Dania and M. Egea. The MySQL4OCL code generator, 2010. http:\/\/www.bm1software.com\/mysql-ocl\/."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810366"},{"key":"e_1_3_2_1_19_1","unstructured":"B. Dutertre and L. Moura. Yices: An SMT solver. http:\/\/yices.csl.sri.com\/ 2008.  B. Dutertre and L. Moura. Yices: An SMT solver. http:\/\/yices.csl.sri.com\/ 2008."},{"key":"e_1_3_2_1_20_1","unstructured":"Eclipse Model to Model (M2M) Project. The operational QVT transformation engine. http:\/\/www.eclipse.org\/modeling\/m2m\/ 2011.  Eclipse Model to Model (M2M) Project. The operational QVT transformation engine. http:\/\/www.eclipse.org\/modeling\/m2m\/ 2011."},{"key":"e_1_3_2_1_21_1","unstructured":"Eclipse Model to Text (M2T) Project. The Java emitter template (JET) framework for code generation. http:\/\/www.eclipse.org\/modeling\/m2t\/ 2011.  Eclipse Model to Text (M2T) Project. The Java emitter template (JET) framework for code generation. http:\/\/www.eclipse.org\/modeling\/m2t\/ 2011."},{"key":"e_1_3_2_1_22_1","first-page":"36","article-title":"MySQL4OCL: A stored procedure-based MySQL code generator for OCL","author":"Egea M.","year":"2010","unstructured":"M. Egea , C. Dania , and M. Clavel . MySQL4OCL: A stored procedure-based MySQL code generator for OCL . Electronic Communications of the EASST , 36 , 2010 . M. Egea, C. Dania, and M. Clavel. MySQL4OCL: A stored procedure-based MySQL code generator for OCL. Electronic Communications of the EASST, 36, 2010.","journal-title":"Electronic Communications of the EASST"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000687"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2006.07.003"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2005.48"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137627.1137634"},{"key":"e_1_3_2_1_28_1","volume-title":"Convergent Architecture: Building Model Driven J2EE Systems with UML","author":"Hubert R.","year":"2001","unstructured":"R. Hubert . Convergent Architecture: Building Model Driven J2EE Systems with UML . John Wiley & Sons , 2001 . R. Hubert. Convergent Architecture: Building Model Driven J2EE Systems with UML. John Wiley & Sons, 2001."},{"key":"e_1_3_2_1_29_1","series-title":"LNCS","first-page":"412","volume-title":"Proceedings of the 5th International Conference on the Unified Modeling Language (UML'02)","author":"J\u00fcrjens J.","year":"2002","unstructured":"J. J\u00fcrjens . UMLsec: Extending UML for secure systems development . In J. M. J\u00e9z\u00e9quel, H. Hussmann, and S. Cook, editors, Proceedings of the 5th International Conference on the Unified Modeling Language (UML'02) , volume 2460 of LNCS , pages 412 -- 425 . Springer-Verlag , 2002 . J. J\u00fcrjens. UMLsec: Extending UML for secure systems development. In J. M. J\u00e9z\u00e9quel, H. Hussmann, and S. Cook, editors, Proceedings of the 5th International Conference on the Unified Modeling Language (UML'02), volume 2460 of LNCS, pages 412--425. Springer-Verlag, 2002."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_32_1","series-title":"LNCS","first-page":"426","volume-title":"J.-M","author":"Lodderstedt T.","year":"2002","unstructured":"T. Lodderstedt , D. Basin , and J. Doser . SecureUML: A UML-based modeling language for model-driven security . In J.-M . J\u00e9z\u00e9quel, H. Hussmann, and S. Cook, editors, Proceedings of the 5th international Conference on the Unified Modeling Language: Model Engineering, Concepts, and Tools (UML'02), volume 2460 of LNCS , pages 426 -- 441 . Springer-Verlag , 2002 . T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security. In J.-M. J\u00e9z\u00e9quel, H. Hussmann, and S. Cook, editors, Proceedings of the 5th international Conference on the Unified Modeling Language: Model Engineering, Concepts, and Tools (UML'02), volume 2460 of LNCS, pages 426--441. Springer-Verlag, 2002."},{"key":"e_1_3_2_1_33_1","volume-title":"Model transformations for the MDA with BOTL. Technical report","author":"Marschall F.","year":"2003","unstructured":"F. Marschall and P. Braun . Model transformations for the MDA with BOTL. Technical report , University of Twente , 2003 . F. Marschall and P. Braun. Model transformations for the MDA with BOTL. Technical report, University of Twente, 2003."},{"key":"e_1_3_2_1_34_1","unstructured":"F. Marschall and P. Braun. Bidirectional object oriented transformation language (BOTL). http:\/\/sourceforge.net\/projects\/botl\/ 2005.  F. Marschall and P. Braun. Bidirectional object oriented transformation language (BOTL). http:\/\/sourceforge.net\/projects\/botl\/ 2005."},{"key":"e_1_3_2_1_35_1","first-page":"06","volume-title":"OMG","author":"Object Management Group","year":"2003","unstructured":"Object Management Group . Model driven architecture guide v. 1.0.1. Technical report , OMG , 2003 . OMG document available at http:\/\/www.omg.org\/cgi-bin\/doc?omg\/03- 06 - 01 . Object Management Group. Model driven architecture guide v. 1.0.1. Technical report, OMG, 2003. OMG document available at http:\/\/www.omg.org\/cgi-bin\/doc?omg\/03-06-01."},{"key":"e_1_3_2_1_36_1","volume-title":"February","author":"Object Management Group","year":"2010","unstructured":"Object Management Group . Object Constraint Language specification Version 2.2 , February 2010 . OMG document available at http:\/\/www.omg.org\/spec\/OCL\/2.2. Object Management Group. Object Constraint Language specification Version 2.2, February 2010. OMG document available at http:\/\/www.omg.org\/spec\/OCL\/2.2."},{"key":"e_1_3_2_1_37_1","first-page":"42","volume-title":"Proceegings of the 1st European Workshop on Security in Model Driven Arquitecture (SEC-MDA'09)","author":"Schlapfer M.","year":"2009","unstructured":"M. Schlapfer , M. Egea , D. Basin , and M. Clavel . Automatic generation of security-aware GUI models. In A. Bagnato, editor , Proceegings of the 1st European Workshop on Security in Model Driven Arquitecture (SEC-MDA'09) , pages 42 -- 56 , Enschede, the Netherlands , 2009 . CTIT Workshop Proceedings WP09-06. M. Schlapfer, M. Egea, D. Basin, and M. Clavel. Automatic generation of security-aware GUI models. In A. Bagnato, editor, Proceegings of the 1st European Workshop on Security in Model Driven Arquitecture (SEC-MDA'09), pages 42--56, Enschede, the Netherlands, 2009. CTIT Workshop Proceedings WP09-06."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_5"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.35"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168092.1168095"},{"key":"e_1_3_2_1_41_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/3-540-45853-0_13","volume-title":"Proceedings of the 7th European Symposium on Research in Computer Security (ESORICS'02)","author":"von Oheimb D.","year":"2002","unstructured":"D. von Oheimb and V. Lotz . Formal security analysis with interacting state machines . In D. Gollmann, G. Karjoth, and M. Waidner, editors, Proceedings of the 7th European Symposium on Research in Computer Security (ESORICS'02) , volume 2502 of Lecture Notes in Computer Science , pages 212 -- 228 . Springer Berlin \/ Heidelberg , 2002 . D. von Oheimb and V. Lotz. Formal security analysis with interacting state machines. In D. Gollmann, G. Karjoth, and M. Waidner, editors, Proceedings of the 7th European Symposium on Research in Computer Security (ESORICS'02), volume 2502 of Lecture Notes in Computer Science, pages 212--228. Springer Berlin \/ Heidelberg, 2002."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24655-8_75"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2008.10.002"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1404946.1404947"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_32"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370684.1370685"}],"event":{"name":"SACMAT '11: 16th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Innsbruck Austria","acronym":"SACMAT '11"},"container-title":["Proceedings of the 16th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1998441.1998443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1998441.1998443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:13Z","timestamp":1750244773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1998441.1998443"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,15]]},"references-count":45,"alternative-id":["10.1145\/1998441.1998443","10.1145\/1998441"],"URL":"https:\/\/doi.org\/10.1145\/1998441.1998443","relation":{},"subject":[],"published":{"date-parts":[[2011,6,15]]},"assertion":[{"value":"2011-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}