{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:26Z","timestamp":1750307306320,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,20]],"date-time":"2011-06-20T00:00:00Z","timestamp":1308528000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,20]]},"DOI":"10.1145\/2000259.2000282","type":"proceedings-article","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T17:34:50Z","timestamp":1309282490000},"page":"133-142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Building components with embedded security monitors"],"prefix":"10.1145","author":[{"given":"Muhammad Umair Ahmed","family":"Khan","sequence":"first","affiliation":[{"name":"Queen's University, Kingston, ON, Canada"}]},{"given":"Mohammad","family":"Zulkernine","sequence":"additional","affiliation":[{"name":"Queen's University, Kingston, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2011,6,20]]},"reference":[{"issue":"2","key":"e_1_3_2_1_1_1","first-page":"57","article-title":"Survey of Component-Based Software Development","volume":"1","author":"Mahmood S.","year":"2007","journal-title":"IET Software, Institution of Engineering and Technology, UK"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.173"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.206"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.383"},{"volume-title":"Purdue University","year":"1998","author":"Krsul I.V.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.84"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.32"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138912.1138926"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.10.003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ADVCOMP.2008.36"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONIELECOMP.2007.113"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101975"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCGI.2008.43"},{"key":"e_1_3_2_1_14_1","first-page":"7","volume-title":"Proceedings of the Workshop on Specification and Verification of Component-Based Systems","author":"Barnett M.","year":"2001"},{"key":"e_1_3_2_1_15_1","first-page":"403","volume-title":"Proceedings of the 24th Computer Software and Applications Conference (COMPSAC'00)","author":"Gao J.","year":"2000"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-011-0198-6"},{"issue":"1","key":"e_1_3_2_1_17_1","first-page":"71","article-title":"STATL: An Attack Specification Language for State-Based Intrusion Detection","volume":"10","author":"Eckmann S.T.","year":"2000","journal-title":"Computer Security"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/784591.784754"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.007"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.08.017"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.23"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.09.020"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315249"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108473.1108496"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2005.36"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/876878.879316"},{"key":"e_1_3_2_1_27_1","first-page":"5","volume-title":"Proceedings of the 7th USENIX Security Conference","author":"Cowan C.","year":"1998"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITCC.2005.260"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.31"},{"key":"e_1_3_2_1_30_1","first-page":"50","volume-title":"Proceedings of the International Conference on Information Technology: Coding and Computing","author":"Pyo C.","year":"2004"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.2"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2008.136"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.3"},{"key":"e_1_3_2_1_34_1","unstructured":"Wilander J. \"Policy and Implementation Assurance for Software Security \" Doctoral dissertation Department of Computer and Information Science Link\u00f6ping University Sweden 2005.  Wilander J. \"Policy and Implementation Assurance for Software Security \" Doctoral dissertation Department of Computer and Information Science Link\u00f6ping University Sweden 2005."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.91"}],"event":{"name":"Comparch '11: Federated Events on Component-Based Software Engineering and Software Architecture","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Boulder Colorado USA","acronym":"Comparch '11"},"container-title":["Proceedings of the joint ACM SIGSOFT conference -- QoSA and ACM SIGSOFT symposium -- ISARCS on Quality of software architectures -- QoSA and architecting critical systems -- ISARCS"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000259.2000282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2000259.2000282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:00Z","timestamp":1750244400000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000259.2000282"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,20]]},"references-count":35,"alternative-id":["10.1145\/2000259.2000282","10.1145\/2000259"],"URL":"https:\/\/doi.org\/10.1145\/2000259.2000282","relation":{},"subject":[],"published":{"date-parts":[[2011,6,20]]},"assertion":[{"value":"2011-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}