{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T21:39:47Z","timestamp":1770068387942,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,15]],"date-time":"2010-04-15T00:00:00Z","timestamp":1271289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["INFSO-ICT-224498"],"award-info":[{"award-number":["INFSO-ICT-224498"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["DPI2006-15390"],"award-info":[{"award-number":["DPI2006-15390"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,15]]},"DOI":"10.1145\/2401736.2401741","type":"proceedings-article","created":{"date-parts":[[2012,11,29]],"date-time":"2012-11-29T17:08:34Z","timestamp":1354208914000},"page":"42-51","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Modelling and analysing resilience as a security issue within UML"],"prefix":"10.1145","author":[{"given":"Ricardo J.","family":"Rodr\u00edguez","sequence":"first","affiliation":[{"name":"Universidad de Zaragoza, Zaragoza, Spain"}]},{"given":"Jos\u00e9","family":"Merseguer","sequence":"additional","affiliation":[{"name":"Universidad de Zaragoza, Zaragoza, Spain"}]},{"given":"Simona","family":"Bernardi","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Torino, Torino, Italy"}]}],"member":"320","published-online":{"date-parts":[[2010,4,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"University of Lisbon","author":"Adelsbach A.","year":"2003"},{"key":"e_1_3_2_1_2_1","first-page":"132","volume-title":"7th European Workshop on Applications and Theory of Petri Nets","author":"Ajmone Marsan M.","year":"1987"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-009-0128-1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336559"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11767589_23"},{"key":"e_1_3_2_1_7_1","unstructured":"The GreatSPN tool http:\/\/www.di.unitorino.it\/~greatspn 2002. University of Torino.  The GreatSPN tool http:\/\/www.di.unitorino.it\/~greatspn 2002. University of Torino."},{"key":"e_1_3_2_1_8_1","unstructured":"T. HoneyNet Project editor. Know Your Enemy: Learning about Security Threats. Addison Wesley Publishing 2nd edition 2004.  T. HoneyNet Project editor. Know Your Enemy: Learning about Security Threats . Addison Wesley Publishing 2nd edition 2004."},{"key":"e_1_3_2_1_9_1","first-page":"412","volume-title":"UMLsec: Extending UML for Secure Systems Development. In UML '02: Proceedings of the 5th International Conference on The Unified Modeling Language","author":"J\u00fcrjens J.","year":"2002"},{"issue":"2","key":"e_1_3_2_1_10_1","first-page":"153","volume":"4","author":"Ka\u00e2niche M.","year":"2008","journal-title":"Modeling the Resilience of Large and Evolving Systems. International Journal of Performability Engineering"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(09)70059-4"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321705"},{"key":"e_1_3_2_1_13_1","first-page":"426","volume-title":"SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML '02: Proceedings of the 5th International Conference on The Unified Modeling Language","author":"Lodderstedt T.","year":"2002"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/3-540-45177-3_10","volume-title":"R. De Lemos","author":"Majzik I.","year":"2003"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/832316.837588"},{"key":"e_1_3_2_1_16_1","first-page":"01","volume-title":"Performance and Time Specification","author":"Object Management Group","year":"2005"},{"key":"e_1_3_2_1_17_1","unstructured":"Object Management Group. Unified Modelling Language: Superstructure July 2005. Version 2.0 formal\/05-07-04.  Object Management Group. Unified Modelling Language: Superstructure July 2005. Version 2.0 formal\/05-07-04."},{"key":"e_1_3_2_1_18_1","unstructured":"Object Management Group. A UML profile for Modeling and Analysis of Real Time Embedded Systems (MARTE) November 2009. Version 1.0 formal\/2009-11-02.  Object Management Group. A UML profile for Modeling and Analysis of Real Time Embedded Systems (MARTE) November 2009. Version 1.0 formal\/2009-11-02."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216993.1217010"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"A. E.\n       \n      Rugina K.\n       \n      Kanoun and \n      \n      \n      M.\n       \n      Ka\u00e2niche\n      \n  \n  . \n  A System Dependability Modeling Framework Using AADL and GSPNs. In R. de Lemos C. Gacek and A. B. Romanovsky editors WADS volume \n  4615\n   of \n  Lecture Notes in Computer Science pages \n  14\n  --\n  38\n  . \n  Springer 2006\n  .   A. E. Rugina K. Kanoun and M. Ka\u00e2niche. A System Dependability Modeling Framework Using AADL and GSPNs. In R. de Lemos C. Gacek and A. B. Romanovsky editors WADS volume 4615 of Lecture Notes in Computer Science pages 14--38. Springer 2006.","DOI":"10.1007\/978-3-540-74035-3_2"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2007.10"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45177-3_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"P.\n       \n      Ver\u00edssimo N. F.\n       \n      Neves M.\n       \n      Correia Y.\n       \n      Deswarte A. A. E.\n       \n      Kalam A.\n       \n      Bondavalli and \n      \n      \n      A.\n       \n      Daidone\n      \n  \n  . \n  The CRUTIAL Architecture for Critical Information Infrastructures. In R. de Lemos F. D. Giandomenico C. Gacek H. Muccini and M. Vieira editors WADS volume \n  5135\n   of \n  Lecture Notes in Computer Science pages \n  1\n  --\n  27\n  . \n  Springer 2007\n  .  P. Ver\u00edssimo N. F. Neves M. Correia Y. Deswarte A. A. E. Kalam A. Bondavalli and A. Daidone. The CRUTIAL Architecture for Critical Information Infrastructures. In R. de Lemos F. D. Giandomenico C. Gacek H. Muccini and M. Vieira editors WADS volume 5135 of Lecture Notes in Computer Science pages 1--27. Springer 2007.","DOI":"10.1007\/978-3-540-85571-2_1"},{"key":"e_1_3_2_1_24_1","first-page":"359","volume":"2003","author":"Wang F.","year":"2003","journal-title":"SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services. In Foundations of Intrusion Tolerant Systems"}],"event":{"name":"SERENE '10: International Workshop on Software Engineering for REsilient SystEms","location":"London United Kingdom","acronym":"SERENE '10","sponsor":["Newcastle University","ERCIM European Research Consortium for Informatics & Mathematics","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2401736.2401741","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2401736.2401741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:22:32Z","timestamp":1750245752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2401736.2401741"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,15]]},"references-count":24,"alternative-id":["10.1145\/2401736.2401741","10.1145\/2401736"],"URL":"https:\/\/doi.org\/10.1145\/2401736.2401741","relation":{},"subject":[],"published":{"date-parts":[[2010,4,15]]},"assertion":[{"value":"2010-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}