{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:39:10Z","timestamp":1775054350403,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1145\/2422498.2422502","type":"proceedings-article","created":{"date-parts":[[2013,1,3]],"date-time":"2013-01-03T12:58:22Z","timestamp":1357217902000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards model-driven development of access control policies for web applications"],"prefix":"10.1145","author":[{"given":"Marianne","family":"Busch","sequence":"first","affiliation":[{"name":"LMU M\u00fcnchen, Munich, Germany"}]},{"given":"Nora","family":"Koch","sequence":"additional","affiliation":[{"name":"LMU M\u00fcnchen, Munich, Germany"}]},{"given":"Massimiliano","family":"Masi","sequence":"additional","affiliation":[{"name":"Tiani \"Spirit\" GmbH, Vienna, Austria"}]},{"given":"Rosario","family":"Pugliese","sequence":"additional","affiliation":[{"name":"Universit\u00e0 di Firenze, Firenze, Italy"}]},{"given":"Francesco","family":"Tiezzi","sequence":"additional","affiliation":[{"name":"IMT Advanced Studies Lucca, Lucca, Italy"}]}],"member":"320","published-online":{"date-parts":[[2012,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11747-3_16"},{"key":"e_1_3_2_1_2_1","first-page":"155","volume-title":"WEBIST","author":"Bertolino A.","year":"2012","unstructured":"A. Bertolino , S. Daoudagh , F. Lonetti , and E. Marchetti . The X-CREATE Framework - A Comparison of XACML Policy Testing Strategies . In WEBIST , pages 155 -- 160 . SciTePress , 2012 . A. Bertolino, S. Daoudagh, F. Lonetti, and E. Marchetti. The X-CREATE Framework - A Comparison of XACML Policy Testing Strategies. In WEBIST, pages 155--160. SciTePress, 2012."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103022.1103028"},{"key":"e_1_3_2_1_4_1","first-page":"37","volume":"4789","author":"Bryans J.","year":"2007","unstructured":"J. Bryans and J. S. Fitzgerald . Formal Engineering of XACML Access Control Policies in VDM++. In ICFEM, LNCS 4789 , pages 37 -- 56 . Springer, 2007 . J. Bryans and J. S. Fitzgerald. Formal Engineering of XACML Access Control Policies in VDM++. In ICFEM, LNCS 4789, pages 37--56. Springer, 2007.","journal-title":"In ICFEM, LNCS"},{"key":"e_1_3_2_1_5_1","first-page":"239","volume":"90","author":"Busch M.","year":"2011","unstructured":"M. Busch , A. Knapp , and N. Koch . Modeling Secure Navigation in Web Information Systems. In BIR, LNBIP 90 , pages 239 -- 253 . Springer, 2011 . M. Busch, A. Knapp, and N. Koch. Modeling Secure Navigation in Web Information Systems. In BIR, LNBIP 90, pages 239--253. Springer, 2011.","journal-title":"Modeling Secure Navigation in Web Information Systems. In BIR, LNBIP"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02818-2_49"},{"key":"e_1_3_2_1_7_1","first-page":"225","volume-title":"DNIS, LNCS 3433","author":"di Vimercati S. De Capitani","year":"2005","unstructured":"S. De Capitani di Vimercati , P. Samarati , and S. Jajodia . Policies, models, and languages for access control . In DNIS, LNCS 3433 , pages 225 -- 237 . Springer , 2005 . 10.1007\/978-3-540-31970-2_18 S. De Capitani di Vimercati, P. Samarati, and S. Jajodia. Policies, models, and languages for access control. In DNIS, LNCS 3433, pages 225--237. Springer, 2005. 10.1007\/978-3-540-31970-2_18"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_9_1","volume-title":"Secure Systems Development with UML","author":"J\u00fcrjens J.","year":"2005","unstructured":"J. J\u00fcrjens . Secure Systems Development with UML . Springer , 2005 . J. J\u00fcrjens. Secure Systems Development with UML. Springer, 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242664"},{"key":"e_1_3_2_1_11_1","first-page":"426","volume":"2460","author":"Lodderstedt T.","year":"2002","unstructured":"T. Lodderstedt , D. Basin , and J. Doser . SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML, LNCS 2460 , pages 426 -- 441 . Springer, 2002 . T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML, LNCS 2460, pages 426--441. Springer, 2002.","journal-title":"SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML, LNCS"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28166-2_7"},{"key":"e_1_3_2_1_13_1","volume-title":"eXtensible Access Control Markup Language (XACML) version 2.0","author":"OASIS XACML","year":"2005","unstructured":"OASIS XACML TC. eXtensible Access Control Markup Language (XACML) version 2.0 , 2005 . OASIS XACML TC. eXtensible Access Control Markup Language (XACML) version 2.0, 2005."},{"key":"e_1_3_2_1_14_1","unstructured":"OMG. Object Constraint Language (OCL) v2.3.1 2012. http:\/\/www.omg.org\/spec\/OCL\/2.3.1\/.  OMG. Object Constraint Language (OCL) v2.3.1 2012. http:\/\/www.omg.org\/spec\/OCL\/2.3.1\/."},{"key":"e_1_3_2_1_15_1","volume-title":"Easy XACML syntax with OpenAzPolicyReader","year":"2010","unstructured":"OpenLiberty. Easy XACML syntax with OpenAzPolicyReader , 2010 . From OpenAz maillist. http:\/\/lists.openliberty.org\/pipermail\/openaz\/2010-July\/000074.html. OpenLiberty. Easy XACML syntax with OpenAzPolicyReader, 2010. From OpenAz maillist. http:\/\/lists.openliberty.org\/pipermail\/openaz\/2010-July\/000074.html."},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"UACML: Unified Access Control Modeling Language. In NTMS 2011","author":"Slimani N.","year":"2011","unstructured":"N. Slimani , H. Khambhammettu , K. Adi , and L. Logrippo . UACML: Unified Access Control Modeling Language. In NTMS 2011 , pages 1 -- 8 , 2011 . N. Slimani, H. Khambhammettu, K. Adi, and L. Logrippo. UACML: Unified Access Control Modeling Language. In NTMS 2011, pages 1--8, 2011."},{"key":"e_1_3_2_1_17_1","first-page":"53","volume":"26","author":"Stepien B.","year":"2009","unstructured":"B. Stepien , A. P. Felty , and S. Matwin . A Non-technical User-Oriented Display Notation for XACML Conditions. In MCETECH, LNBIP 26 , pages 53 -- 64 . Springer, 2009 . B. Stepien, A. P. Felty, and S. Matwin. A Non-technical User-Oriented Display Notation for XACML Conditions. In MCETECH, LNBIP 26, pages 53--64. Springer, 2009.","journal-title":"A Non-technical User-Oriented Display Notation for XACML Conditions. In MCETECH, LNBIP"}],"event":{"name":"MODELS '12: ACM\/IEEE 15th International Conference on Model Driven Engineering Languages and Systems","location":"Innsbruck Austria","acronym":"MODELS '12","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the Workshop on Model-Driven Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2422498.2422502","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2422498.2422502","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:15Z","timestamp":1750277655000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2422498.2422502"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":17,"alternative-id":["10.1145\/2422498.2422502","10.1145\/2422498"],"URL":"https:\/\/doi.org\/10.1145\/2422498.2422502","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]},"assertion":[{"value":"2012-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}