{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:00Z","timestamp":1750306980223,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,17]],"date-time":"2013-06-17T00:00:00Z","timestamp":1371427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,17]]},"DOI":"10.1145\/2465470.2465476","type":"proceedings-article","created":{"date-parts":[[2013,6,18]],"date-time":"2013-06-18T12:36:08Z","timestamp":1371558968000},"page":"17-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Formalization of design patterns for security anddependability"],"prefix":"10.1145","author":[{"given":"Cuauhtemoc","family":"Castellanos","sequence":"first","affiliation":[{"name":"T\u00e9l\u00e9com-ParisTech, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Vergnaud","sequence":"additional","affiliation":[{"name":"THALES, Plaiseau, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Etienne","family":"Borde","sequence":"additional","affiliation":[{"name":"Telecom-ParisTech, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Thomas","family":"Derive","sequence":"additional","affiliation":[{"name":"THALES, Palaiseau, France"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Laurent","family":"Pautet","sequence":"additional","affiliation":[{"name":"Telecom-ParisTech, Paris, France"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2013,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Meta object facility (mof) 2.0 query\/view\/transformation specification.  Meta object facility (mof) 2.0 query\/view\/transformation specification."},{"key":"e_1_3_2_1_2_1","unstructured":"Object constraint language (ocl).  Object constraint language (ocl)."},{"key":"e_1_3_2_1_3_1","unstructured":"Uml-marte.  Uml-marte."},{"key":"e_1_3_2_1_4_1","unstructured":"Unified modeling language - infrastructure.  Unified modeling language - infrastructure."},{"key":"e_1_3_2_1_5_1","unstructured":"Aadl standard 2011.  Aadl standard 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-009-0128-1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.55"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176998"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1007\/978-3-642-21934-4_49","volume-title":"Computational Science and Its Applications - ICCSA","author":"Bouaziz R.","year":"2011","unstructured":"R. Bouaziz , B. Hamid , and N. Desnos . Towards a better integration of patterns in secure component-based systems design . In B. Murgante, O. Gervasi, A. Iglesias, D. Taniar, and B. Apduhan, editors, Computational Science and Its Applications - ICCSA 2011 , volume 6786 of Lecture Notes in Computer Science , pages 607 -- 621 . Springer Berlin Heidelberg , 2011. R. Bouaziz, B. Hamid, and N. Desnos. Towards a better integration of patterns in secure component-based systems design. In B. Murgante, O. Gervasi, A. Iglesias, D. Taniar, and B. Apduhan, editors, Computational Science and Its Applications - ICCSA 2011, volume 6786 of Lecture Notes in Computer Science, pages 607--621. Springer Berlin Heidelberg, 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2355579.2357455"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2nd OOPSLA Workshop on Generative Techniques in the Context of the Model Driven Architecture","author":"Czarnecki K.","year":"2003","unstructured":"K. Czarnecki and S. Helsen . Classification of model transformation approaches . In Proceedings of the 2nd OOPSLA Workshop on Generative Techniques in the Context of the Model Driven Architecture , 2003 . K. Czarnecki and S. Helsen. Classification of model transformation approaches. In Proceedings of the 2nd OOPSLA Workshop on Generative Techniques in the Context of the Model Driven Architecture, 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"IGI-Publishing","author":"Dong J.","year":"2007","unstructured":"J. Dong , P. Alencar , and D. Cowan . Design Patterns Formalization Techniques, chapter 5, Formal Specification and Verification of Design Patterns, page 94 . IGI-Publishing , 2007 . J. Dong, P. Alencar, and D. Cowan. Design Patterns Formalization Techniques, chapter 5, Formal Specification and Verification of Design Patterns, page 94. IGI-Publishing, 2007."},{"key":"e_1_3_2_1_15_1","volume-title":"Robust Scalable Architecture for Real-Time Systems","author":"Douglass B. P.","year":"2002","unstructured":"B. P. Douglass . Real-Time Design Patterns : Robust Scalable Architecture for Real-Time Systems . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 2002 . B. P. Douglass. Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2002."},{"key":"e_1_3_2_1_16_1","volume-title":"Role-based access controls. CoRR, abs\/0903.2171","author":"Ferraiolo D. F.","year":"2009","unstructured":"D. F. Ferraiolo and D. R. Kuhn . Role-based access controls. CoRR, abs\/0903.2171 , 2009 . D. F. Ferraiolo and D. R. Kuhn. Role-based access controls. CoRR, abs\/0903.2171, 2009."},{"key":"e_1_3_2_1_17_1","volume-title":"e. a. Gamma. Design Patterns - Elements of Reusable Object-Oriented Software","author":"E.","year":"1994","unstructured":"E. e. a. Gamma. Design Patterns - Elements of Reusable Object-Oriented Software . Addison-Wesley , 1994 . E. e. a. Gamma. Design Patterns - Elements of Reusable Object-Oriented Software. Addison-Wesley, 1994."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5120\/2259-2900"},{"key":"e_1_3_2_1_19_1","volume-title":"Patterns for Fault Tolerant Software","author":"Hanmer R. S.","year":"2007","unstructured":"R. S. Hanmer . Patterns for Fault Tolerant Software . John Wiley & Sons , December 14, 2007 . R. S. Hanmer. Patterns for Fault Tolerant Software. John Wiley & Sons, December 14, 2007."},{"key":"e_1_3_2_1_20_1","volume-title":"IGI-Publishing","author":"Lano K.","year":"2007","unstructured":"K. Lano . Design Patterns Formalization Techniques, chapter 8, Formalising Design Patterns as Model Transformation, page 94 . IGI-Publishing , 2007 . K. Lano. Design Patterns Formalization Techniques, chapter 8, Formalising Design Patterns as Model Transformation, page 94. IGI-Publishing, 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/647246.719477"},{"key":"e_1_3_2_1_22_1","volume-title":"IGI-Publishing","author":"Maplesden D.","year":"2007","unstructured":"D. Maplesden , J. Hosking , and J. Grundy . Design Patterns Formalization Techniques, chapter 2, A visual Langauge for Design Pattern Modeling Instantiation, page 20 . IGI-Publishing , 2007 . D. Maplesden, J. Hosking, and J. Grundy. Design Patterns Formalization Techniques, chapter 2, A visual Langauge for Design Pattern Modeling Instantiation, page 20. IGI-Publishing, 2007."},{"key":"e_1_3_2_1_23_1","first-page":"35","article-title":"A survey on security patterns","volume":"5","author":"K. M.","year":"2008","unstructured":"K. M. Nobukazu YOSHIOKA, Hironori WASHIZAKI . A survey on security patterns . Progress in Informatics , 5 : 35 -- 47 , 2008 . K. M. Nobukazu YOSHIOKA, Hironori WASHIZAKI. A survey on security patterns. Progress in Informatics, 5:35--47, 2008.","journal-title":"Progress in Informatics"},{"key":"e_1_3_2_1_24_1","volume-title":"Computer Science Laboratory SRI International","author":"Rushby J.","year":"2008","unstructured":"J. Rushby . Separation and integration in mils (the mils constitution). Technical report , Computer Science Laboratory SRI International , February 2008 . J. Rushby. Separation and integration in mils (the mils constitution). Technical report, Computer Science Laboratory SRI International, February 2008."},{"key":"e_1_3_2_1_25_1","volume-title":"A system of patternsfor fault tolerance","author":"Saridakis T.","year":"2002","unstructured":"T. Saridakis . A system of patternsfor fault tolerance . 2002 . T. Saridakis. A system of patternsfor fault tolerance. 2002."},{"key":"e_1_3_2_1_26_1","volume-title":"Security Patterns - Integrating Security and Systems Engineering","author":"Schumacher M.","year":"2006","unstructured":"M. Schumacher , E. B. Fernandez , D. Hybertson , F. Buschmann , and P. Sommerlad . Security Patterns - Integrating Security and Systems Engineering . John Wiley & Sons Inc ., New York, USA, 2006 . M. Schumacher, E. B. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns - Integrating Security and Systems Engineering. John Wiley & Sons Inc., New York, USA, 2006."},{"key":"e_1_3_2_1_27_1","volume-title":"IGI-Publishing","author":"Taibi T.","year":"2007","unstructured":"T. Taibi . Design Patterns Formalization Techniques, chapter 1, An Integrated Approach to Design Patterns Formalization, page 94 . IGI-Publishing , 2007 . T. Taibi. Design Patterns Formalization Techniques, chapter 1, An Integrated Approach to Design Patterns Formalization, page 94. IGI-Publishing, 2007."}],"event":{"name":"Comparch '13: Federated Events on Component-Based Software Engineering and Software Architecture","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Vancouver British Columbia Canada","acronym":"Comparch '13"},"container-title":["Proceedings of the 4th international ACM Sigsoft symposium on Architecting critical systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2465470.2465476","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2465470.2465476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:37Z","timestamp":1750235977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2465470.2465476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,17]]},"references-count":26,"alternative-id":["10.1145\/2465470.2465476","10.1145\/2465470"],"URL":"https:\/\/doi.org\/10.1145\/2465470.2465476","relation":{},"subject":[],"published":{"date-parts":[[2013,6,17]]},"assertion":[{"value":"2013-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}