{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:49Z","timestamp":1772164069692,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["221328183"],"award-info":[{"award-number":["221328183"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3278122.3278126","type":"proceedings-article","created":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T11:28:39Z","timestamp":1540380519000},"page":"93-106","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Model-based security analysis of feature-oriented software product lines"],"prefix":"10.1145","author":[{"given":"Sven","family":"Peldszus","sequence":"first","affiliation":[{"name":"University of Koblenz-Landau, Germany"}]},{"given":"Daniel","family":"Str\u00fcber","sequence":"additional","affiliation":[{"name":"University of Koblenz-Landau, Germany"}]},{"given":"Jan","family":"J\u00fcrjens","sequence":"additional","affiliation":[{"name":"University of Koblenz-Landau, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"989","article-title":"Model-based Privacy and Security Analysis with CARiSMA","author":"Ahmadian Amir Shayan","year":"2017","unstructured":"Amir Shayan Ahmadian , Sven Peldszus , Qusai Ramadan , and Jan J\u00fcrjens . 2017 . Model-based Privacy and Security Analysis with CARiSMA . In FSE. 989 - 993 . Amir Shayan Ahmadian, Sven Peldszus, Qusai Ramadan, and Jan J\u00fcrjens. 2017. Model-based Privacy and Security Analysis with CARiSMA. In FSE. 989-993.","journal-title":"FSE."},{"key":"e_1_3_2_1_2_1","first-page":"726","article-title":"A Product Line Modeling and Configuration Methodology to Support Model-Based Testing: An Industrial Case Study","author":"Ali Shaukat","year":"2012","unstructured":"Shaukat Ali , Tao Yue , Lionel C. Briand , and Suneth Walawege . 2012 . A Product Line Modeling and Configuration Methodology to Support Model-Based Testing: An Industrial Case Study . In MoDELS. 726 - 742 . Shaukat Ali, Tao Yue, Lionel C. Briand, and Suneth Walawege. 2012. A Product Line Modeling and Configuration Methodology to Support Model-Based Testing: An Industrial Case Study. In MoDELS. 726-742.","journal-title":"MoDELS."},{"key":"e_1_3_2_1_3_1","unstructured":"Oracle Corporation and\/or its affiliates. 2018. OpenJDK. (2018). http:\/\/openjdk.java.net\/.  Oracle Corporation and\/or its affiliates. 2018. OpenJDK. (2018). http:\/\/openjdk.java.net\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Feature-Oriented Software Product Lines - Concepts and Implementation","author":"Apel Sven","unstructured":"Sven Apel , Don S. Batory , Christian K\u00e4stner , and Gunter Saake . 2013. Feature-Oriented Software Product Lines - Concepts and Implementation . Springer . Sven Apel, Don S. Batory, Christian K\u00e4stner, and Gunter Saake. 2013. Feature-Oriented Software Product Lines - Concepts and Implementation. Springer."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.09.003"},{"key":"e_1_3_2_1_6_1","first-page":"581","article-title":"Model-based Security Engineering of Distributed Information Systems using UMLsec","author":"Best B.","year":"2007","unstructured":"B. Best , J. J\u00fcrjens , and B. Nuseibeh . 2007 . Model-based Security Engineering of Distributed Information Systems using UMLsec . In ICSE. ACM , 581 - 590 . B. Best, J. J\u00fcrjens, and B. Nuseibeh. 2007. Model-based Security Engineering of Distributed Information Systems using UMLsec. In ICSE. ACM, 581-590.","journal-title":"ICSE. ACM"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2432361"},{"key":"e_1_3_2_1_8_1","volume-title":"A feature-based survey of model view approaches. Software & Systems Modeling","author":"Bruneliere Hugo","year":"2017","unstructured":"Hugo Bruneliere , Erik Burger , Jordi Cabot , and Manuel Wimmer . 2017. A feature-based survey of model view approaches. Software & Systems Modeling ( 2017 ), 1-22. Hugo Bruneliere, Erik Burger, Jordi Cabot, and Manuel Wimmer. 2017. A feature-based survey of model view approaches. Software & Systems Modeling (2017), 1-22."},{"key":"e_1_3_2_1_9_1","first-page":"173","article-title":"MoDisco","author":"Bruneliere Hugo","year":"2010","unstructured":"Hugo Bruneliere , Jordi Cabot , Fr\u00e9d\u00e9ric Jouault , and Fr\u00e9d\u00e9ric Madiot . 2010 . MoDisco : A Generic and Extensible Framework for Model Driven Reverse Engineering. In ASE. ACM , 173 - 174 . Hugo Bruneliere, Jordi Cabot, Fr\u00e9d\u00e9ric Jouault, and Fr\u00e9d\u00e9ric Madiot. 2010. MoDisco: A Generic and Extensible Framework for Model Driven Reverse Engineering. In ASE. ACM, 173-174.","journal-title":"In ASE. ACM"},{"key":"e_1_3_2_1_10_1","unstructured":"Afredo Capozucca Betty Cheng Geri Georg Nicolas Guelfi Paul Istoan Gunter Mussbacher Adam Jensen Jean-Marc J\u00e9z\u00e9quel J\u00f6rg Kienzle Jacques Klein etal 2011. Requirements Definition Document for a Software Product Line of Car Crash Management Systems. ReMoDD (2011).  Afredo Capozucca Betty Cheng Geri Georg Nicolas Guelfi Paul Istoan Gunter Mussbacher Adam Jensen Jean-Marc J\u00e9z\u00e9quel J\u00f6rg Kienzle Jacques Klein et al. 2011. Requirements Definition Document for a Software Product Line of Car Crash Management Systems. ReMoDD (2011)."},{"key":"e_1_3_2_1_11_1","unstructured":"CARiSMA 2018. CARiSMA Tool. (2018). http:\/\/carisma.umlsec.de.  CARiSMA 2018. CARiSMA Tool. (2018). http:\/\/carisma.umlsec.de."},{"key":"e_1_3_2_1_12_1","first-page":"332","article-title":"What Developers Want and Need from Program Analysis: An Empirical Study","author":"Christakis Maria","year":"2016","unstructured":"Maria Christakis and Christian Bird . 2016 . What Developers Want and Need from Program Analysis: An Empirical Study . In ASE. 332 - 343 . Maria Christakis and Christian Bird. 2016. What Developers Want and Need from Program Analysis: An Empirical Study. In ASE. 332-343.","journal-title":"ASE."},{"key":"e_1_3_2_1_13_1","volume-title":"Model-Based Coverage-Driven Test Suite Generation for Software Product Lines","author":"Cichos Harald","unstructured":"Harald Cichos , Sebastian Oster , Malte Lochau , and Andy Sch\u00fcrr . 2011. Model-Based Coverage-Driven Test Suite Generation for Software Product Lines . Springer , 425-439. Harald Cichos, Sebastian Oster, Malte Lochau, and Andy Sch\u00fcrr. 2011. Model-Based Coverage-Driven Test Suite Generation for Software Product Lines. Springer, 425-439."},{"key":"e_1_3_2_1_14_1","first-page":"422","article-title":"Mapping Features to Models","author":"Czarnecki Krzysztof","year":"2005","unstructured":"Krzysztof Czarnecki and Michal Antkiewicz . 2005 . Mapping Features to Models : A Template Approach Based on Superimposed Variants. In GPCE. 422 - 437 . Krzysztof Czarnecki and Michal Antkiewicz. 2005. Mapping Features to Models: A Template Approach Based on Superimposed Variants. In GPCE. 422-437.","journal-title":"A Template Approach Based on Superimposed Variants. In GPCE."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1173706.1173738"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Architectural bad smells in software product lines: an exploratory study","volume":"12","author":"de Andrade Hugo Sica","year":"2014","unstructured":"Hugo Sica de Andrade , Eduardo Santana de Almeida , and Ivica Crnkovic . 2014 . Architectural bad smells in software product lines: an exploratory study . In WICSA. 12 : 1 - 12 :6. Hugo Sica de Andrade, Eduardo Santana de Almeida, and Ivica Crnkovic. 2014. Architectural bad smells in software product lines: an exploratory study. In WICSA. 12:1-12:6.","journal-title":"WICSA."},{"key":"e_1_3_2_1_17_1","first-page":"227","article-title":"Software Engineering for Security","author":"Devanbu Premkumar T","year":"2000","unstructured":"Premkumar T Devanbu and Stuart Stubblebine . 2000 . Software Engineering for Security : A Roadmap. In ICSE. ACM , 227 - 239 . Premkumar T Devanbu and Stuart Stubblebine. 2000. Software Engineering for Security: A Roadmap. In ICSE. ACM, 227-239.","journal-title":"A Roadmap. In ICSE. ACM"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-33253-4_8"},{"key":"e_1_3_2_1_19_1","first-page":"846","article-title":"An Aspect-oriented Methodology for Designing Secure Applications","volume":"51","author":"Georg Geri","year":"2009","unstructured":"Geri Georg , Indrakshi Ray , Kyriakos Anastasakis , Behzad Bordbar , Manachai Toahchoodee , and Siv Hilde Houmb . 2009 . An Aspect-oriented Methodology for Designing Secure Applications . INFSOF 51 , 5 (2009), 846 - 864 . Geri Georg, Indrakshi Ray, Kyriakos Anastasakis, Behzad Bordbar, Manachai Toahchoodee, and Siv Hilde Houmb. 2009. An Aspect-oriented Methodology for Designing Secure Applications. INFSOF 51, 5 (2009), 846-864.","journal-title":"INFSOF"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-6526(07)03002-7"},{"key":"e_1_3_2_1_21_1","volume-title":"Modeling and Model Checking Software Product Lines","author":"Gruler Alexander","unstructured":"Alexander Gruler , Martin Leucker , and Kathrin Scheidemann . 2008. Modeling and Model Checking Software Product Lines . In FMOODS. Springer , 113-131. Alexander Gruler, Martin Leucker, and Kathrin Scheidemann. 2008. Modeling and Model Checking Software Product Lines. In FMOODS. Springer, 113-131."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70772"},{"key":"e_1_3_2_1_23_1","unstructured":"Alex Hern and agencies. 2015. Apple removes malicious programs after first major attack on app store. The Guardian online. (2015). https:\/\/goo.gl\/phxmRR.  Alex Hern and agencies. 2015. Apple removes malicious programs after first major attack on app store. The Guardian online. (2015). https:\/\/goo.gl\/phxmRR."},{"key":"e_1_3_2_1_24_1","first-page":"269","article-title":"Generating Better Partial Covering Arrays by Modeling Weights on Sub-product Lines","author":"Johansen Martin Fagereng","year":"2012","unstructured":"Martin Fagereng Johansen , \u00d8ystein Haugen , Franck Fleurey , Anne Grete Eldegard , and Torbj\u00f8rn Syversen . 2012 . Generating Better Partial Covering Arrays by Modeling Weights on Sub-product Lines . In MoDELS. 269 - 284 . Martin Fagereng Johansen, \u00d8ystein Haugen, Franck Fleurey, Anne Grete Eldegard, and Torbj\u00f8rn Syversen. 2012. Generating Better Partial Covering Arrays by Modeling Weights on Sub-product Lines. In MoDELS. 269-284.","journal-title":"MoDELS."},{"key":"e_1_3_2_1_25_1","first-page":"395","volume-title":"Palamidessi (Ed.)","volume":"1877","author":"J\u00fcrjens J.","year":"2000","unstructured":"J. J\u00fcrjens . 2000 . Secure Information Flow for Concurrent Processes. In CONCUR, C . Palamidessi (Ed.) , Vol. 1877 . 395 - 409 . J. J\u00fcrjens. 2000. Secure Information Flow for Concurrent Processes. In CONCUR, C. Palamidessi (Ed.), Vol. 1877. 395-409."},{"key":"e_1_3_2_1_26_1","volume-title":"Trusted Information: The New Decade Challenge","author":"J\u00fcrjens Jan","unstructured":"Jan J\u00fcrjens . 2001. Modelling Audit Security for Smart-Card Payment Schemes with UML-Sec . In Trusted Information: The New Decade Challenge , Michel Dupuy and Pierre Paradinas (Eds.). Springer , 93-107. Jan J\u00fcrjens. 2001. Modelling Audit Security for Smart-Card Payment Schemes with UML-Sec. In Trusted Information: The New Decade Challenge, Michel Dupuy and Pierre Paradinas (Eds.). Springer, 93-107."},{"key":"e_1_3_2_1_27_1","first-page":"412","article-title":"UMLsec","author":"J\u00fcrjens Jan","year":"2002","unstructured":"Jan J\u00fcrjens . 2002 . UMLsec : Extending UML for Secure Systems Development. In UML. 412 - 425 . Jan J\u00fcrjens. 2002. UMLsec: Extending UML for Secure Systems Development. In UML. 412-425.","journal-title":"Extending UML for Secure Systems Development. In UML."},{"key":"e_1_3_2_1_28_1","volume-title":"Model-based Security Engineering with UML","author":"J\u00fcrjens Jan","unstructured":"Jan J\u00fcrjens . 2005. Model-based Security Engineering with UML . In FOSAD. Springer , 42-77. Jan J\u00fcrjens. 2005. Model-based Security Engineering with UML. In FOSAD. Springer, 42-77."},{"key":"e_1_3_2_1_29_1","volume-title":"Secure Systems Development with UML","author":"J\u00fcrjens Jan","unstructured":"Jan J\u00fcrjens . 2005. Secure Systems Development with UML . Springer . Jan J\u00fcrjens. 2005. Secure Systems Development with UML. Springer."},{"key":"e_1_3_2_1_30_1","first-page":"683","article-title":"Model-based Security Analysis for Mobile Communications","author":"J\u00fcrjens J.","year":"2008","unstructured":"J. J\u00fcrjens , J. Schreck , and P. Bartmann . 2008 . Model-based Security Analysis for Mobile Communications . In ICSE. ACM , 683 - 692 . J. J\u00fcrjens, J. Schreck, and P. Bartmann. 2008. Model-based Security Analysis for Mobile Communications. In ICSE. ACM, 683-692.","journal-title":"ICSE. ACM"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2009.8.6.c5"},{"key":"e_1_3_2_1_33_1","first-page":"311","article-title":"Granularity in Software Product Lines","author":"K\u00e4stner Christian","year":"2008","unstructured":"Christian K\u00e4stner , Sven Apel , and Martin Kuhlemann . 2008 . Granularity in Software Product Lines . In ICSE. ACM , 311 - 320 . Christian K\u00e4stner, Sven Apel, and Martin Kuhlemann. 2008. Granularity in Software Product Lines. In ICSE. ACM, 311-320.","journal-title":"ICSE. ACM"},{"key":"e_1_3_2_1_34_1","volume-title":"Article 14 (July","author":"K\u00e4stner Christian","year":"2012","unstructured":"Christian K\u00e4stner , Sven Apel , Thomas Th\u00fcm , and Gunter Saake . 2012. Type Checking Annotation-based Product Lines. TOSEM 21, 3 , Article 14 (July 2012 ), 14:1-14:39 pages. Christian K\u00e4stner, Sven Apel, Thomas Th\u00fcm, and Gunter Saake. 2012. Type Checking Annotation-based Product Lines. TOSEM 21, 3, Article 14 (July 2012), 14:1-14:39 pages."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076021.2048128"},{"key":"e_1_3_2_1_36_1","first-page":"169","article-title":"Enhancing Model Driven Security through Pattern Refinement Techniques","author":"Katt Basel","year":"2011","unstructured":"Basel Katt , Matthias Gander , Ruth Breu , and Michael Felderer . 2011 . Enhancing Model Driven Security through Pattern Refinement Techniques . In FMCO. 169 - 183 . Basel Katt, Matthias Gander, Ruth Breu, and Michael Felderer. 2011. Enhancing Model Driven Security through Pattern Refinement Techniques. In FMCO. 169-183.","journal-title":"FMCO."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3023956.3023958"},{"key":"e_1_3_2_1_38_1","volume-title":"https:\/\/github.com\/pinturic\/lampiro\/tree\/master\/lampiro","author":"Lampiro Lampiro","year":"2011","unstructured":"Lampiro 2011. Lampiro . ( 2011 ). https:\/\/github.com\/pinturic\/lampiro\/tree\/master\/lampiro . Lampiro 2011. Lampiro. (2011). https:\/\/github.com\/pinturic\/lampiro\/tree\/master\/lampiro."},{"key":"e_1_3_2_1_39_1","volume-title":"Safety and Security Analysis of Object-Oriented Models","author":"Lano Kevin","unstructured":"Kevin Lano , David Clark , and Kelly Androutsopoulos . 2002. Safety and Security Analysis of Object-Oriented Models . In SAFECOMP. Springer , 82-93. Kevin Lano, David Clark, and Kelly Androutsopoulos. 2002. Safety and Security Analysis of Object-Oriented Models. In SAFECOMP. Springer, 82-93."},{"key":"e_1_3_2_1_40_1","volume-title":"Formal Methods for Executable Software Models","author":"Lochau Malte","unstructured":"Malte Lochau , Sven Peldszus , Matthias Kowal , and Ina Schaefer . 2014. Model-based Testing . In Formal Methods for Executable Software Models . Springer , 310-342. Malte Lochau, Sven Peldszus, Matthias Kowal, and Ina Schaefer. 2014. Model-based Testing. In Formal Methods for Executable Software Models. Springer, 310-342."},{"key":"e_1_3_2_1_41_1","first-page":"55","article-title":"Model-based Analysis of Java EEWeb Security Configurations","author":"Mart\u00ednez Salvador","year":"2016","unstructured":"Salvador Mart\u00ednez , Valerio Cosentino , and Jordi Cabot . 2016 . Model-based Analysis of Java EEWeb Security Configurations . In MiSE. ACM , 55 - 61 . Salvador Mart\u00ednez, Valerio Cosentino, and Jordi Cabot. 2016. Model-based Analysis of Java EEWeb Security Configurations. In MiSE. ACM, 55-61.","journal-title":"MiSE. ACM"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2008.03.004"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2013.12.006"},{"key":"e_1_3_2_1_44_1","unstructured":"MobilePhoto 2008. MobilePhoto. (2008). http:\/\/homepages.dcc.ufmg.br\/~figueiredo\/spl\/icse08\/.  MobilePhoto 2008. MobilePhoto. (2008). http:\/\/homepages.dcc.ufmg.br\/~figueiredo\/spl\/icse08\/."},{"key":"e_1_3_2_1_45_1","first-page":"1","article-title":"Representing and Configuring Security Variability in Software Product Lines","author":"Myll\u00e4rniemi Varvana","year":"2015","unstructured":"Varvana Myll\u00e4rniemi , Mikko Raatikainen , and Tomi M\u00e4nnist\u00f6 . 2015 . Representing and Configuring Security Variability in Software Product Lines . In QoSA. 1 - 10 . Varvana Myll\u00e4rniemi, Mikko Raatikainen, and Tomi M\u00e4nnist\u00f6. 2015. Representing and Configuring Security Variability in Software Product Lines. In QoSA. 1-10.","journal-title":"QoSA."},{"key":"e_1_3_2_1_46_1","first-page":"105","article-title":"Variability Modeling of Cryptographic Components","author":"Nadi Sarah","year":"2016","unstructured":"Sarah Nadi and Stefan Kr\u00fcger . 2016 . Variability Modeling of Cryptographic Components : Clafer Experience Report. In VaMoS. 105 - 112 . Sarah Nadi and Stefan Kr\u00fcger. 2016. Variability Modeling of Cryptographic Components: Clafer Experience Report. In VaMoS. 105-112.","journal-title":"Clafer Experience Report. In VaMoS."},{"key":"e_1_3_2_1_47_1","first-page":"692","article-title":"The Attack of the Clones","author":"Nappa Antonio","year":"2015","unstructured":"Antonio Nappa , Richard Johnson , Leyla Bilge , Juan Caballero , and Tudor Dumitras . 2015 . The Attack of the Clones : A Study of the Impact of Shared Code on Vulnerability Patching. In SP. IEEE , 692 - 708 . Antonio Nappa, Richard Johnson, Leyla Bilge, Juan Caballero, and Tudor Dumitras. 2015. The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching. In SP. IEEE, 692-708.","journal-title":"In SP. IEEE"},{"key":"e_1_3_2_1_48_1","first-page":"246","article-title":"SoSPa","author":"Nguyen Phu Hong","year":"2015","unstructured":"Phu Hong Nguyen , Koen Yskout , Thomas Heyman , Jacques Klein , Riccardo Scandariato , and Yves Le Traon . 2015 . SoSPa : A System of Security Design Patterns for Systematically Engineering Secure Systems. In MoDELS. 246 - 255 . Phu Hong Nguyen, Koen Yskout, Thomas Heyman, Jacques Klein, Riccardo Scandariato, and Yves Le Traon. 2015. SoSPa: A System of Security Design Patterns for Systematically Engineering Secure Systems. In MoDELS. 246-255.","journal-title":"In MoDELS."},{"key":"e_1_3_2_1_49_1","unstructured":"Object Management Group (OMG). 2011. UML 2.5 Superstructure Specification. (2011).  Object Management Group (OMG). 2011. UML 2.5 Superstructure Specification. (2011)."},{"key":"e_1_3_2_1_51_1","volume-title":"Automated Incremental Pairwise Testing of Software Product Lines","author":"Oster Sebastian","unstructured":"Sebastian Oster , Florian Markert , and Philipp Ritter . 2010. Automated Incremental Pairwise Testing of Software Product Lines . In SPL. Springer , 196-210. Sebastian Oster, Florian Markert, and Philipp Ritter. 2010. Automated Incremental Pairwise Testing of Software Product Lines. In SPL. Springer, 196-210."},{"key":"e_1_3_2_1_52_1","volume-title":"Model-Driven Extraction and Analysis of Network Security Policies","author":"Perez Salvador Mart\u00ednez","unstructured":"Salvador Mart\u00ednez Perez , Joaqu\u00edn Garc\u00eda-Alfaro , Fr\u00e9d\u00e9ric Cuppens , Nora Cuppens-Boulahia , and Jordi Cabot . 2013. Model-Driven Extraction and Analysis of Network Security Policies . In MoDELS. Springer , 52-68. Salvador Mart\u00ednez Perez, Joaqu\u00edn Garc\u00eda-Alfaro, Fr\u00e9d\u00e9ric Cuppens, Nora Cuppens-Boulahia, and Jordi Cabot. 2013. Model-Driven Extraction and Analysis of Network Security Policies. In MoDELS. Springer, 52-68."},{"key":"e_1_3_2_1_53_1","unstructured":"J\u00f6rg Pleumann Omry Yadan and Erik Wetterberg. 2010. Antenna Preprocessor. (2010). http:\/\/antenna.sourceforge.net\/.  J\u00f6rg Pleumann Omry Yadan and Erik Wetterberg. 2010. Antenna Preprocessor. (2010). http:\/\/antenna.sourceforge.net\/."},{"key":"e_1_3_2_1_54_1","unstructured":"Max Reininger. 2006. End-to-End Security in a Reinsurance Company Remote Access to the Company Network. Master's thesis. TU Munich.  Max Reininger. 2006. End-to-End Security in a Reinsurance Company Remote Access to the Company Network . Master's thesis. TU Munich."},{"key":"e_1_3_2_1_55_1","first-page":"117","article-title":"Lifting Model Transformations to Product Lines","author":"Salay Rick","year":"2014","unstructured":"Rick Salay , Michalis Famelis , Julia Rubin , Alessio Di Sandro , and Marsha Chechik . 2014 . Lifting Model Transformations to Product Lines . In ICSE. ACM , 117 - 128 . Rick Salay, Michalis Famelis, Julia Rubin, Alessio Di Sandro, and Marsha Chechik. 2014. Lifting Model Transformations to Product Lines. In ICSE. ACM, 117-128.","journal-title":"ICSE. ACM"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934466.2966353"},{"key":"e_1_3_2_1_58_1","volume-title":"Scherschel","author":"Spaar Dieter","year":"2015","unstructured":"Dieter Spaar and Fabian A . Scherschel . 2015 . Beemer, Open Thyself! - Security vulnerabilities in BMW's ConnectedDrive . (2015). Dieter Spaar and Fabian A. Scherschel. 2015. Beemer, Open Thyself! - Security vulnerabilities in BMW's ConnectedDrive. (2015)."},{"key":"e_1_3_2_1_59_1","first-page":"160","article-title":"How are Conceptual Models used in Industrial Software Development?: A Descriptive Survey","author":"St\u00f6rrle Harald","year":"2017","unstructured":"Harald St\u00f6rrle . 2017 . How are Conceptual Models used in Industrial Software Development?: A Descriptive Survey . In EASE. ACM , 160 - 169 . Harald St\u00f6rrle. 2017. How are Conceptual Models used in Industrial Software Development?: A Descriptive Survey. In EASE. ACM, 160-169.","journal-title":"EASE. ACM"},{"key":"e_1_3_2_1_60_1","volume-title":"Scalability of Model Transformations: Position Paper and Benchmark Set. In Workshop on Scalable Model Driven Engineering. 21-30","author":"Str\u00fcber Daniel","year":"2016","unstructured":"Daniel Str\u00fcber , Timo Kehrer , Thorsten Arendt , Christopher Pietsch , and Dennis Reuling . 2016 . Scalability of Model Transformations: Position Paper and Benchmark Set. In Workshop on Scalable Model Driven Engineering. 21-30 . Daniel Str\u00fcber, Timo Kehrer, Thorsten Arendt, Christopher Pietsch, and Dennis Reuling. 2016. Scalability of Model Transformations: Position Paper and Benchmark Set. In Workshop on Scalable Model Driven Engineering. 21-30."},{"key":"e_1_3_2_1_61_1","volume-title":"A Classification and Survey of Analysis Strategies for Software Product Lines. ACM Comput. Surv. 47, 1","author":"Th\u00fcm Thomas","year":"2014","unstructured":"Thomas Th\u00fcm , Sven Apel , Christian K\u00e4stner , Ina Schaefer , and Gunter Saake . 2014. A Classification and Survey of Analysis Strategies for Software Product Lines. ACM Comput. Surv. 47, 1 ( 2014 ), 6:1-6:45. Thomas Th\u00fcm, Sven Apel, Christian K\u00e4stner, Ina Schaefer, and Gunter Saake. 2014. A Classification and Survey of Analysis Strategies for Software Product Lines. ACM Comput. Surv. 47, 1 (2014), 6:1-6:45."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791060.2791071"},{"key":"e_1_3_2_1_63_1","first-page":"292","article-title":"Do Security Patterns Really Help Designers?","author":"Yskout Koen","year":"2015","unstructured":"Koen Yskout , Riccardo Scandariato , and Wouter Joosen . 2015 . Do Security Patterns Really Help Designers? . In ICSE. 292 - 302 . Koen Yskout, Riccardo Scandariato, and Wouter Joosen. 2015. Do Security Patterns Really Help Designers?. In ICSE. 292-302.","journal-title":"ICSE."}],"event":{"name":"GPCE '18: 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences","location":"Boston MA USA","acronym":"GPCE '18","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 17th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3278122.3278126","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3278122.3278126","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:54:09Z","timestamp":1750190049000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3278122.3278126"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":60,"alternative-id":["10.1145\/3278122.3278126","10.1145\/3278122"],"URL":"https:\/\/doi.org\/10.1145\/3278122.3278126","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3393934.3278126","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}