{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:49Z","timestamp":1750220629570,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CCF-1845446, CNS-1929701"],"award-info":[{"award-number":["CCF-1845446, CNS-1929701"]}]},{"name":"Beijing Natural Science Foundation","award":["No. 4192036"],"award-info":[{"award-number":["No. 4192036"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416577","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"672-683","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Inferring and applying def-use like configuration couplings in deployment descriptors"],"prefix":"10.1145","author":[{"given":"Chengyuan","family":"Wen","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Yaxuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Xiao","family":"He","sequence":"additional","affiliation":[{"name":"University of Science and Technology, Beijing, China"}]},{"given":"Na","family":"Meng","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"bagh. https:\/\/github.com\/moghim\/bagh\/commit\/cae2a77fbdefedc823291a5fa98a3f51bb0c4816#diff-411d1a9625fc3f5d5be34d116942f6ca."},{"key":"e_1_3_2_1_2_1","unstructured":"demo-web. https:\/\/github.com\/agile-shark\/demo-web\/blob\/master\/src\/main\/webapp\/WEB-INF\/web.xml."},{"key":"e_1_3_2_1_3_1","unstructured":"GitHub. https:\/\/github.com."},{"key":"e_1_3_2_1_4_1","unstructured":"poc-spring-data-mongodb. https:\/\/github.com\/rodrigozrusso\/poc-spring-data-mongodb\/blob\/master\/src\/main\/resources\/spring-mongodb.xml."},{"key":"e_1_3_2_1_5_1","unstructured":"Spring - Bean Definition. https:\/\/www.tutorialspoint.com\/spring\/spring_bean_definition.htm."},{"key":"e_1_3_2_1_6_1","unstructured":"StackOverflow. https:\/\/stackoverflow.com."},{"key":"e_1_3_2_1_7_1","unstructured":"The Deployment Descriptor: web.xml. https:\/\/cloud.google.com\/appengine\/docs\/standard\/java\/config\/webxml."},{"key":"e_1_3_2_1_8_1","unstructured":"Viewing Deployment Descriptors. https:\/\/www.ibm.com\/support\/knowledgecenter\/en\/SS7K4U_9.0.5\/com.ibm.websphere.zseries.doc\/ae\/trun_app_deploymtdesc.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Working with Security Roles. https:\/\/docs.oracle.com\/cd\/E19226-01\/820-7627\/bncav\/index.html."},{"key":"e_1_3_2_1_10_1","unstructured":"XML Syntax. https:\/\/www.w3schools.com\/xml\/xml_syntax.asp."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/docs.oracle.com\/cd\/E19226-01\/820-7627\/bncbj\/index.html","author":"Web Application Deployment Descriptors Introduction","year":"2010","unstructured":"Introduction to Web Application Deployment Descriptors. https:\/\/docs.oracle.com\/cd\/E19226-01\/820-7627\/bncbj\/index.html, 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/github.com\/yholkamp\/addressbook-sample-jpa\/commit\/726bf62be03eac0e8292362340b117a7e10dd611","author":"Functional Manual Wiring","year":"2012","unstructured":"Manual Wiring Functional. https:\/\/github.com\/yholkamp\/addressbook-sample-jpa\/commit\/726bf62be03eac0e8292362340b117a7e10dd611, 2012."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/stackoverflow.com\/questions\/13836451","author":"Spring Securing REST","year":"2012","unstructured":"Securing REST URLs with Spring. https:\/\/stackoverflow.com\/questions\/13836451, 2012."},{"key":"e_1_3_2_1_14_1","unstructured":"How to Correctly Manage Feature Configuration Deployment in JBoss Fuse 6.2.1? https:\/\/stackoverflow.com\/questions\/39706237 2016."},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/www.antlr.org","author":"ANTLR.","year":"2020","unstructured":"ANTLR. https:\/\/www.antlr.org, 2020."},{"volume-title":"https:\/\/github.com\/GumTreeDiff\/gumtree","year":"2020","key":"e_1_3_2_1_16_1","unstructured":"Gumtreediff\/gumtree. https:\/\/github.com\/GumTreeDiff\/gumtree, 2020."},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/docs.oracle.com\/javaee\/7\/tutorial\/security-webtier002.htm","author":"Applications Securing Web","year":"2020","unstructured":"Securing Web Applications. https:\/\/docs.oracle.com\/javaee\/7\/tutorial\/security-webtier002.htm, 2020."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1404014.1404037"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924960"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/944705.944711"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9255-y"},{"key":"e_1_3_2_1_22_1","volume-title":"Pearson Higher Education","author":"Brundage M.","year":"2004","unstructured":"M. Brundage. XQuery: The XML Query Language. Pearson Higher Education, 2004."},{"key":"e_1_3_2_1_23_1","volume-title":"Advances in Software Engineering","author":"Darwin I.","year":"2010","unstructured":"I. Darwin. Annabot: A static verifier for Java annotation usage. Advances in Software Engineering, 2010."},{"key":"e_1_3_2_1_24_1","volume-title":"Continuous Integration: Improving Software Quality and Reducing Risk","author":"Duvall P.","year":"2007","unstructured":"P. Duvall, S. M. Matyas, and A. Glover. Continuous Integration: Improving Software Quality and Reducing Risk (The Addison-Wesley Signature Series). Addison-Wesley Professional, 2007."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31984-9_18"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738508"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWPSE.2003.1231205"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227172"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1994.292398"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796802004410"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/767193.767195"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2018.00020"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110441"},{"key":"e_1_3_2_1_34_1","volume-title":"TEFSE\/GCT'07","author":"Kagdi H.","year":"2007","unstructured":"H. Kagdi and J. Maletic. Software repositories: A source for traceability links. TEFSE\/GCT'07, 2007."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9233-9"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180201"},{"key":"e_1_3_2_1_37_1","first-page":"48","volume-title":"Annotation Framework Validation Using Domain Models","author":"Noguera C.","year":"2008","unstructured":"C. Noguera and L. Duchien. Annotation Framework Validation Using Domain Models, pages 48--62. Springer Berlin Heidelberg, Berlin, Heidelberg, 2008."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362664"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100053"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.101"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/3202350"},{"key":"e_1_3_2_1_42_1","first-page":"95","volume-title":"Proc. ICSM","author":"Shirabad J. S.","year":"2003","unstructured":"J. S. Shirabad, T. C. Lethbridge, and S. Matwin. Mining the maintenance history of a legacy software system. In Proc. ICSM, pages 95--104, 2003."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227148"},{"key":"e_1_3_2_1_44_1","unstructured":"Spring security JDK based proxy issue while using @Secured annotation on Controller method. https:\/\/stackoverflow.com\/questions\/35860442\/spring-security-jdk-based-proxy-issue-while-using-secured-annotation\\discretionary{-}{}{}on-control."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/956699.956720"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04272-1_9"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00038"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115673"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.52"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597096"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791549"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486830"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317478"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416577","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416577","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":53,"alternative-id":["10.1145\/3324884.3416577","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416577","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}