{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:13:26Z","timestamp":1761664406944,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T00:00:00Z","timestamp":1650240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,18]]},"DOI":"10.1145\/3510547.3517923","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T14:13:59Z","timestamp":1651155239000},"page":"107-116","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["SecureWeaver: Intent-Driven Secure System Designer"],"prefix":"10.1145","author":[{"given":"Sian En","family":"Ooi","sequence":"first","affiliation":[{"name":"Japan Advanced Institute of Science and Technology, Nomi, Japan"}]},{"given":"Razvan","family":"Beuran","sequence":"additional","affiliation":[{"name":"Japan Advanced Institute of Science and Technology, Nomi, Japan"}]},{"given":"Yasuo","family":"Tan","sequence":"additional","affiliation":[{"name":"Japan Advanced Institute of Science and Technology, Nomi, Japan"}]},{"given":"Takayuki","family":"Kuroda","sequence":"additional","affiliation":[{"name":"NEC Corporation, Minato-ku, Japan"}]},{"given":"Takuya","family":"Kuwahara","sequence":"additional","affiliation":[{"name":"NEC Corporation, Minato-ku, Japan"}]},{"given":"Norihito","family":"Fujita","sequence":"additional","affiliation":[{"name":"NEC Corporation, Minato-ku, Japan"}]}],"member":"320","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.12.006"},{"key":"e_1_3_2_2_2_1","volume-title":"11th International Workshop on Science Gateways, IWSG 2019. CEURWorkshop Proceedings.","author":"DesLauriers James","year":"2021","unstructured":"James DesLauriers , Tamas Kiss , Gabriele Pierantoni , Gregoire Gesmier , and Gabor Terstyanszky . 2021 . Enabling modular design of an application-level auto-scaling and orchestration framework using tosca-based application description templates . In 11th International Workshop on Science Gateways, IWSG 2019. CEURWorkshop Proceedings. James DesLauriers, Tamas Kiss, Gabriele Pierantoni, Gregoire Gesmier, and Gabor Terstyanszky. 2021. Enabling modular design of an application-level auto-scaling and orchestration framework using tosca-based application description templates. In 11th International Workshop on Science Gateways, IWSG 2019. CEURWorkshop Proceedings."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudTech.2015.7337018"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3430372"},{"key":"e_1_3_2_2_5_1","unstructured":"S Hernan S Lambert T Ostwald and A Shostack. 2006. Uncover Security Design Flaws Using The STRIDE Approach.  S Hernan S Lambert T Ostwald and A Shostack. 2006. Uncover Security Design Flaws Using The STRIDE Approach."},{"key":"e_1_3_2_2_6_1","volume-title":"2021 USENIX Annual Technical Conference (USENIX ATC 21)","author":"Jacobs Arthur S","year":"2021","unstructured":"Arthur S Jacobs , Ricardo J Pfitscher , Rafael H Ribeiro , Ronaldo A Ferreira , Lisandro Z Granville , Walter Willinger , and Sanjay G Rao . 2021 . Hey, Lumi! Using Natural Language for {Intent-Based} Network Management . In 2021 USENIX Annual Technical Conference (USENIX ATC 21) . 625--639. Arthur S Jacobs, Ricardo J Pfitscher, Rafael H Ribeiro, Ronaldo A Ferreira, Lisandro Z Granville, Walter Willinger, and Sanjay G Rao. 2021. Hey, Lumi! Using Natural Language for {Intent-Based} Network Management. In 2021 USENIX Annual Technical Conference (USENIX ATC 21). 625--639."},{"volume-title":"Design space exploration for security. In 2016 IEEE Cybersecurity Development (SecDev)","author":"Kang Eunsuk","key":"e_1_3_2_2_8_1","unstructured":"Eunsuk Kang . 2016. Design space exploration for security. In 2016 IEEE Cybersecurity Development (SecDev) . IEEE , 30--36. Eunsuk Kang. 2016. Design space exploration for security. In 2016 IEEE Cybersecurity Development (SecDev). IEEE, 30--36."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900476"},{"key":"e_1_3_2_2_10_1","volume-title":"Weaver: A Novel Configuration Designer for IT\/NW Services in Heterogeneous Environments. In 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 1--6.","author":"Kuroda Takayuki","year":"2019","unstructured":"Takayuki Kuroda , Takuya Kuwahara , Takashi Maruyama , Kozo Satoda , Hideyuki Shimonishi , Takao Osaki , and Katsushi Matsuda . 2019 . Weaver: A Novel Configuration Designer for IT\/NW Services in Heterogeneous Environments. In 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 1--6. Takayuki Kuroda, Takuya Kuwahara, Takashi Maruyama, Kozo Satoda, Hideyuki Shimonishi, Takao Osaki, and Katsushi Matsuda. 2019. Weaver: A Novel Configuration Designer for IT\/NW Services in Heterogeneous Environments. In 2019 IEEE Global Communications Conference (GLOBECOM). IEEE, 1--6."},{"key":"e_1_3_2_2_11_1","volume-title":"An intent-based system configuration design for IT\/NW services with functional and quantitative constraints. IEICE Transactions on Communications E104.B, 7","author":"Kuwahara Takuya","year":"2021","unstructured":"Takuya Kuwahara , Takayuki Kuroda , Takao Osaki , and Kozo Satoda . 2021. An intent-based system configuration design for IT\/NW services with functional and quantitative constraints. IEICE Transactions on Communications E104.B, 7 ( 2021 ), 791--804. Takuya Kuwahara, Takayuki Kuroda, Takao Osaki, and Kozo Satoda. 2021. An intent-based system configuration design for IT\/NW services with functional and quantitative constraints. IEICE Transactions on Communications E104.B, 7 (2021), 791--804."},{"key":"e_1_3_2_2_12_1","unstructured":"Lockheed Martin. 2014. Cyber kill chain. http:\/\/cyber.lockheedmartin.com\/ hubfs\/GainingtheAdvantageCyberKillChain.pdf  Lockheed Martin. 2014. Cyber kill chain. http:\/\/cyber.lockheedmartin.com\/ hubfs\/GainingtheAdvantageCyberKillChain.pdf"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3195870.3195874"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502469"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/jlpea10030022"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/su12072782"},{"key":"e_1_3_2_2_17_1","volume-title":"CN Chris Lauwers, and C Curescu","author":"Rutkowski Matt","year":"2020","unstructured":"Matt Rutkowski , CN Chris Lauwers, and C Curescu . 2020 . TOSCA Simple Profile in YAML Version 1.3. https:\/\/docs.oasis-open.org\/tosca\/TOSCA-Simple-Profile- YAML\/ v1.3\/TOSCA-Simple-Profile-YAML-v1.3.pdf Matt Rutkowski, CN Chris Lauwers, and C Curescu. 2020. TOSCA Simple Profile in YAML Version 1.3. https:\/\/docs.oasis-open.org\/tosca\/TOSCA-Simple-Profile- YAML\/v1.3\/TOSCA-Simple-Profile-YAML-v1.3.pdf"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987279"},{"volume-title":"Design and Philosophy","author":"Strom BE","key":"e_1_3_2_2_19_1","unstructured":"BE Strom , A Applebaum , DP Miller , KC Nickels , AG Pennington , and CB Thomas . 2018. MITRE ATT&CK : Design and Philosophy . The Mitre Corporation , Mc Lean . Technical Report. VA, Technical report. BE Strom, A Applebaum, DP Miller, KC Nickels, AG Pennington, and CB Thomas. 2018. MITRE ATT&CK: Design and Philosophy. The Mitre Corporation, McLean. Technical Report. VA, Technical report."},{"key":"e_1_3_2_2_20_1","first-page":"1","article-title":"Intent-driven cloud resource design framework to meet cloud performance requirements and its application to a cloud-sensor system","volume":"10","author":"Wu Chao","year":"2021","unstructured":"Chao Wu , Shingo Horiuchi , Kenji Murase , Hiroaki Kikushima , and Kenichi Tayama . 2021 . Intent-driven cloud resource design framework to meet cloud performance requirements and its application to a cloud-sensor system . Journal of Cloud Computing 10 , 1 (2021), 1 -- 22 . Chao Wu, Shingo Horiuchi, Kenji Murase, Hiroaki Kikushima, and Kenichi Tayama. 2021. Intent-driven cloud resource design framework to meet cloud performance requirements and its application to a cloud-sensor system. Journal of Cloud Computing 10, 1 (2021), 1--22.","journal-title":"Journal of Cloud Computing"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Baltimore MD USA","acronym":"CODASPY '22"},"container-title":["Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510547.3517923","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510547.3517923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:19Z","timestamp":1750191139000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510547.3517923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,18]]},"references-count":19,"alternative-id":["10.1145\/3510547.3517923","10.1145\/3510547"],"URL":"https:\/\/doi.org\/10.1145\/3510547.3517923","relation":{},"subject":[],"published":{"date-parts":[[2022,4,18]]},"assertion":[{"value":"2022-04-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}