{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T00:41:43Z","timestamp":1767919303393,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,2]],"date-time":"2014-06-02T00:00:00Z","timestamp":1401667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,2]]},"DOI":"10.1145\/2593929.2593945","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"135-144","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Run-time generation, transformation, and verification of access control models for self-protection"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Bailey","sequence":"first","affiliation":[{"name":"University of Kent, UK"}]},{"given":"Lionel","family":"Montrieux","sequence":"additional","affiliation":[{"name":"Open University, UK"}]},{"given":"Rog\u00e9rio","family":"de Lemos","sequence":"additional","affiliation":[{"name":"University of Kent, UK \/ University of Coimbra, Portugal"}]},{"given":"Yijun","family":"Yu","sequence":"additional","affiliation":[{"name":"Open University, UK"}]},{"given":"Michel","family":"Wermelinger","sequence":"additional","affiliation":[{"name":"Open University, UK"}]}],"member":"320","published-online":{"date-parts":[[2014,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/computing-research.open.ac.uk\/rbac\/ {accessed","author":"DSML","year":"2014","unstructured":"rbac DSML tool, 2009-2014. http:\/\/computing-research.open.ac.uk\/rbac\/ {accessed January 2014 }. rbacDSML tool, 2009-2014. http:\/\/computing-research.open.ac.uk\/rbac\/ {accessed January 2014}."},{"key":"e_1_3_2_1_2_1","first-page":"162","volume-title":"Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE \u201901","author":"Ahn G.-J.","unstructured":"G.-J. Ahn and M. E. Shin . Role-Based Authorization Constraints Specification Using Object Constraint Language . In Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE \u201901 , pages 157\u2013 162 . IEEE Computer Society, 2001. G.-J. Ahn and M. E. Shin. Role-Based Authorization Constraints Specification Using Object Constraint Language. In Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE \u201901, pages 157\u2013162. IEEE Computer Society, 2001."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.31"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38998-6_14"},{"key":"e_1_3_2_1_6_1","first-page":"2003","volume-title":"Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY \u201903","author":"Bandara A. K.","unstructured":"A. K. Bandara , E. C. Lupu , and A. Russo . Using event calculus to formalise policy specification and analysis . In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY \u201903 , pages 26\u2013. IEEE Computer Society, 2003 . A. K. Bandara, E. C. Lupu, and A. Russo. Using event calculus to formalise policy specification and analysis. In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY \u201903, pages 26\u2013. IEEE Computer Society, 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998441.1998443"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125808.1125810"},{"key":"e_1_3_2_1_9_1","volume-title":"BBC","author":"Credit BC.","year":"2014","unstructured":"B BC. Credit card details on 20 million south koreans stolen . BBC , January 2014 . http:\/\/www.bbc.co.uk\/news\/technology-25808189 {accessed January 2014}. BBC. Credit card details on 20 million south koreans stolen. BBC, January 2014. http:\/\/www.bbc.co.uk\/news\/technology-25808189 {accessed January 2014}."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.33"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/11877028_2"},{"key":"e_1_3_2_1_12_1","volume-title":"The Guardian","author":"Booth R.","year":"2010","unstructured":"R. Booth , H. Brooke , and S. Moriss . Wikileaks cables: Bradley manning faces 52 years in jail . The Guardian , 30 November 2010 . R. Booth, H. Brooke, and S. Moriss. Wikileaks cables: Bradley manning faces 52 years in jail. The Guardian, 30 November 2010."},{"key":"e_1_3_2_1_13_1","volume-title":"The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes","author":"Cappelli D. M.","year":"2012","unstructured":"D. M. Cappelli , A. P. Moore , and R. F. Trzeciak . The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes . Addison-Wesley Professional , 1 st edition, 2012 . D. M. Cappelli, A. P. Moore, and R. F. Trzeciak. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes. Addison-Wesley Professional, 1st edition, 2012.","edition":"1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:11"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1626195.1626217"},{"key":"e_1_3_2_1_16_1","first-page":"123","volume-title":"Proceedings of the 7th International Conference on Network and Services Management, CNSM \u201911","author":"Craven R.","year":"2011","unstructured":"R. Craven , J. Lobo , E. Lupu , A. Russo , and M. Sloman . Policy refinement: Decomposition and operationalization for dynamic domains . In Proceedings of the 7th International Conference on Network and Services Management, CNSM \u201911 , pages 115\u2013 123 , Laxenburg, Austria, Austria , 2011 . International Federation for Information Processing. R. Craven, J. Lobo, E. Lupu, A. Russo, and M. Sloman. Policy refinement: Decomposition and operationalization for dynamic domains. In Proceedings of the 7th International Conference on Network and Services Management, CNSM \u201911, pages 115\u2013123, Laxenburg, Austria, Austria, 2011. International Federation for Information Processing."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062502"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_4"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-008-0087-9"},{"key":"e_1_3_2_1_20_1","unstructured":"IBM. Rational Software Architect 8.0.4 2012.  IBM. Rational Software Architect 8.0.4 2012."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.08.002"},{"key":"e_1_3_2_1_22_1","unstructured":"J. J\u00fcrjens. Secure Systems Development with UML. Springer-Verlag 2005.   J. J\u00fcrjens. Secure Systems Development with UML. Springer-Verlag 2005."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_24_1","series-title":"Lecture Notes in Computer Science","first-page":"193","volume-title":"Fundamental Approaches to Software Engineering","author":"Kim D.-K.","unstructured":"D.-K. Kim , I. Ray , R. France , and N. Li . Modeling Role-Based Access Control Using Parameterized UML Models . In M. Wermelinger and T. Margaria-Steffen, editors, Fundamental Approaches to Software Engineering , volume 2984 of Lecture Notes in Computer Science , pages 180\u2013 193 . Springer Berlin Heidelberg, 2004. D.-K. Kim, I. Ray, R. France, and N. Li. Modeling Role-Based Access Control Using Parameterized UML Models. In M. Wermelinger and T. Margaria-Steffen, editors, Fundamental Approaches to Software Engineering, volume 2984 of Lecture Notes in Computer Science, pages 180\u2013193. Springer Berlin Heidelberg, 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.44"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2011.18"},{"issue":"4","key":"e_1_3_2_1_29_1","first-page":"12","article-title":"Federated security: The shibboleth approach","volume":"27","author":"Morgan R. L.","year":"2004","unstructured":"R. L. Morgan , S. Cantor , S. Carmody , W. Hoehn , and K. Klingenstein . Federated security: The shibboleth approach . EDUCAUSE Quarterly , 27 ( 4 ): 12 \u2013 17 , 2004 . R. L. Morgan, S. Cantor, S. Carmody, W. Hoehn, and K. Klingenstein. Federated security: The shibboleth approach. EDUCAUSE Quarterly, 27(4):12\u201317, 2004.","journal-title":"EDUCAUSE Quarterly"},{"key":"e_1_3_2_1_30_1","volume-title":"INCITS 359-2004 - Role Based Access Control, 03","author":"NIST.","year":"2004","unstructured":"NIST. INCITS 359-2004 - Role Based Access Control, 03 2004 . NIST. INCITS 359-2004 - Role Based Access Control, 03 2004."},{"key":"e_1_3_2_1_31_1","volume-title":"eXtensible Access Control Markup Language (XACML). https:\/\/www.oasis-open.org\/committees\/xacml (Last accessed","author":"OASIS.","year":"2013","unstructured":"OASIS. eXtensible Access Control Markup Language (XACML). https:\/\/www.oasis-open.org\/committees\/xacml (Last accessed May 2013 ). OASIS. eXtensible Access Control Markup Language (XACML). https:\/\/www.oasis-open.org\/committees\/xacml (Last accessed May 2013)."},{"key":"e_1_3_2_1_32_1","volume-title":"XACML v3.0 Core and Hierarchical Role Based Access Control (RBAC) Profile","author":"OASIS.","year":"2010","unstructured":"OASIS. XACML v3.0 Core and Hierarchical Role Based Access Control (RBAC) Profile , 2010 . OASIS. XACML v3.0 Core and Hierarchical Role Based Access Control (RBAC) Profile, 2010."},{"key":"e_1_3_2_1_33_1","unstructured":"OMG. Meta Object Facility (MOF) 2.0.  OMG. Meta Object Facility (MOF) 2.0."},{"key":"e_1_3_2_1_34_1","volume-title":"ACM\/IEEE MoDELS Workshop on Models@Runtime","author":"Rohr M.","year":"2006","unstructured":"M. Rohr , M. Boskovic , S. Giesecke , and W. Hasselbring . Model-driven development of selfmanaging software systems . In ACM\/IEEE MoDELS Workshop on Models@Runtime , 2006 . M. Rohr, M. Boskovic, S. Giesecke, and W. Hasselbring. Model-driven development of selfmanaging software systems. In ACM\/IEEE MoDELS Workshop on Models@Runtime, 2006."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295150"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083215"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064001"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2060105.2060671"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029133.1029140"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593929.2593945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2593929.2593945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:55Z","timestamp":1750273435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2593929.2593945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,2]]},"references-count":38,"alternative-id":["10.1145\/2593929.2593945","10.1145\/2593929"],"URL":"https:\/\/doi.org\/10.1145\/2593929.2593945","relation":{},"subject":[],"published":{"date-parts":[[2014,6,2]]},"assertion":[{"value":"2014-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}