{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:17:11Z","timestamp":1725794231262},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319074511"},{"type":"electronic","value":"9783319074528"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07452-8_4","type":"book-chapter","created":{"date-parts":[[2014,5,21]],"date-time":"2014-05-21T21:53:43Z","timestamp":1400709223000},"page":"97-118","source":"Crossref","is-referenced-by-count":9,"title":["Model-Driven Development of a Secure eHealth Application"],"prefix":"10.1007","author":[{"given":"Miguel A. Garc\u00eda","family":"de Dios","sequence":"first","affiliation":[]},{"given":"Carolina","family":"Dania","sequence":"additional","affiliation":[]},{"given":"David","family":"Basin","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Clavel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"ActionGUI. The ActionGUI project (2013), \n \n http:\/\/www.actiongui.org"},{"key":"4_CR2","unstructured":"Barrett, C., Stump, A., Tinelli, C.: The SMT-LIB Standard: Version 2.0. In: Gupta, A., Kroening, D. (eds.) Proceedings of the 8th International Workshop on Satisfiability Modulo Theories, Edinburgh, UK (2010)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Basin, D., Clavel, M., Egea, M., de Dios, M.A.G., Dania, C.: A model-driven methodology for developing secure data-management applications. IEEE Transactions on Software Engineering (to appear, 2014)","DOI":"10.1109\/TSE.2013.2297116"},{"issue":"1","key":"4_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1125808.1125810","volume":"15","author":"D. Basin","year":"2006","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology\u00a015(1), 39\u201391 (2006)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Basin, D.A., Clavel, M., Egea, M.: A decade of model-driven security. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT 2011), Innsbruck, Austria, vol.\u00a01998443, pp. 1\u201310 (2011)","DOI":"10.1145\/1998441.1998443"},{"key":"4_CR6","unstructured":"Busch, M.: Integration of security aspects in web engineering. Master\u2019s thesis, Institut f\u00fcr Informatik, Ludwig-Maximilians-Universit\u00e4t, M\u00fcnchen, Germany (2011)"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-02818-2_49","volume-title":"Web Engineering","author":"M. Busch","year":"2009","unstructured":"Busch, M., Koch, N.: MagicUWE - a case tool plugin for modeling web applications. In: Gaedke, M., Grossniklaus, M., D\u00edaz, O. (eds.) ICWE 2009. LNCS, vol.\u00a05648, pp. 505\u2013508. Springer, Heidelberg (2009)"},{"key":"4_CR8","unstructured":"Dania, C., Clavel, M.: OCL2FOL+: Coping with Undefinedness. In: Cabot, J., Gogolla, M., R\u00e1th, I., Willink, E.D. (eds.) OCL@MoDELS. CEUR Workshop Proceedings, vol.\u00a01092, pp. 53\u201362. CEUR-WS.org (2013)"},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11219-006-9002-3","volume":"15","author":"X. Jia","year":"2007","unstructured":"Jia, X., Steele, A., Qin, L., Liu, H., Jones, C.: Executable visual software modeling\u2014the ZOOM approach. Software Quality Control\u00a015, 27\u201351 (2007)","journal-title":"Software Quality Control"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/978-3-642-02818-2_46","volume-title":"Web Engineering","author":"C. Kroiss","year":"2009","unstructured":"Kroiss, C., Koch, N., Knapp, A.: UWE4JSF: A model-driven generation approach for web applications. In: Gaedke, M., Grossniklaus, M., D\u00edaz, O. (eds.) ICWE 2009. LNCS, vol.\u00a05648, pp. 493\u2013496. Springer, Heidelberg (2009)"},{"key":"4_CR12","unstructured":"NESSoS. The European Network of Excellence on Engineering Secure Future internet Software Services and Systems (2010), \n \n http:\/\/www.nessos-project.eu"},{"key":"4_CR13","unstructured":"Object Management Group. Object constraint language specification version 2.3.1. Technical report, OMG (2012), \n \n http:\/\/www.omg.org\/spec\/OCL\/2.3.1"},{"key":"4_CR14","unstructured":"Weidenbach, C.: SPASS input syntax version 1.5 (1999)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-02959-2_10","volume-title":"Automated Deduction \u2013 CADE-22","author":"C. Weidenbach","year":"2009","unstructured":"Weidenbach, C., Dimova, D., Fietzke, A., Kumar, R., Suda, M., Wischnewski, P.: SPASS version\u00a03.5. In: Schmidt, R.A. (ed.) CADE-22. LNCS, vol.\u00a05663, pp. 140\u2013145. Springer, Heidelberg (2009)"},{"key":"4_CR16","volume-title":"Using Z: specification, refinement, and proof","author":"J. Woodcock","year":"1996","unstructured":"Woodcock, J., Davies, J.: Using Z: specification, refinement, and proof. Prentice-Hall, Inc., Upper Saddle River (1996)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Future Internet Services and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07452-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T18:22:39Z","timestamp":1558894959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07452-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319074511","9783319074528"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07452-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}