{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:04:06Z","timestamp":1725530646552},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642011115"},{"type":"electronic","value":"9783642011122"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01112-2_40","type":"book-chapter","created":{"date-parts":[[2009,4,16]],"date-time":"2009-04-16T11:00:58Z","timestamp":1239879658000},"page":"393-403","source":"Crossref","is-referenced-by-count":0,"title":["SecCom: A Prototype for Integrating Security-Aware Components"],"prefix":"10.1007","author":[{"given":"Khaled M.","family":"Khan","sequence":"first","affiliation":[]},{"given":"Calvin","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/0164-1212(94)00084-Z","volume":"31","author":"B. Arafeh","year":"1995","unstructured":"Arafeh, B.: A Graph Grammar Model for Concurrent and Distributed Software Specification-in-Large. Journal of Systems Software\u00a031, 7\u201332 (1995)","journal-title":"Journal of Systems Software"},{"key":"40_CR2","volume-title":"Objects, Components, and Frameworks with UML - The Catalysis Approach","author":"D. D\u2019Souza","year":"1998","unstructured":"D\u2019Souza, D., Wills, A.: Objects, Components, and Frameworks with UML - The Catalysis Approach. Addison-Wesley, Reading (1998)"},{"key":"40_CR3","unstructured":"Han., J.: A Comprehensive Interface Definition Framework for Software Components. In: Proc of 1998 Asia-Pacific Software Engineering Conf., Taipei, Taiwan, December 1998, pp. 110\u2013117 (1998)"},{"key":"40_CR4","unstructured":"Khan, K., Han, J.: A Security Characterisation Framework for Trustworthy Component Based Software Systems. In: Proc of the 27th Annual Int\u2019l Computer Software and Applications Conf. (COMPSAC 2003), Dallas, pp. 164\u2013169 (2003)"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Khan, K., Han, J.: Composing Security-Aware Software. IEEE Software, 34\u201341 (January\/February 2002)","DOI":"10.1109\/52.976939"},{"key":"40_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/3-540-48743-3_21","volume-title":"ECOOP \u201999 - Object-Oriented Programming","author":"R. Pandey","year":"1999","unstructured":"Pandey, R., Hashii, B.: Providing Fine-Grained Access Control for Mobile Programs Through Binar. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol.\u00a01628, pp. 449\u2013473. Springer, Heidelberg (1999)"},{"key":"40_CR7","unstructured":"Kelkar, M.: Modeling Software Component Security Policies. Doctoral thesis, University of Tulsa, Tulsa, OK, USA (2007)"},{"key":"40_CR8","unstructured":"Gegick, M., Williams, L., Vouk, M.: Predictive Models for Identifying Software Components Prone to Failure During Security Attacks. In: Proceedings Conference of OOPSLA, Nashville, Tennessee (October 2008)"},{"key":"40_CR9","first-page":"612","volume-title":"Proceedings of the IEEE International Conference on e-Business Engineering","author":"Y. Liu","year":"2007","unstructured":"Liu, Y., Traore, I.: Systematic Security Analysis for Service-Oriented Software Architectures. In: Proceedings of the IEEE International Conference on e-Business Engineering, pp. 612\u2013621. IEEE Computer Society press, Los Alamitos (2007)"},{"key":"40_CR10","unstructured":"Willett, K.: Security Issues in Service-Oriented Architecture, CSC Online World (January\/March 2007), \n \n http:\/\/www.csc.com\/cscworld\/012007\/fa\/fa005.shtml"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems: Modeling, Development, and Integration"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01112-2_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T22:31:04Z","timestamp":1558391464000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01112-2_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642011115","9783642011122"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01112-2_40","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2009]]}}}