{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:08:22Z","timestamp":1730282902593,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/mise.2015.14","type":"proceedings-article","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T17:13:11Z","timestamp":1438017191000},"page":"36-41","source":"Crossref","is-referenced-by-count":3,"title":["MASC: Modelling Architectural Security Concerns"],"prefix":"10.1109","author":[{"given":"Laurens","family":"Sion","sequence":"first","affiliation":[]},{"given":"Koen","family":"Yskout","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"van den Berghe","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Scandariato","sequence":"additional","affiliation":[]},{"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Session patterns","author":"s?rensen","year":"0","journal-title":"Proc EuroPLoP 2002"},{"key":"ref11","first-page":"493","article-title":"Design patterns for fault containment","author":"saridakis","year":"2003","journal-title":"Euro PLoP"},{"key":"ref12","first-page":"417","article-title":"Firewall patterns","author":"schumacher","year":"2003","journal-title":"EuroPLOP"},{"article-title":"Security design patterns","year":"2004","author":"blakley","key":"ref13"},{"key":"ref14","article-title":"Patterns for application firewalls","author":"delessy-gassant","year":"2004","journal-title":"Proceedings of the Pattern Languages of Programs (PLoP) Conference"},{"journal-title":"Core Security Patterns Best Pratices and Strategies for J2EE Web Services and Identity Management","year":"2005","author":"steel","key":"ref15"},{"article-title":"Security patterns repository, version 1.0","year":"2006","author":"kienzle","key":"ref16"},{"journal-title":"Security Patterns","year":"2006","author":"schumacher","key":"ref17"},{"article-title":"Representing architectural security concerns","year":"2014","author":"sion","key":"ref18"},{"journal-title":"Secure Systems Development with UML","year":"2005","author":"j\u00fcrjens","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02374-3"},{"journal-title":"Security in Computing","year":"2003","author":"pfleeger","key":"ref6"},{"journal-title":"Building Secure Software How to Avoid Security Problems the Right Way","year":"2002","author":"viega","key":"ref5"},{"key":"ref8","article-title":"Threat modeling: Uncover security design flaws using the stride approach","volume":"6","author":"hernan","year":"2006","journal-title":"MSDN Magazine"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2004.3.1.c6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/75200.75222"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/141874.141884","article-title":"Foundations for the study of software architecture","volume":"17","author":"perry","year":"1992","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"ref9","first-page":"61801","article-title":"Architectural patterns for enabling application security","volume":"51","author":"yoder","year":"1997","journal-title":"PLoP"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.67"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.110"},{"journal-title":"OASIS Standard Tech Rep 3 0","article-title":"eXtensible Access Control Markup Language (XACML) Version 3.0","year":"2013","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1125808.1125810"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2013.64"}],"event":{"name":"2015 IEEE\/ACM 7th International Workshop on Modeling in Software Engineering (MiSE)","start":{"date-parts":[[2015,5,16]]},"location":"Florence","end":{"date-parts":[[2015,5,17]]}},"container-title":["2015 IEEE\/ACM 7th International Workshop on Modeling in Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7166141\/7167386\/07167400.pdf?arnumber=7167400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T17:16:31Z","timestamp":1599758191000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7167400\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/mise.2015.14","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}