{"id":"https://openalex.org/W4393223689","doi":"https://doi.org/10.1007/978-3-031-44412-8_4","title":"Security Compliance in Model-Driven Software Development","display_name":"Security Compliance in Model-Driven Software Development","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4393223689","doi":"https://doi.org/10.1007/978-3-031-44412-8_4"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-44412-8_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-44412-8_4","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-44412-8_4.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ernst Denert Award for Software Engineering 2022","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-44412-8_4.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070179477","display_name":"Sven Peldszus","orcid":"https://orcid.org/0000-0002-2604-0487"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sven Peldszus","raw_affiliation_strings":["Ruhr University Bochum, Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5070179477"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":2.261,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.87883008,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"73","last_page":"104"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11450","display_name":"Model-Driven Software Engineering Techniques","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11450","display_name":"Model-Driven Software Engineering Techniques","score":0.987500011920929,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9571999907493591,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.945900022983551,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/compliance","display_name":"Compliance (psychology)","score":0.7035295963287354},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.4197833836078644},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4173990488052368},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3361660838127136},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.27714675664901733},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.17184287309646606},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.120404452085495},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.05219140648841858}],"concepts":[{"id":"https://openalex.org/C2781460075","wikidata":"https://www.wikidata.org/wiki/Q1399332","display_name":"Compliance (psychology)","level":2,"score":0.7035295963287354},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.4197833836078644},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4173990488052368},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3361660838127136},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27714675664901733},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.17184287309646606},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.120404452085495},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.05219140648841858},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-44412-8_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-44412-8_4","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-44412-8_4.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ernst Denert Award for Software Engineering 2022","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-44412-8_4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-44412-8_4","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-44412-8_4.pdf","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ernst Denert Award for Software Engineering 2022","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.47999998927116394,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4393223689.pdf"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W48639399","https://openalex.org/W572872720","https://openalex.org/W1511832825","https://openalex.org/W1552525409","https://openalex.org/W1612040247","https://openalex.org/W1973944748","https://openalex.org/W1991435895","https://openalex.org/W2043584256","https://openalex.org/W2109427294","https://openalex.org/W2112000202","https://openalex.org/W2133824159","https://openalex.org/W2153887189","https://openalex.org/W2165203881","https://openalex.org/W2294072104","https://openalex.org/W2311045093","https://openalex.org/W2510711881","https://openalex.org/W2562157698","https://openalex.org/W2649501556","https://openalex.org/W2740709355","https://openalex.org/W2767943400","https://openalex.org/W2796023385","https://openalex.org/W2796123312","https://openalex.org/W2897344898","https://openalex.org/W2911528169","https://openalex.org/W3012981742","https://openalex.org/W3013758687","https://openalex.org/W3151685851","https://openalex.org/W3167284599","https://openalex.org/W4205736829","https://openalex.org/W4255645370","https://openalex.org/W4256519293","https://openalex.org/W4285413042","https://openalex.org/W4313205696","https://openalex.org/W4387872582"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2410395228","https://openalex.org/W2390279801","https://openalex.org/W3125941065","https://openalex.org/W2358668433","https://openalex.org/W2484615095","https://openalex.org/W4366449942","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Abstract":[0],"To":[1,86,133,152,182],"ensure":[2,87],"the":[3,37,45,93,128,155,176,201,206,213,220,227,238,242,250,265,271,274],"security":[4,17,27,88,121,125,150,169],"of":[5,50,57,101,106,158,205,212,237,256],"a":[6,159,235],"software":[7,52,58,180],"system,":[8,161],"it":[9,257],"is":[10],"vital":[11],"to":[12,63,123,178,188,200,258,270],"keep":[13],"up":[14],"with":[15,36],"changing":[16],"precautions,":[18],"attacks,":[19],"and":[20,48,71,109,172,194,226,246,253,273],"mitigations.":[21],"Although":[22],"model-based":[23],"development":[24],"enables":[25],"addressing":[26],"already":[28],"at":[29],"design-time,":[30],"design":[31,157,198],"models":[32,193,199],"are":[33,60],"often":[34],"inconsistent":[35],"implementation":[38],"or":[39,76],"among":[40],"themselves.":[41],"Such":[42],"inconsistencies":[43],"hinder":[44],"effective":[46],"realization":[47],"verification":[49],"secure":[51,65],"systems.":[53,66,181],"In":[54],"addition,":[55],"variants":[56,75],"systems":[59],"another":[61],"burden":[62],"developing":[64],"Vulnerabilities":[67],"must":[68],"be":[69,80],"identified":[70,245],"fixed":[72],"on":[73,127,137,241,264],"all":[74,145],"else":[77],"attackers":[78],"could":[79],"well-guided":[81],"in":[82,89,92,98,104,215,278],"attacking":[83],"unfixed":[84],"variants.":[85],"this":[90,279],"context,":[91],"thesis":[94,272],"(Peldszus,":[95],"Security":[96],"Compliance":[97],"Model-driven":[99],"Development":[100],"Software":[102],"Systems":[103],"Presence":[105],"Long-Term":[107],"Evolution":[108],"Variants.":[110],"Springer,":[111],"Berlin;":[112],"2022),":[113],"we":[114,174,209],"present":[115],"GRaViTY,":[116],"an":[117],"approach":[118,214],"that":[119],"allows":[120,187],"experts":[122],"specify":[124],"requirements":[126],"most":[129],"suitable":[130],"system":[131,146,225],"representation.":[132],"preserve":[134],"security,":[135],"based":[136],"continuous":[138,168],"automated":[139],"change":[140],"propagation,":[141],"GRaViTY":[142,162,186],"automatically":[143,189],"checks":[144,171],"representations":[147],"against":[148],"these":[149],"requirements.":[151],"systematically":[153],"improve":[154],"object-oriented":[156],"software-intensive":[160],"provides":[163,234],"security-preserving":[164],"refactorings.":[165],"For":[166,262],"both":[167],"compliance":[170],"refactorings,":[173],"show":[175],"application":[177,255],"variant-rich":[179],"support":[183],"legacy":[184],"systems,":[185],"reverse-engineer":[190],"variability-aware":[191],"UML":[192],"semi-automatically":[195],"map":[196],"existing":[197],"implementation.":[202],"Besides":[203],"evaluations":[204],"individual":[207,266],"contributions,":[208],"demonstrate":[210],"applicability":[211],"two":[216,259],"real-world":[217],"case":[218,260],"studies,":[219],"iTrust":[221],"electronics":[222],"health":[223],"records":[224],"Eclipse":[228],"Secure":[229],"Storage.":[230],"This":[231],"book":[232,280],"chapter":[233],"summary":[236],"thesis,":[239],"focusing":[240],"addressed":[243],"problems,":[244],"answered":[247],"research":[248],"questions,":[249],"general":[251],"solution,":[252],"its":[254],"studies.":[261],"details":[263],"solutions,":[267],"please":[268],"refer":[269],"corresponding":[275],"publications":[276],"referenced":[277],"chapter.":[281]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
