{"id":"https://openalex.org/W2293744109","doi":"https://doi.org/10.1007/978-3-642-55032-4_42","title":"Using Model Driven Security Approaches in Web Application Development","display_name":"Using Model Driven Security Approaches in Web Application Development","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W2293744109","doi":"https://doi.org/10.1007/978-3-642-55032-4_42","mag":"2293744109"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-55032-4_42","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-55032-4_42","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-55032-4_42.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-55032-4_42.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067701939","display_name":"Christoph Hochreiner","orcid":"https://orcid.org/0000-0003-2995-6025"},"institutions":[{"id":"https://openalex.org/I4210167190","display_name":"SBA Research","ror":"https://ror.org/05nny6x17","country_code":"AT","type":"facility","lineage":["https://openalex.org/I4210167190"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Christoph Hochreiner","raw_affiliation_strings":["SBA-Research, Austria","SBA-Research (Austria)"],"affiliations":[{"raw_affiliation_string":"SBA-Research, Austria","institution_ids":["https://openalex.org/I4210167190"]},{"raw_affiliation_string":"SBA-Research (Austria)","institution_ids":["https://openalex.org/I4210167190"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104085061","display_name":"Zhendong Ma","orcid":"https://orcid.org/0009-0002-8902-0843"},"institutions":[{"id":"https://openalex.org/I132118926","display_name":"Austrian Institute of Technology","ror":"https://ror.org/04knbh022","country_code":"AT","type":"facility","lineage":["https://openalex.org/I132118926"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Zhendong Ma","raw_affiliation_strings":["Austrian Institute of Technology, Austria","AIT - Austrian Institute of Technology [Vienna] (Donau-City-Stra\u00dfe 1\r\n1220 Vienna - Austria)"],"affiliations":[{"raw_affiliation_string":"Austrian Institute of Technology, Austria","institution_ids":["https://openalex.org/I132118926"]},{"raw_affiliation_string":"AIT - Austrian Institute of Technology [Vienna] (Donau-City-Stra\u00dfe 1\r\n1220 Vienna - Austria)","institution_ids":["https://openalex.org/I132118926"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064355276","display_name":"Peter Kieseberg","orcid":"https://orcid.org/0000-0002-2847-2152"},"institutions":[{"id":"https://openalex.org/I4210167190","display_name":"SBA Research","ror":"https://ror.org/05nny6x17","country_code":"AT","type":"facility","lineage":["https://openalex.org/I4210167190"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Peter Kieseberg","raw_affiliation_strings":["SBA-Research, Austria","SBA-Research (Austria)"],"affiliations":[{"raw_affiliation_string":"SBA-Research, Austria","institution_ids":["https://openalex.org/I4210167190"]},{"raw_affiliation_string":"SBA-Research (Austria)","institution_ids":["https://openalex.org/I4210167190"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055367812","display_name":"Sebastian Schrittwieser","orcid":"https://orcid.org/0000-0003-2115-2022"},"institutions":[{"id":"https://openalex.org/I25485817","display_name":"St. P\u00f6lten University of Applied Sciences","ror":"https://ror.org/039a2re55","country_code":"AT","type":"education","lineage":["https://openalex.org/I25485817"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Sebastian Schrittwieser","raw_affiliation_strings":["St. Poelten University of Applied Sciences, Austria","St. Poelten University of Applied Sciences (Austria)"],"affiliations":[{"raw_affiliation_string":"St. Poelten University of Applied Sciences, Austria","institution_ids":["https://openalex.org/I25485817"]},{"raw_affiliation_string":"St. Poelten University of Applied Sciences (Austria)","institution_ids":["https://openalex.org/I25485817"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083435816","display_name":"Edgar Weippl","orcid":"https://orcid.org/0000-0003-0665-6126"},"institutions":[{"id":"https://openalex.org/I4210167190","display_name":"SBA Research","ror":"https://ror.org/05nny6x17","country_code":"AT","type":"facility","lineage":["https://openalex.org/I4210167190"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Edgar Weippl","raw_affiliation_strings":["SBA-Research, Austria","SBA-Research (Austria)"],"affiliations":[{"raw_affiliation_string":"SBA-Research, Austria","institution_ids":["https://openalex.org/I4210167190"]},{"raw_affiliation_string":"SBA-Research (Austria)","institution_ids":["https://openalex.org/I4210167190"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5067701939"],"corresponding_institution_ids":["https://openalex.org/I4210167190"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":7.6332,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.96996776,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"419","last_page":"431"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8725026845932007},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5809200406074524},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.5231032371520996},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4961570203304291},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.48989003896713257},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.48321473598480225},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4777504503726959},{"id":"https://openalex.org/keywords/model-driven-architecture","display_name":"Model-driven architecture","score":0.452072411775589},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43903979659080505},{"id":"https://openalex.org/keywords/application-security","display_name":"Application security","score":0.4265865683555603},{"id":"https://openalex.org/keywords/web-application-development","display_name":"Web application development","score":0.41982007026672363},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.41745632886886597},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.2744430899620056},{"id":"https://openalex.org/keywords/web-modeling","display_name":"Web modeling","score":0.27266639471054077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26140254735946655},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.2388777732849121},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.234098881483078},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22618886828422546},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1706850230693817},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1028304398059845}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8725026845932007},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5809200406074524},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.5231032371520996},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4961570203304291},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.48989003896713257},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.48321473598480225},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4777504503726959},{"id":"https://openalex.org/C509989072","wikidata":"https://www.wikidata.org/wiki/Q15188241","display_name":"Model-driven architecture","level":4,"score":0.452072411775589},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43903979659080505},{"id":"https://openalex.org/C77109596","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Application security","level":5,"score":0.4265865683555603},{"id":"https://openalex.org/C120927855","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application development","level":4,"score":0.41982007026672363},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.41745632886886597},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.2744430899620056},{"id":"https://openalex.org/C130436687","wikidata":"https://www.wikidata.org/wiki/Q7978591","display_name":"Web modeling","level":3,"score":0.27266639471054077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26140254735946655},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.2388777732849121},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.234098881483078},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22618886828422546},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1706850230693817},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1028304398059845}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-642-55032-4_42","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-55032-4_42","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-55032-4_42.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.570.6981","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.570.6981","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.sba-research.org/wp-content/uploads/publications/UsingModelDrivenSecurityApproachesinWebApplicationDevelopment.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:hal-01397248v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01397248","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.419-431, &#x27E8;10.1007/978-3-642-55032-4_42&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-55032-4_42","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-55032-4_42","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-642-55032-4_42.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8","score":0.4099999964237213}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323031","display_name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","ror":"https://ror.org/028jc0449"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2293744109.pdf","grobid_xml":"https://content.openalex.org/works/W2293744109.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W54544099","https://openalex.org/W203030367","https://openalex.org/W1478091037","https://openalex.org/W1486178352","https://openalex.org/W1524147119","https://openalex.org/W1606010048","https://openalex.org/W1651242740","https://openalex.org/W1932749954","https://openalex.org/W1969498825","https://openalex.org/W1973969262","https://openalex.org/W2120380522","https://openalex.org/W2129697331","https://openalex.org/W2130891285","https://openalex.org/W2137279537","https://openalex.org/W2166602595","https://openalex.org/W2505871501"],"related_works":["https://openalex.org/W2094754363","https://openalex.org/W4214947963","https://openalex.org/W2784956033","https://openalex.org/W46693260","https://openalex.org/W2143037118","https://openalex.org/W2132609501","https://openalex.org/W149873063","https://openalex.org/W2551701629","https://openalex.org/W2001455257","https://openalex.org/W2521071348"],"abstract_inverted_index":{"With":[0],"the":[1,29,36,40,48,67,85,110,115,121],"rise":[2],"of":[3,31,39,87,97,114,123],"Model":[4,59],"Driven":[5,60],"Engineering":[6],"(MDE)":[7],"as":[8,118,120],"a":[9,24,52,103],"software":[10,41,88],"development":[11,42],"methodology,":[12],"which":[13],"increases":[14],"productivity":[15],"and,":[16],"supported":[17],"by":[18,47],"powerful":[19],"code":[20],"generation":[21],"tools,":[22],"allows":[23],"less":[25],"error-prone":[26],"implementation":[27],"process,":[28],"idea":[30],"modeling":[32],"security":[33,86,128],"aspects":[34],"during":[35,66],"design":[37],"phase":[38],"process":[43],"was":[44],"first":[45],"suggested":[46],"research":[49],"community":[50],"almost":[51],"decade":[53],"ago.":[54],"While":[55],"various":[56,116],"approaches":[57,100],"for":[58,125],"Security":[61],"(MDS)":[62],"have":[63],"been":[64],"proposed":[65],"years,":[68],"it":[69],"is":[70],"still":[71],"unclear,":[72],"how":[73],"these":[74],"concepts":[75],"compare":[76],"to":[77],"each":[78],"other":[79],"and":[80,108,112],"whether":[81],"they":[82],"can":[83],"improve":[84],"projects.":[89],"In":[90],"this":[91],"paper,":[92],"we":[93],"provide":[94],"an":[95],"evaluation":[96],"current":[98],"MDS":[99,124],"based":[101],"on":[102],"simple":[104],"web":[105,126],"application":[106,127],"scenario":[107],"discuss":[109],"strengths":[111],"limitations":[113],"techniques,":[117],"well":[119],"practicability":[122],"in":[129],"general.":[130]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
