{"id":"https://openalex.org/W2030510978","doi":"https://doi.org/10.1145/1858996.1859040","title":"Security-driven model-based dynamic adaptation","display_name":"Security-driven model-based dynamic adaptation","publication_year":2010,"publication_date":"2010-09-20","ids":{"openalex":"https://openalex.org/W2030510978","doi":"https://doi.org/10.1145/1858996.1859040","mag":"2030510978"},"language":"en","primary_location":{"id":"doi:10.1145/1858996.1859040","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1858996.1859040","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM international conference on Automated software engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://inria.hal.science/inria-00538500","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5059202838","display_name":"Brice Morin","orcid":"https://orcid.org/0000-0003-1029-0147"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en sciences et technologies du num\u00e9rique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I4210133778","display_name":"Centre Inria de l'Universit\u00e9 de Rennes","ror":"https://ror.org/04040yw90","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210133778"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Brice Morin","raw_affiliation_strings":["INRIA, Centre Rennes - Bretagne Atlantique, Rennes, France"],"affiliations":[{"raw_affiliation_string":"INRIA, Centre Rennes - Bretagne Atlantique, Rennes, France","institution_ids":["https://openalex.org/I4210133778","https://openalex.org/I1326498283"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003229719","display_name":"Tejeddine Mouelhi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tejeddine Mouelhi","raw_affiliation_strings":["Telecom Bretagne, Rennes, France","TELECOM BRETAGNE, RENNES, France"],"affiliations":[{"raw_affiliation_string":"Telecom Bretagne, Rennes, France","institution_ids":[]},{"raw_affiliation_string":"TELECOM BRETAGNE, RENNES, France","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085449737","display_name":"Franck Fleurey","orcid":null},"institutions":[{"id":"https://openalex.org/I173888879","display_name":"SINTEF","ror":"https://ror.org/01f677e56","country_code":"NO","type":"facility","lineage":["https://openalex.org/I173888879"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Franck Fleurey","raw_affiliation_strings":["SINTEF ICT, Oslo, Norway","SINTEF ICT, Oslo (Norway)"],"affiliations":[{"raw_affiliation_string":"SINTEF ICT, Oslo, Norway","institution_ids":["https://openalex.org/I173888879"]},{"raw_affiliation_string":"SINTEF ICT, Oslo (Norway)","institution_ids":["https://openalex.org/I173888879"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040574362","display_name":"Yves Le Traon","orcid":"https://orcid.org/0000-0002-1045-4861"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Yves Le Traon","raw_affiliation_strings":["University of Luxembourg, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002785466","display_name":"Olivier Barais","orcid":"https://orcid.org/0000-0002-4551-8562"},"institutions":[{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]},{"id":"https://openalex.org/I56067802","display_name":"Universit\u00e9 de Rennes","ror":"https://ror.org/015m7wh34","country_code":"FR","type":"education","lineage":["https://openalex.org/I56067802"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Olivier Barais","raw_affiliation_strings":["IRISA, Universit\u00e9 de Rennes, Rennes, France"],"affiliations":[{"raw_affiliation_string":"IRISA, Universit\u00e9 de Rennes, Rennes, France","institution_ids":["https://openalex.org/I56067802","https://openalex.org/I2802519937"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069324527","display_name":"Jean\u2010Marc Jez\u00e9qu\u00e9l","orcid":"https://orcid.org/0000-0002-0582-9745"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en sciences et technologies du num\u00e9rique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"government","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]},{"id":"https://openalex.org/I56067802","display_name":"Universit\u00e9 de Rennes","ror":"https://ror.org/015m7wh34","country_code":"FR","type":"education","lineage":["https://openalex.org/I56067802"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Marc J\u00e9z\u00e9quel","raw_affiliation_strings":["INRIA and IRISA, Universit\u00e9 de Rennes, Rennes, France"],"affiliations":[{"raw_affiliation_string":"INRIA and IRISA, Universit\u00e9 de Rennes, Rennes, France","institution_ids":["https://openalex.org/I2802519937","https://openalex.org/I56067802","https://openalex.org/I1326498283"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5059202838"],"corresponding_institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I4210133778"],"apc_list":null,"apc_paid":null,"fwci":12.7925,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.98184949,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"205","last_page":"214"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7619729042053223},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.723230242729187},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6391769051551819},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.6156216859817505},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.6011472940444946},{"id":"https://openalex.org/keywords/separation-of-concerns","display_name":"Separation of concerns","score":0.5601097941398621},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5220389366149902},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.49727490544319153},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4341464042663574},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41784366965293884},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4152454733848572},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4118277132511139},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3897678852081299},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1627303957939148}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7619729042053223},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.723230242729187},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6391769051551819},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.6156216859817505},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.6011472940444946},{"id":"https://openalex.org/C76214141","wikidata":"https://www.wikidata.org/wiki/Q2465506","display_name":"Separation of concerns","level":3,"score":0.5601097941398621},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5220389366149902},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.49727490544319153},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4341464042663574},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41784366965293884},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4152454733848572},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4118277132511139},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3897678852081299},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1627303957939148},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1858996.1859040","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1858996.1859040","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the IEEE/ACM international conference on Automated software engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.172.6110","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.172.6110","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.irisa.fr/triskell/publis/2010/Morin10b.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:inria-00538500v1","is_oa":true,"landing_page_url":"https://inria.hal.science/inria-00538500","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"25nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2010), 2010, Antwerp, Belgium, Belgium","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:inria-00538500v1","is_oa":true,"landing_page_url":"https://inria.hal.science/inria-00538500","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"25nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2010), 2010, Antwerp, Belgium, Belgium","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W265610032","https://openalex.org/W1486178352","https://openalex.org/W1524147119","https://openalex.org/W1557419646","https://openalex.org/W1563423869","https://openalex.org/W1582565816","https://openalex.org/W1603155494","https://openalex.org/W1610570299","https://openalex.org/W1783494111","https://openalex.org/W1854780612","https://openalex.org/W1978613757","https://openalex.org/W2012419258","https://openalex.org/W2023572265","https://openalex.org/W2040830570","https://openalex.org/W2043723411","https://openalex.org/W2089281324","https://openalex.org/W2154765153","https://openalex.org/W2160207938","https://openalex.org/W2163195480","https://openalex.org/W2342913398","https://openalex.org/W2995454901","https://openalex.org/W6683686944"],"related_works":["https://openalex.org/W2089652167","https://openalex.org/W2188814192","https://openalex.org/W2114705216","https://openalex.org/W1940232950","https://openalex.org/W3094039898","https://openalex.org/W2151761340","https://openalex.org/W2393973626","https://openalex.org/W2105261429","https://openalex.org/W2107355607","https://openalex.org/W1555133226"],"abstract_inverted_index":{"Security":[0],"is":[1,51,118,123],"a":[2,72,80,84,133,145],"key-challenge":[3],"for":[4,19,75],"software":[5,13],"engineering,":[6],"especially":[7],"when":[8],"considering":[9],"access":[10,24,34,94],"control":[11,25,35,95],"and":[12,43,55],"evolutions.":[14],"No":[15],"satisfying":[16],"solution":[17],"exists":[18],"maintaining":[20],"the":[21,28,38,41,44,61,64,67,93,99,102,112,116,120,129,139,142],"alignment":[22],"of":[23,33,66,135,144],"policies":[26],"with":[27,111],"business":[29],"logic.":[30],"Current":[31],"implementations":[32],"rely":[36],"on":[37],"separation":[39,50],"between":[40],"policy":[42,68,81,117],"application":[45],"code.":[46],"In":[47],"practice,":[48],"this":[49,108],"not":[52],"so":[53],"strict":[54],"some":[56],"rules":[57],"are":[58],"hard-coded":[59],"within":[60],"application,":[62],"making":[63],"evolution":[65],"difficult.":[69],"We":[70,97],"propose":[71],"new":[73],"methodology":[74],"implementing":[76],"security-driven":[77],"applications.":[78],"From":[79],"defined":[82],"by":[83],"security":[85],"expert,":[86],"we":[87,137],"generate":[88],"an":[89],"architectural":[90,121],"model,":[91],"reflecting":[92],"policy.":[96],"leverage":[98],"advances":[100],"in":[101,126],"[email":[103],"protected]":[104],"domain":[105],"to":[106,141],"keep":[107],"model":[109,122],"synchronized":[110],"running":[113,130],"system.":[114,131,148],"When":[115],"updated,":[119,124],"which":[125],"turn":[127],"reconfigures":[128],"As":[132],"proof":[134],"concept,":[136],"apply":[138],"approach":[140],"development":[143],"library":[146],"management":[147]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
