{"id":"https://openalex.org/W4226286178","doi":"https://doi.org/10.1145/3501774.3501778","title":"Design of Secure Connectors for Complex Message Communications in Software Architecture","display_name":"Design of Secure Connectors for Complex Message Communications in Software Architecture","publication_year":2021,"publication_date":"2021-11-19","ids":{"openalex":"https://openalex.org/W4226286178","doi":"https://doi.org/10.1145/3501774.3501778"},"language":"en","primary_location":{"id":"doi:10.1145/3501774.3501778","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3501774.3501778","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3501774.3501778","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 2nd European Symposium on Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3501774.3501778","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068346884","display_name":"Michael Shin","orcid":"https://orcid.org/0009-0001-5056-1362"},"institutions":[{"id":"https://openalex.org/I12315562","display_name":"Texas Tech University","ror":"https://ror.org/0405mnx93","country_code":"US","type":"education","lineage":["https://openalex.org/I12315562"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael Shin","raw_affiliation_strings":["Department of Computer Science, Texas Tech University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Texas Tech University, USA","institution_ids":["https://openalex.org/I12315562"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085151187","display_name":"Taeghyun Kang","orcid":null},"institutions":[{"id":"https://openalex.org/I28324025","display_name":"University of Central Missouri","ror":"https://ror.org/02c63wv67","country_code":"US","type":"education","lineage":["https://openalex.org/I28324025"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Taeghyun Kang","raw_affiliation_strings":["Department of Computer Science and Mathematics, University of Central Missouri, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Mathematics, University of Central Missouri, USA","institution_ids":["https://openalex.org/I28324025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048828434","display_name":"Hassan Gomaa","orcid":"https://orcid.org/0000-0002-8582-4054"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hassan Gomaa","raw_affiliation_strings":["Department of Computer Science, George Mason University, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, George Mason University, USA","institution_ids":["https://openalex.org/I162714631"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5068346884"],"corresponding_institution_ids":["https://openalex.org/I12315562"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21517521,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"21","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7403098940849304},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.5851525068283081},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5694278478622437},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.5259849429130554},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5258558392524719},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5048757195472717},{"id":"https://openalex.org/keywords/communications-security","display_name":"Communications security","score":0.49282053112983704},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4670146107673645},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.43446481227874756},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4273337125778198},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36138367652893066},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3568519353866577},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.30017992854118347},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23097026348114014},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.19525101780891418},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.15247327089309692}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7403098940849304},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.5851525068283081},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5694278478622437},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.5259849429130554},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5258558392524719},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5048757195472717},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.49282053112983704},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4670146107673645},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.43446481227874756},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4273337125778198},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36138367652893066},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3568519353866577},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.30017992854118347},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23097026348114014},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.19525101780891418},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.15247327089309692},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3501774.3501778","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3501774.3501778","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3501774.3501778","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 2nd European Symposium on Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3501774.3501778","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3501774.3501778","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3501774.3501778","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 2nd European Symposium on Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4226286178.pdf","grobid_xml":"https://content.openalex.org/works/W4226286178.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W624948933","https://openalex.org/W1524147119","https://openalex.org/W1985329441","https://openalex.org/W2252272901","https://openalex.org/W2398308799","https://openalex.org/W2469965585","https://openalex.org/W2509438504","https://openalex.org/W2582025857","https://openalex.org/W2968358484","https://openalex.org/W2998651993","https://openalex.org/W4250780101","https://openalex.org/W6732613808"],"related_works":["https://openalex.org/W4206910357","https://openalex.org/W2056412463","https://openalex.org/W1548138051","https://openalex.org/W4230385779","https://openalex.org/W2907868081","https://openalex.org/W1811024770","https://openalex.org/W2542633692","https://openalex.org/W2143064903","https://openalex.org/W2784006287","https://openalex.org/W1564613859"],"abstract_inverted_index":{"This":[0,52],"paper":[1,53],"describes":[2,54],"the":[3,41,55,86],"design":[4],"of":[5,57],"secure":[6,18,24,61,83,92],"connectors":[7,25,62,84],"that":[8],"deal":[9],"with":[10,28],"various":[11],"message":[12,70],"communications":[13],"between":[14,34],"application":[15,35,64],"components":[16,65],"in":[17],"distributed":[19,93],"component-based":[20],"software":[21],"architectures.":[22],"The":[23,60],"are":[26],"designed":[27],"more":[29],"than":[30],"one":[31],"communication":[32,50,71],"pattern":[33],"components,":[36,42],"security":[37,44,47,58,75],"patterns":[38,48],"required":[39],"by":[40],"and":[43,49,74],"coordinators":[45],"integrating":[46],"patterns.":[51],"pseudocode":[56],"coordinators.":[59],"make":[63],"free":[66],"from":[67],"maintaining":[68],"complex":[69],"sequence":[72],"logic":[73],"concerns.":[76],"To":[77],"validate":[78],"our":[79],"design,":[80],"we":[81],"applied":[82],"to":[85],"model-view-controller":[87],"(MVC)":[88],"architecture":[89],"for":[90],"a":[91],"baseball":[94],"game":[95],"application.":[96]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
