{"id":"https://openalex.org/W2017540897","doi":"https://doi.org/10.4018/ijsse.2014070104","title":"Meta-Modeling Based Secure Software Development Processes","display_name":"Meta-Modeling Based Secure Software Development Processes","publication_year":2014,"publication_date":"2014-07-01","ids":{"openalex":"https://openalex.org/W2017540897","doi":"https://doi.org/10.4018/ijsse.2014070104","mag":"2017540897"},"language":"en","primary_location":{"id":"doi:10.4018/ijsse.2014070104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijsse.2014070104","pdf_url":null,"source":{"id":"https://openalex.org/S43656255","display_name":"International Journal of Secure Software Engineering","issn_l":"1947-3036","issn":["1947-3036","1947-3044"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Secure Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079597786","display_name":"Mehrez Essafi","orcid":null},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Mehrez Essafi","raw_affiliation_strings":["RIADI Laboratory, National School for Computer Science Studies, University of Manouba, Tunis, Tunisia","RIADI Laboratory, National School for Computer Science Studies, University of Manouba, Tunis, Tunisia#TAB#"],"affiliations":[{"raw_affiliation_string":"RIADI Laboratory, National School for Computer Science Studies, University of Manouba, Tunis, Tunisia","institution_ids":["https://openalex.org/I83259278"]},{"raw_affiliation_string":"RIADI Laboratory, National School for Computer Science Studies, University of Manouba, Tunis, Tunisia#TAB#","institution_ids":["https://openalex.org/I83259278"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113495421","display_name":"Henda Ben Gh\u00e9zala","orcid":null},"institutions":[{"id":"https://openalex.org/I83259278","display_name":"Manouba University","ror":"https://ror.org/0503ejf32","country_code":"TN","type":"education","lineage":["https://openalex.org/I83259278"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Henda Ben Ghezala","raw_affiliation_strings":["RIADI Laboratory, National School for Computer Science Studies, University of Manouba, Tunis, Tunisia","RIADI Laboratory, National School for Computer Science Studies, University of Manouba, Tunis, Tunisia#TAB#"],"affiliations":[{"raw_affiliation_string":"RIADI Laboratory, National School for Computer Science Studies, University of Manouba, Tunis, Tunisia","institution_ids":["https://openalex.org/I83259278"]},{"raw_affiliation_string":"RIADI Laboratory, National School for Computer Science Studies, University of Manouba, Tunis, Tunisia#TAB#","institution_ids":["https://openalex.org/I83259278"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079597786"],"corresponding_institution_ids":["https://openalex.org/I83259278"],"apc_list":null,"apc_paid":null,"fwci":2.1751,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.87736724,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"5","issue":"3","first_page":"56","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10430","display_name":"Software Engineering Techniques and Practices","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8563920259475708},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6635067462921143},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.601443350315094},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5917808413505554},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.49603399634361267},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.4895387589931488},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.48822787404060364},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.46127817034721375},{"id":"https://openalex.org/keywords/package-development-process","display_name":"Package development process","score":0.46028202772140503},{"id":"https://openalex.org/keywords/goal-driven-software-development-process","display_name":"Goal-Driven Software Development Process","score":0.44236359000205994},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.41281816363334656},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.3378797471523285},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19904497265815735},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.18814417719841003},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10127079486846924},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.09302383661270142}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8563920259475708},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6635067462921143},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.601443350315094},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5917808413505554},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49603399634361267},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.4895387589931488},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48822787404060364},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.46127817034721375},{"id":"https://openalex.org/C123551368","wikidata":"https://www.wikidata.org/wiki/Q7122888","display_name":"Package development process","level":5,"score":0.46028202772140503},{"id":"https://openalex.org/C42669973","wikidata":"https://www.wikidata.org/wiki/Q5575145","display_name":"Goal-Driven Software Development Process","level":5,"score":0.44236359000205994},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.41281816363334656},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.3378797471523285},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19904497265815735},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.18814417719841003},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10127079486846924},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.09302383661270142},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijsse.2014070104","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijsse.2014070104","pdf_url":null,"source":{"id":"https://openalex.org/S43656255","display_name":"International Journal of Secure Software Engineering","issn_l":"1947-3036","issn":["1947-3036","1947-3044"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Secure Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jsse00:v:5:y:2014:i:3:p:56-74","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijsse.2014070104","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W171601550","https://openalex.org/W641490396","https://openalex.org/W1499287191","https://openalex.org/W1505159507","https://openalex.org/W1524147119","https://openalex.org/W1531064568","https://openalex.org/W1549220645","https://openalex.org/W1559133364","https://openalex.org/W1783145020","https://openalex.org/W1808285885","https://openalex.org/W1972914730","https://openalex.org/W1979503333","https://openalex.org/W1996540199","https://openalex.org/W2001008386","https://openalex.org/W2008681738","https://openalex.org/W2015004885","https://openalex.org/W2024465817","https://openalex.org/W2031159881","https://openalex.org/W2031438860","https://openalex.org/W2037416864","https://openalex.org/W2073492608","https://openalex.org/W2106798436","https://openalex.org/W2126762719","https://openalex.org/W2128892642","https://openalex.org/W2132832491","https://openalex.org/W2133502806","https://openalex.org/W2146760696","https://openalex.org/W2152497221","https://openalex.org/W2153177282","https://openalex.org/W2155317219","https://openalex.org/W2164273722","https://openalex.org/W2168740635","https://openalex.org/W2184312791","https://openalex.org/W2187545729","https://openalex.org/W2294407885","https://openalex.org/W2623463601","https://openalex.org/W2724725557","https://openalex.org/W4236531127","https://openalex.org/W4241965918","https://openalex.org/W4247638982","https://openalex.org/W4285719527","https://openalex.org/W6812742317"],"related_works":["https://openalex.org/W2966991261","https://openalex.org/W3105511281","https://openalex.org/W2255025599","https://openalex.org/W1723540552","https://openalex.org/W2160234382","https://openalex.org/W2566085182","https://openalex.org/W1998414856","https://openalex.org/W792924284","https://openalex.org/W2147994489","https://openalex.org/W9284821"],"abstract_inverted_index":{"This":[0],"work":[1],"suggests":[2],"a":[3,31,70,84,124],"multilevel":[4],"support":[5],"to":[6,17,19,126,136,143],"software":[7,26,48,66,109],"developers,":[8],"who":[9],"often":[10],"lack":[11],"knowledge":[12],"and":[13,33,56,73,80,92,100,120,142],"skills":[14],"on":[15],"how":[16],"proceed":[18],"develop":[20],"secure":[21,108],"software.":[22],"In":[23],"fact,":[24],"developing":[25],"with":[27],"such":[28],"quality":[29],"is":[30,121,133],"hard":[32],"complex":[34],"task":[35],"that":[36,96],"involves":[37],"many":[38],"additional":[39],"security-dedicated":[40],"activities":[41,68],"which":[42],"are":[43],"usually":[44],"omitted":[45],"in":[46,59,69,83],"traditional":[47],"development":[49,86,110],"lifecycles":[50],"or":[51],"integrated":[52],"but":[53],"not":[54],"efficiently":[55],"appropriately":[57],"deployed":[58],"some":[60,145],"others.":[61],"To":[62],"federate":[63],"all":[64],"these":[65],"security-assurance":[67],"structured":[71],"way":[72],"provide":[74],"the":[75,138],"required":[76],"guidelines":[77],"for":[78],"choosing":[79],"using":[81],"them":[82],"flexible":[85],"process,":[87],"authors":[88],"used":[89],"meta-modeling":[90],"techniques":[91],"dynamic":[93],"process":[94],"execution":[95],"consider":[97],"developer's":[98],"affinities":[99],"product's":[101],"states.":[102],"The":[103],"proposed":[104,139],"approach":[105,140],"formalizes":[106],"existing":[107],"processes,":[111],"allows":[112],"integration":[113],"of":[114,146],"new":[115],"ones,":[116],"prevents":[117],"ad-hoc":[118],"executions":[119],"supported":[122],"by":[123],"tool":[125],"facilitate":[127],"its":[128,147],"deployment.":[129],"A":[130],"case":[131],"study":[132],"given":[134],"here":[135],"exemplify":[137],"application":[141],"illustrate":[144],"advantages.":[148]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
