Extending the UML Statecharts Notation to Model Security Aspects

Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective by extending popular modeling notations to model security aspects, there has been little modeling support for state-based views of security i...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on software engineering Vol. 41; no. 7; pp. 661 - 690
Main Authors El-Attar, Mohamed, Luqman, Hamza, Karpati, Peter, Sindre, Guttorm, Opdahl, Andreas L.
Format Journal Article
LanguageEnglish
Published New York IEEE 01.07.2015
IEEE Computer Society
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective by extending popular modeling notations to model security aspects, there has been little modeling support for state-based views of security issues. This paper undertakes a scientific approach to propose a new notational set that extends the UML (Unified Modeling Language) statecharts notation. An online industrial survey was conducted to measure the perceptions of the new notation with respect to its semantic transparency as well as its coverage of modeling state based security aspects. The survey results indicate that the new notation encompasses the set of semantics required in a state based security modeling language and was largely intuitive to use and understand provided very little training. A subject-based empirical evaluation using software engineering professionals was also conducted to evaluate the cognitive effectiveness of the proposed notation. The main finding was that the new notation is cognitively more effective than the original notational set of UML statecharts as it allowed the subjects to read models created using the new notation much quicker.
AbstractList Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective by extending popular modeling notations to model security aspects, there has been little modeling support for state-based views of security issues. This paper undertakes a scientific approach to propose a new notational set that extends the UML (Unified Modeling Language) statecharts notation. An online industrial survey was conducted to measure the perceptions of the new notation with respect to its semantic transparency as well as its coverage of modeling state based security aspects. The survey results indicate that the new notation encompasses the set of semantics required in a state based security modeling language and was largely intuitive to use and understand provided very little training. A subject-based empirical evaluation using software engineering professionals was also conducted to evaluate the cognitive effectiveness of the proposed notation. The main finding was that the new notation is cognitively more effective than the original notational set of UML statecharts as it allowed the subjects to read models created using the new notation much quicker.
Author El-Attar, Mohamed
Karpati, Peter
Sindre, Guttorm
Luqman, Hamza
Opdahl, Andreas L.
Author_xml – sequence: 1
  givenname: Mohamed
  surname: El-Attar
  fullname: El-Attar, Mohamed
  email: melattar@kfupm.edu.sa
  organization: Inf. & Comput. Sci. Dept., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
– sequence: 2
  givenname: Hamza
  surname: Luqman
  fullname: Luqman, Hamza
  email: hluqman@kfupm.edu.sa
  organization: Inf. & Comput. Sci. Dept., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia
– sequence: 3
  givenname: Peter
  surname: Karpati
  fullname: Karpati, Peter
  email: Peter.Karpati@hrp.no
  organization: Inst. for Energy Technol., Halden, Norway
– sequence: 4
  givenname: Guttorm
  surname: Sindre
  fullname: Sindre, Guttorm
  email: guttors@idi.ntnu.no
  organization: Dept. of Comput. & Inf. Sci., Norwegian Univ. of Sci. & Technol., Trondheim, Norway
– sequence: 5
  givenname: Andreas L.
  surname: Opdahl
  fullname: Opdahl, Andreas L.
  email: Andreas.Opdahl@uib.no
  organization: Dept. of Inf. Sci. & Media, Univ. of Bergen, Bergen, Norway
BookMark eNp9kL1vwjAQxa2qlQq0e6Uukbp0CfVHbMdbEaIfErQDMFuJuZSgEFPbkcp_XyNQB4becjrpvbt7vz66bG0LCN0RPCQEq6fFfDKkmPAhZUpwKi5QjyimUsYpvkQ9jFWecp6ra9T3foMx5lLyHnqe_ARoV3X7lYQ1JMvZNJmHIoBZFy745MPGobZtEmwysytokjmYztVhn4z8DkzwN-iqKhoPt6c-QMuXyWL8lk4_X9_Ho2lqGM1CSkVBhTKsKjJS5bHKMpdGSOBYqkyQPGOrEnKBs5xntKK0ZKritMRQKVmtBBugx-PenbPfHfigt7U30DRFC7bzmkjF4oWIIEofzqQb27k2fqeJUJITLuhhoTiqjLPeO6i0qY9hgyvqRhOsD2B1BKsPYPUJbDTiM-PO1dvC7f-z3B8tNQD8ySXOKI3BfwGCmYMA
CODEN IESEDJ
CitedBy_id crossref_primary_10_1016_j_cose_2019_101615
crossref_primary_10_1016_j_infsof_2015_10_012
crossref_primary_10_1007_s10270_021_00888_9
crossref_primary_10_1109_TSE_2018_2802910
crossref_primary_10_1002_smr_2667
crossref_primary_10_1016_j_csi_2017_08_002
crossref_primary_10_24017_science_2017_3_23
crossref_primary_10_1016_j_jss_2019_06_096
crossref_primary_10_1109_TSE_2021_3060344
crossref_primary_10_1007_s10270_022_00992_4
crossref_primary_10_1109_TSE_2022_3176725
crossref_primary_10_1108_ICS_11_2018_0132
crossref_primary_10_1007_s13369_019_04067_3
Cites_doi 10.1207/s15516709cog1801_3
10.1109/MSECP.2004.1264860
10.1145/505532.505535
10.1016/j.jvlc.2006.04.006
10.1007/978-3-642-29044-2
10.1007/978-3-642-16782-9_1
10.1023/A:1016344215610
10.1109/2.889093
10.1142/S0218194007003240
10.1145/22949.22950
10.1007/s10270-009-0114-7
10.1016/j.jvlc.2006.04.004
10.1109/ICRE.2003.1232746
10.2307/1267427
10.1007/978-3-642-21640-4_28
10.4018/jdm.2004010103
10.1109/SSIRI.2011.11
10.1016/j.ijhcs.2004.01.003
10.4018/jdm.2008070102
10.1007/978-3-642-14192-8_24
10.1002/col.20594
10.1109/ICRE.2003.1232791
10.1080/07370024.1999.9667269
10.1006/jvlc.1996.0009
10.1007/978-3-642-16782-9_11
10.1145/606658.606659
10.1037/h0043158
10.1049/iet-sen.2010.0038
10.1145/775412.775425
10.1006/ceps.1993.1016
10.1111/j.1467-9280.2006.01759.x
10.1007/s00766-004-0194-4
10.1287/mnsc.43.10.1387
10.1109/38.946634
10.1145/1315245.1315250
10.1002/spip.261
10.1111/j.1551-6708.1987.tb00863.x
10.4018/jisp.2007100101
10.1007/978-3-642-19751-2_6
10.1109/ICSE.2004.1317437
10.1016/S0164-1212(01)00125-X
10.1007/978-3-642-31069-0_5
10.1007/978-1-5041-2919-0_8
10.1109/32.60316
10.1002/spip.150
10.1046/j.1365-2575.1999.00052.x
10.1109/EDOC.2003.1233846
10.1109/TSE.2009.67
10.1016/B978-155860808-5/50005-8
10.1016/0167-6423(93)90021-G
10.2307/2685263
10.1007/978-3-540-73031-6_27
10.1109/TSMCA.2010.2087017
ContentType Journal Article
Copyright Copyright IEEE Computer Society Jul 1, 2015
Copyright_xml – notice: Copyright IEEE Computer Society Jul 1, 2015
DBID 97E
RIA
RIE
AAYXX
CITATION
JQ2
K9.
7SC
7SP
8FD
F28
FR3
L7M
L~C
L~D
DOI 10.1109/TSE.2015.2396526
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
ProQuest Computer Science Collection
ProQuest Health & Medical Complete (Alumni)
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
ProQuest Health & Medical Complete (Alumni)
ProQuest Computer Science Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Computer and Information Systems Abstracts Professional
DatabaseTitleList ProQuest Health & Medical Complete (Alumni)
Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1939-3520
EndPage 690
ExternalDocumentID 3748912131
10_1109_TSE_2015_2396526
7042284
Genre orig-research
Feature
GrantInformation_xml – fundername: King Fahd University of Petroleum and Minerals
  grantid: IN141010
  funderid: 10.13039/501100004055
– fundername: Deanship of Scientific Research
  funderid: 10.13039/501100004686
GroupedDBID --Z
-DZ
-~X
.4S
.DC
0R~
29I
4.4
5GY
6IK
85S
8R4
8R5
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABPPZ
ABQJQ
ABVLG
ACGFO
ACGOD
ACIWK
ACNCT
AENEX
AGQYO
AGSQL
AHBIQ
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BKOMP
BPEOZ
CS3
DU5
EBS
EDO
EJD
HZ~
I-F
IEDLZ
IFIPE
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
Q2X
RIA
RIE
RNS
RXW
S10
TAE
TN5
TWZ
UHB
UPT
WH7
YZZ
AAYXX
ALIPV
CITATION
RIG
JQ2
K9.
7SC
7SP
8FD
F28
FR3
L7M
L~C
L~D
ID FETCH-LOGICAL-c324t-26a269c3fa41f8888bb87c67e5079461843dbe86048542f22b39f52b0ef97fd63
IEDL.DBID RIE
ISSN 0098-5589
IngestDate Fri Jul 11 01:40:23 EDT 2025
Mon Jun 30 08:51:03 EDT 2025
Thu Apr 24 23:04:21 EDT 2025
Tue Jul 01 01:53:15 EDT 2025
Wed Aug 27 02:47:43 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 7
Keywords subject-based experiment
industrial survey
Statecharts
extended notation
security modeling
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/OAPA.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c324t-26a269c3fa41f8888bb87c67e5079461843dbe86048542f22b39f52b0ef97fd63
Notes SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
PQID 1697515626
PQPubID 21418
PageCount 30
ParticipantIDs proquest_journals_1697515626
proquest_miscellaneous_1793269201
crossref_primary_10_1109_TSE_2015_2396526
crossref_citationtrail_10_1109_TSE_2015_2396526
ieee_primary_7042284
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2015-July-1
2015-7-1
20150701
PublicationDateYYYYMMDD 2015-07-01
PublicationDate_xml – month: 07
  year: 2015
  text: 2015-July-1
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on software engineering
PublicationTitleAbbrev TSE
PublicationYear 2015
Publisher IEEE
IEEE Computer Society
Publisher_xml – name: IEEE
– name: IEEE Computer Society
References ref57
ref13
ref12
ref59
ref58
ref14
ref53
ref52
ref54
ref10
buhr (ref9) 1998
ref17
lodderstedt (ref46) 2002
ref51
gane (ref22) 1979
blackwell (ref11) 2009
hassan (ref29) 2009
ref45
ref48
ref47
ref41
ref43
jürjens (ref35) 2002
hitchman (ref31) 2002; 9
krsul (ref40) 1998
el-attar (ref18) 2013
ref49
ref8
ref4
ref3
goodman (ref23) 1968
ref6
demarco (ref15) 1979
ref5
røstad (ref62) 2006
siegel (ref67) 1988
sindre (ref70) 2002
ref80
paivio (ref56) 1986
ref79
jürjens (ref34) 2005
ref78
fettke (ref21) 2009; 25
ref37
ref36
ref75
ref74
ref30
ref77
ref33
ref76
ref32
lehmann (ref42) 1998
ref2
ref38
schneier (ref64) 1999
(ref44) 2015
bertin (ref7) 1983
dubois (ref16) 1996
ref71
ref72
ericson (ref19) 1999
(ref73) 2010
fenz (ref20) 2009
ref68
ref24
ref26
ref69
ref25
kordy (ref39) 2011
ref63
ref66
ref65
amoroso (ref1) 1994
ref28
ref27
(ref55) 2011
ref60
ref61
mitnick (ref50) 2009
References_xml – ident: ref80
  doi: 10.1207/s15516709cog1801_3
– ident: ref72
  doi: 10.1109/MSECP.2004.1264860
– year: 2011
  ident: ref55
  article-title: Unified modeling language
– ident: ref57
  doi: 10.1145/505532.505535
– year: 1999
  ident: ref64
  article-title: Attack trees
  publication-title: Dr Dobb's J
– ident: ref13
  doi: 10.1016/j.jvlc.2006.04.006
– ident: ref79
  doi: 10.1007/978-3-642-29044-2
– ident: ref37
  doi: 10.1007/978-3-642-16782-9_1
– start-page: 1
  year: 2002
  ident: ref70
  article-title: Generalization/specialization as a structuring mechanism for misuse cases
  publication-title: Proc Symp Requirements Eng for Information Security
– ident: ref58
  doi: 10.1023/A:1016344215610
– ident: ref2
  doi: 10.1109/2.889093
– ident: ref52
  doi: 10.1142/S0218194007003240
– year: 2009
  ident: ref50
  publication-title: The Art of Intrusion The Real Stories Behind the Exploits of Hackers Intruders and Deceivers
– ident: ref47
  doi: 10.1145/22949.22950
– ident: ref77
  doi: 10.1007/s10270-009-0114-7
– ident: ref26
  doi: 10.1016/j.jvlc.2006.04.004
– ident: ref45
  doi: 10.1109/ICRE.2003.1232746
– ident: ref65
  doi: 10.2307/1267427
– year: 1994
  ident: ref1
  publication-title: Fundamentals of Computer Security Technology
– ident: ref63
  doi: 10.1007/978-3-642-21640-4_28
– year: 1986
  ident: ref56
  publication-title: Mental Representations A Dual Coding Approach
– year: 1983
  ident: ref7
  publication-title: Semiology of Graphics Diagrams Networks Maps
– ident: ref66
  doi: 10.4018/jdm.2004010103
– ident: ref17
  doi: 10.1109/SSIRI.2011.11
– volume: 25
  start-page: 43
  year: 2009
  ident: ref21
  article-title: How conceptual modeling is used
  publication-title: Commun Assoc Inf Syst
– start-page: 412
  year: 2002
  ident: ref35
  article-title: UMLsec: Extending UML for secure systems development
  publication-title: Proc 5th Int Conf UML - Unified Model Language
– year: 1968
  ident: ref23
  publication-title: Languages of Art An approach to a theory of symbols
– ident: ref59
  doi: 10.1016/j.ijhcs.2004.01.003
– start-page: 135
  year: 1998
  ident: ref9
  article-title: Feature-interaction visualisation and resolution in an agent environment
  publication-title: Proc Feature Interaction in Telecommun and Software Sys VI
– ident: ref48
  doi: 10.4018/jdm.2008070102
– ident: ref36
  doi: 10.1007/978-3-642-14192-8_24
– ident: ref76
  doi: 10.1002/col.20594
– ident: ref43
  doi: 10.1109/ICRE.2003.1232791
– ident: ref8
  doi: 10.1080/07370024.1999.9667269
– year: 2009
  ident: ref11
  article-title: Cognitive dimensions of notations resource site
– year: 2005
  ident: ref34
  publication-title: Secure Systems Development with UML
– start-page: 183
  year: 2009
  ident: ref20
  article-title: Formalizing information security knowledge
  publication-title: Proc ACM Symp Informa Comput Commun Security
– ident: ref27
  doi: 10.1006/jvlc.1996.0009
– ident: ref24
  doi: 10.1007/978-3-642-16782-9_11
– volume: 9
  start-page: 10
  year: 2002
  ident: ref31
  article-title: The details of conceptual modelling notations are important-a comparison of relationship normative language
  publication-title: Commun Assoc Inf Syst
– year: 1998
  ident: ref42
  publication-title: Nonparametrics Statistical Methods Based on Ranks
– start-page: 1
  year: 2009
  ident: ref29
  article-title: Integrating formal analysis and design to preserve security properties
  publication-title: Proc 42nd Hawaii Int Conf Syst Sci
– ident: ref32
  doi: 10.1145/606658.606659
– year: 1998
  ident: ref40
  article-title: Software vulnerability analysis
– year: 2013
  ident: ref18
  article-title: Companion website to security enabled statecharts research
– ident: ref49
  doi: 10.1037/h0043158
– year: 1979
  ident: ref15
  publication-title: Structured Analysis and System Specification
– year: 1988
  ident: ref67
  publication-title: Non-Parametric Statistics for the Behavioral Sciences
– ident: ref38
  doi: 10.1049/iet-sen.2010.0038
– ident: ref6
  doi: 10.1145/775412.775425
– ident: ref78
  doi: 10.1006/ceps.1993.1016
– ident: ref5
  doi: 10.1111/j.1467-9280.2006.01759.x
– year: 2015
  ident: ref44
– ident: ref68
  doi: 10.1007/s00766-004-0194-4
– start-page: 33
  year: 2006
  ident: ref62
  article-title: An extended misuse case notation: Including vulnerabilities and the insider threat
  publication-title: Proc 19th Working Conf Requirements Eng Foundations for Software Quality
– ident: ref25
  doi: 10.1287/mnsc.43.10.1387
– ident: ref33
  doi: 10.1109/38.946634
– ident: ref4
  doi: 10.1145/1315245.1315250
– ident: ref53
  doi: 10.1002/spip.261
– ident: ref41
  doi: 10.1111/j.1551-6708.1987.tb00863.x
– ident: ref30
  doi: 10.4018/jisp.2007100101
– start-page: 80
  year: 2011
  ident: ref39
  article-title: Foundations of attack-defense trees
  publication-title: Formal Aspects of Security and Trust
  doi: 10.1007/978-3-642-19751-2_6
– ident: ref74
  doi: 10.1109/ICSE.2004.1317437
– ident: ref3
  doi: 10.1016/S0164-1212(01)00125-X
– start-page: 426
  year: 2002
  ident: ref46
  article-title: SecureUML: A UML-based modeling language for model-driven security
  publication-title: Proc 5th Int Conf UML - Unified Model Language
– ident: ref71
  doi: 10.1007/978-3-642-31069-0_5
– start-page: 88
  year: 1996
  ident: ref16
  article-title: A framework for dealing with and specifying security requirements in information systems
  publication-title: Inform Syst Security
  doi: 10.1007/978-1-5041-2919-0_8
– start-page: 1
  year: 1999
  ident: ref19
  article-title: Fault tree analysis-a history
  publication-title: Proc 17th Int System Safety Conf
– ident: ref75
  doi: 10.1109/32.60316
– ident: ref28
  doi: 10.1002/spip.150
– year: 2010
  ident: ref73
  article-title: AndroidOS.FakePlayer description
– ident: ref54
  doi: 10.1046/j.1365-2575.1999.00052.x
– ident: ref10
  doi: 10.1109/EDOC.2003.1233846
– year: 1979
  ident: ref22
  publication-title: Structured Systems Analysis Tools and Techniques
– ident: ref51
  doi: 10.1109/TSE.2009.67
– ident: ref12
  doi: 10.1016/B978-155860808-5/50005-8
– ident: ref14
  doi: 10.1016/0167-6423(93)90021-G
– ident: ref61
  doi: 10.2307/2685263
– ident: ref69
  doi: 10.1007/978-3-540-73031-6_27
– ident: ref60
  doi: 10.1109/TSMCA.2010.2087017
SSID ssj0005775
ssib053395008
Score 2.2816775
Snippet Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 661
SubjectTerms Computer models
Educational institutions
Extended Notation
Industrial Survey
Object oriented modeling
Perception
Perceptions
Programming languages
Proposals
Security
Security aspects
Security management
Security Modeling
Semantics
Software engineering
Statecharts
Studies
Subject-Based Experiment
Unified Modeling Language
Title Extending the UML Statecharts Notation to Model Security Aspects
URI https://ieeexplore.ieee.org/document/7042284
https://www.proquest.com/docview/1697515626
https://www.proquest.com/docview/1793269201
Volume 41
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4AJy-iohFFUxMvJi6wj7bbm8RAiBEuQMJtsy3tRcIaWS7-eqfdXTRqjLdNtq90Op1vOi-AW5EazlYh3n6-Zh5KCOGlSigvkNzQELsw994xmbLxInpa0mUN7vexMFpr53ymu_bT2fJXmdrZp7IedwmrojrUUXErYrU-3Tk4p1V-TEpjUZkk-6I3nw2tDxftBqFg1KZR-CKCXE2VHxexky6jJkyqdRVOJS_dXS676v1bysb_LvwIDkuYSQbFuTiGmt6cQLMq4UBKjm7Bw9A9gqP8IogEyWLyTBz8tMFY-ZZMs8JST_KM2KppazIr692RgYvR3J7CYjScP469sqiCpxA75V7A0oAJFZo08g2qv7GUMVeMawSGInLlX1ZSxww5m0aBCQIZCkMD2ddGcLNi4Rk0NtlGnwPRnKaRQQiUcpsDR0kVxX0hUbXlhivfb0Ov2udElRnHbeGLdeI0j75IkDKJpUxSUqYNd_ser0W2jT_atuxG79uVe9yGTkXKpGTHbeIzwRG4MdvrZv8bGclaR9KNznbYhlsoK3CKi99HvoQDO3_hq9uBRv6201eISHJ57Y7iB7j32nc
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGGDhjShPI7EgkbZxYjveQKioQNuFVmKLYtdeqBpE04Vfz9lJCgKE2CLFTiyfz_fZd_cdwIXMrODjCHe_0PAALYQMMi11QJWwLMIu3N939Ae8O4ofntnzElwtcmGMMT74zDTdo_flj3M9d1dlLeEJq-JlWEW7z2iZrfUZ0CEEqxkyGUtk7ZRsy9bwqeOiuFiTRpIzR6TwxQj5qio_tmJvX-42oV-PrAwreWnOC9XU799IG_879C3YqIAmuSlXxjYsmekObNZFHEil07tw3fHX4GjBCGJBMur3iAegLh2rmJFBXvrqSZETVzdtQp6qinfkxmdpzvZgdNcZ3naDqqxCoBE9FQHlGeVSRzaLQ4sH4ESpRGguDEJDGfsCMGNlEo66zWJqKVWRtIyqtrFS2DGP9mFlmk_NARAjWBZbBEGZcCw4Wuk4aUuFh1thhQ7DBrTqeU51xTnuSl9MUn_2aMsUJZM6yaSVZBpwuejxWvJt_NF21030ol01xw04rkWZVgo5S0MuBUI37nqdL16jKjn_SDY1-RzbCAdmJf7i8Pcvn8Fad9jvpb37weMRrLuxlJG7x7BSvM3NCeKTQp36ZfkBTMbdwQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Extending+the+UML+Statecharts+Notation+to+Model+Security+Aspects&rft.jtitle=IEEE+transactions+on+software+engineering&rft.au=El-Attar%2C+Mohamed&rft.au=Luqman%2C+Hamza&rft.au=Karpati%2C+Peter&rft.au=Sindre%2C+Guttorm&rft.date=2015-07-01&rft.issn=0098-5589&rft.eissn=1939-3520&rft.volume=41&rft.issue=7&rft.spage=661&rft.epage=690&rft_id=info:doi/10.1109%2FTSE.2015.2396526&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TSE_2015_2396526
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-5589&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-5589&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-5589&client=summon