Extending the UML Statecharts Notation to Model Security Aspects
Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective by extending popular modeling notations to model security aspects, there has been little modeling support for state-based views of security i...
Saved in:
Published in | IEEE transactions on software engineering Vol. 41; no. 7; pp. 661 - 690 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.07.2015
IEEE Computer Society |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective by extending popular modeling notations to model security aspects, there has been little modeling support for state-based views of security issues. This paper undertakes a scientific approach to propose a new notational set that extends the UML (Unified Modeling Language) statecharts notation. An online industrial survey was conducted to measure the perceptions of the new notation with respect to its semantic transparency as well as its coverage of modeling state based security aspects. The survey results indicate that the new notation encompasses the set of semantics required in a state based security modeling language and was largely intuitive to use and understand provided very little training. A subject-based empirical evaluation using software engineering professionals was also conducted to evaluate the cognitive effectiveness of the proposed notation. The main finding was that the new notation is cognitively more effective than the original notational set of UML statecharts as it allowed the subjects to read models created using the new notation much quicker. |
---|---|
AbstractList | Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective by extending popular modeling notations to model security aspects, there has been little modeling support for state-based views of security issues. This paper undertakes a scientific approach to propose a new notational set that extends the UML (Unified Modeling Language) statecharts notation. An online industrial survey was conducted to measure the perceptions of the new notation with respect to its semantic transparency as well as its coverage of modeling state based security aspects. The survey results indicate that the new notation encompasses the set of semantics required in a state based security modeling language and was largely intuitive to use and understand provided very little training. A subject-based empirical evaluation using software engineering professionals was also conducted to evaluate the cognitive effectiveness of the proposed notation. The main finding was that the new notation is cognitively more effective than the original notational set of UML statecharts as it allowed the subjects to read models created using the new notation much quicker. |
Author | El-Attar, Mohamed Karpati, Peter Sindre, Guttorm Luqman, Hamza Opdahl, Andreas L. |
Author_xml | – sequence: 1 givenname: Mohamed surname: El-Attar fullname: El-Attar, Mohamed email: melattar@kfupm.edu.sa organization: Inf. & Comput. Sci. Dept., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia – sequence: 2 givenname: Hamza surname: Luqman fullname: Luqman, Hamza email: hluqman@kfupm.edu.sa organization: Inf. & Comput. Sci. Dept., King Fahd Univ. of Pet. & Miner., Dhahran, Saudi Arabia – sequence: 3 givenname: Peter surname: Karpati fullname: Karpati, Peter email: Peter.Karpati@hrp.no organization: Inst. for Energy Technol., Halden, Norway – sequence: 4 givenname: Guttorm surname: Sindre fullname: Sindre, Guttorm email: guttors@idi.ntnu.no organization: Dept. of Comput. & Inf. Sci., Norwegian Univ. of Sci. & Technol., Trondheim, Norway – sequence: 5 givenname: Andreas L. surname: Opdahl fullname: Opdahl, Andreas L. email: Andreas.Opdahl@uib.no organization: Dept. of Inf. Sci. & Media, Univ. of Bergen, Bergen, Norway |
BookMark | eNp9kL1vwjAQxa2qlQq0e6Uukbp0CfVHbMdbEaIfErQDMFuJuZSgEFPbkcp_XyNQB4becjrpvbt7vz66bG0LCN0RPCQEq6fFfDKkmPAhZUpwKi5QjyimUsYpvkQ9jFWecp6ra9T3foMx5lLyHnqe_ARoV3X7lYQ1JMvZNJmHIoBZFy745MPGobZtEmwysytokjmYztVhn4z8DkzwN-iqKhoPt6c-QMuXyWL8lk4_X9_Ho2lqGM1CSkVBhTKsKjJS5bHKMpdGSOBYqkyQPGOrEnKBs5xntKK0ZKritMRQKVmtBBugx-PenbPfHfigt7U30DRFC7bzmkjF4oWIIEofzqQb27k2fqeJUJITLuhhoTiqjLPeO6i0qY9hgyvqRhOsD2B1BKsPYPUJbDTiM-PO1dvC7f-z3B8tNQD8ySXOKI3BfwGCmYMA |
CODEN | IESEDJ |
CitedBy_id | crossref_primary_10_1016_j_cose_2019_101615 crossref_primary_10_1016_j_infsof_2015_10_012 crossref_primary_10_1007_s10270_021_00888_9 crossref_primary_10_1109_TSE_2018_2802910 crossref_primary_10_1002_smr_2667 crossref_primary_10_1016_j_csi_2017_08_002 crossref_primary_10_24017_science_2017_3_23 crossref_primary_10_1016_j_jss_2019_06_096 crossref_primary_10_1109_TSE_2021_3060344 crossref_primary_10_1007_s10270_022_00992_4 crossref_primary_10_1109_TSE_2022_3176725 crossref_primary_10_1108_ICS_11_2018_0132 crossref_primary_10_1007_s13369_019_04067_3 |
Cites_doi | 10.1207/s15516709cog1801_3 10.1109/MSECP.2004.1264860 10.1145/505532.505535 10.1016/j.jvlc.2006.04.006 10.1007/978-3-642-29044-2 10.1007/978-3-642-16782-9_1 10.1023/A:1016344215610 10.1109/2.889093 10.1142/S0218194007003240 10.1145/22949.22950 10.1007/s10270-009-0114-7 10.1016/j.jvlc.2006.04.004 10.1109/ICRE.2003.1232746 10.2307/1267427 10.1007/978-3-642-21640-4_28 10.4018/jdm.2004010103 10.1109/SSIRI.2011.11 10.1016/j.ijhcs.2004.01.003 10.4018/jdm.2008070102 10.1007/978-3-642-14192-8_24 10.1002/col.20594 10.1109/ICRE.2003.1232791 10.1080/07370024.1999.9667269 10.1006/jvlc.1996.0009 10.1007/978-3-642-16782-9_11 10.1145/606658.606659 10.1037/h0043158 10.1049/iet-sen.2010.0038 10.1145/775412.775425 10.1006/ceps.1993.1016 10.1111/j.1467-9280.2006.01759.x 10.1007/s00766-004-0194-4 10.1287/mnsc.43.10.1387 10.1109/38.946634 10.1145/1315245.1315250 10.1002/spip.261 10.1111/j.1551-6708.1987.tb00863.x 10.4018/jisp.2007100101 10.1007/978-3-642-19751-2_6 10.1109/ICSE.2004.1317437 10.1016/S0164-1212(01)00125-X 10.1007/978-3-642-31069-0_5 10.1007/978-1-5041-2919-0_8 10.1109/32.60316 10.1002/spip.150 10.1046/j.1365-2575.1999.00052.x 10.1109/EDOC.2003.1233846 10.1109/TSE.2009.67 10.1016/B978-155860808-5/50005-8 10.1016/0167-6423(93)90021-G 10.2307/2685263 10.1007/978-3-540-73031-6_27 10.1109/TSMCA.2010.2087017 |
ContentType | Journal Article |
Copyright | Copyright IEEE Computer Society Jul 1, 2015 |
Copyright_xml | – notice: Copyright IEEE Computer Society Jul 1, 2015 |
DBID | 97E RIA RIE AAYXX CITATION JQ2 K9. 7SC 7SP 8FD F28 FR3 L7M L~C L~D |
DOI | 10.1109/TSE.2015.2396526 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef ProQuest Computer Science Collection ProQuest Health & Medical Complete (Alumni) Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ANTE: Abstracts in New Technology & Engineering Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef ProQuest Health & Medical Complete (Alumni) ProQuest Computer Science Collection Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace ANTE: Abstracts in New Technology & Engineering Computer and Information Systems Abstracts Professional |
DatabaseTitleList | ProQuest Health & Medical Complete (Alumni) Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1939-3520 |
EndPage | 690 |
ExternalDocumentID | 3748912131 10_1109_TSE_2015_2396526 7042284 |
Genre | orig-research Feature |
GrantInformation_xml | – fundername: King Fahd University of Petroleum and Minerals grantid: IN141010 funderid: 10.13039/501100004055 – fundername: Deanship of Scientific Research funderid: 10.13039/501100004686 |
GroupedDBID | --Z -DZ -~X .4S .DC 0R~ 29I 4.4 5GY 6IK 85S 8R4 8R5 97E AAJGR AARMG AASAJ AAWTH ABAZT ABPPZ ABQJQ ABVLG ACGFO ACGOD ACIWK ACNCT AENEX AGQYO AGSQL AHBIQ AKQYR ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BKOMP BPEOZ CS3 DU5 EBS EDO EJD HZ~ I-F IEDLZ IFIPE IPLJI JAVBF LAI M43 MS~ O9- OCL P2P Q2X RIA RIE RNS RXW S10 TAE TN5 TWZ UHB UPT WH7 YZZ AAYXX ALIPV CITATION RIG JQ2 K9. 7SC 7SP 8FD F28 FR3 L7M L~C L~D |
ID | FETCH-LOGICAL-c324t-26a269c3fa41f8888bb87c67e5079461843dbe86048542f22b39f52b0ef97fd63 |
IEDL.DBID | RIE |
ISSN | 0098-5589 |
IngestDate | Fri Jul 11 01:40:23 EDT 2025 Mon Jun 30 08:51:03 EDT 2025 Thu Apr 24 23:04:21 EDT 2025 Tue Jul 01 01:53:15 EDT 2025 Wed Aug 27 02:47:43 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 7 |
Keywords | subject-based experiment industrial survey Statecharts extended notation security modeling |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/OAPA.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c324t-26a269c3fa41f8888bb87c67e5079461843dbe86048542f22b39f52b0ef97fd63 |
Notes | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-1 ObjectType-Feature-2 content type line 23 |
PQID | 1697515626 |
PQPubID | 21418 |
PageCount | 30 |
ParticipantIDs | proquest_journals_1697515626 proquest_miscellaneous_1793269201 crossref_primary_10_1109_TSE_2015_2396526 crossref_citationtrail_10_1109_TSE_2015_2396526 ieee_primary_7042284 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2015-July-1 2015-7-1 20150701 |
PublicationDateYYYYMMDD | 2015-07-01 |
PublicationDate_xml | – month: 07 year: 2015 text: 2015-July-1 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on software engineering |
PublicationTitleAbbrev | TSE |
PublicationYear | 2015 |
Publisher | IEEE IEEE Computer Society |
Publisher_xml | – name: IEEE – name: IEEE Computer Society |
References | ref57 ref13 ref12 ref59 ref58 ref14 ref53 ref52 ref54 ref10 buhr (ref9) 1998 ref17 lodderstedt (ref46) 2002 ref51 gane (ref22) 1979 blackwell (ref11) 2009 hassan (ref29) 2009 ref45 ref48 ref47 ref41 ref43 jürjens (ref35) 2002 hitchman (ref31) 2002; 9 krsul (ref40) 1998 el-attar (ref18) 2013 ref49 ref8 ref4 ref3 goodman (ref23) 1968 ref6 demarco (ref15) 1979 ref5 røstad (ref62) 2006 siegel (ref67) 1988 sindre (ref70) 2002 ref80 paivio (ref56) 1986 ref79 jürjens (ref34) 2005 ref78 fettke (ref21) 2009; 25 ref37 ref36 ref75 ref74 ref30 ref77 ref33 ref76 ref32 lehmann (ref42) 1998 ref2 ref38 schneier (ref64) 1999 (ref44) 2015 bertin (ref7) 1983 dubois (ref16) 1996 ref71 ref72 ericson (ref19) 1999 (ref73) 2010 fenz (ref20) 2009 ref68 ref24 ref26 ref69 ref25 kordy (ref39) 2011 ref63 ref66 ref65 amoroso (ref1) 1994 ref28 ref27 (ref55) 2011 ref60 ref61 mitnick (ref50) 2009 |
References_xml | – ident: ref80 doi: 10.1207/s15516709cog1801_3 – ident: ref72 doi: 10.1109/MSECP.2004.1264860 – year: 2011 ident: ref55 article-title: Unified modeling language – ident: ref57 doi: 10.1145/505532.505535 – year: 1999 ident: ref64 article-title: Attack trees publication-title: Dr Dobb's J – ident: ref13 doi: 10.1016/j.jvlc.2006.04.006 – ident: ref79 doi: 10.1007/978-3-642-29044-2 – ident: ref37 doi: 10.1007/978-3-642-16782-9_1 – start-page: 1 year: 2002 ident: ref70 article-title: Generalization/specialization as a structuring mechanism for misuse cases publication-title: Proc Symp Requirements Eng for Information Security – ident: ref58 doi: 10.1023/A:1016344215610 – ident: ref2 doi: 10.1109/2.889093 – ident: ref52 doi: 10.1142/S0218194007003240 – year: 2009 ident: ref50 publication-title: The Art of Intrusion The Real Stories Behind the Exploits of Hackers Intruders and Deceivers – ident: ref47 doi: 10.1145/22949.22950 – ident: ref77 doi: 10.1007/s10270-009-0114-7 – ident: ref26 doi: 10.1016/j.jvlc.2006.04.004 – ident: ref45 doi: 10.1109/ICRE.2003.1232746 – ident: ref65 doi: 10.2307/1267427 – year: 1994 ident: ref1 publication-title: Fundamentals of Computer Security Technology – ident: ref63 doi: 10.1007/978-3-642-21640-4_28 – year: 1986 ident: ref56 publication-title: Mental Representations A Dual Coding Approach – year: 1983 ident: ref7 publication-title: Semiology of Graphics Diagrams Networks Maps – ident: ref66 doi: 10.4018/jdm.2004010103 – ident: ref17 doi: 10.1109/SSIRI.2011.11 – volume: 25 start-page: 43 year: 2009 ident: ref21 article-title: How conceptual modeling is used publication-title: Commun Assoc Inf Syst – start-page: 412 year: 2002 ident: ref35 article-title: UMLsec: Extending UML for secure systems development publication-title: Proc 5th Int Conf UML - Unified Model Language – year: 1968 ident: ref23 publication-title: Languages of Art An approach to a theory of symbols – ident: ref59 doi: 10.1016/j.ijhcs.2004.01.003 – start-page: 135 year: 1998 ident: ref9 article-title: Feature-interaction visualisation and resolution in an agent environment publication-title: Proc Feature Interaction in Telecommun and Software Sys VI – ident: ref48 doi: 10.4018/jdm.2008070102 – ident: ref36 doi: 10.1007/978-3-642-14192-8_24 – ident: ref76 doi: 10.1002/col.20594 – ident: ref43 doi: 10.1109/ICRE.2003.1232791 – ident: ref8 doi: 10.1080/07370024.1999.9667269 – year: 2009 ident: ref11 article-title: Cognitive dimensions of notations resource site – year: 2005 ident: ref34 publication-title: Secure Systems Development with UML – start-page: 183 year: 2009 ident: ref20 article-title: Formalizing information security knowledge publication-title: Proc ACM Symp Informa Comput Commun Security – ident: ref27 doi: 10.1006/jvlc.1996.0009 – ident: ref24 doi: 10.1007/978-3-642-16782-9_11 – volume: 9 start-page: 10 year: 2002 ident: ref31 article-title: The details of conceptual modelling notations are important-a comparison of relationship normative language publication-title: Commun Assoc Inf Syst – year: 1998 ident: ref42 publication-title: Nonparametrics Statistical Methods Based on Ranks – start-page: 1 year: 2009 ident: ref29 article-title: Integrating formal analysis and design to preserve security properties publication-title: Proc 42nd Hawaii Int Conf Syst Sci – ident: ref32 doi: 10.1145/606658.606659 – year: 1998 ident: ref40 article-title: Software vulnerability analysis – year: 2013 ident: ref18 article-title: Companion website to security enabled statecharts research – ident: ref49 doi: 10.1037/h0043158 – year: 1979 ident: ref15 publication-title: Structured Analysis and System Specification – year: 1988 ident: ref67 publication-title: Non-Parametric Statistics for the Behavioral Sciences – ident: ref38 doi: 10.1049/iet-sen.2010.0038 – ident: ref6 doi: 10.1145/775412.775425 – ident: ref78 doi: 10.1006/ceps.1993.1016 – ident: ref5 doi: 10.1111/j.1467-9280.2006.01759.x – year: 2015 ident: ref44 – ident: ref68 doi: 10.1007/s00766-004-0194-4 – start-page: 33 year: 2006 ident: ref62 article-title: An extended misuse case notation: Including vulnerabilities and the insider threat publication-title: Proc 19th Working Conf Requirements Eng Foundations for Software Quality – ident: ref25 doi: 10.1287/mnsc.43.10.1387 – ident: ref33 doi: 10.1109/38.946634 – ident: ref4 doi: 10.1145/1315245.1315250 – ident: ref53 doi: 10.1002/spip.261 – ident: ref41 doi: 10.1111/j.1551-6708.1987.tb00863.x – ident: ref30 doi: 10.4018/jisp.2007100101 – start-page: 80 year: 2011 ident: ref39 article-title: Foundations of attack-defense trees publication-title: Formal Aspects of Security and Trust doi: 10.1007/978-3-642-19751-2_6 – ident: ref74 doi: 10.1109/ICSE.2004.1317437 – ident: ref3 doi: 10.1016/S0164-1212(01)00125-X – start-page: 426 year: 2002 ident: ref46 article-title: SecureUML: A UML-based modeling language for model-driven security publication-title: Proc 5th Int Conf UML - Unified Model Language – ident: ref71 doi: 10.1007/978-3-642-31069-0_5 – start-page: 88 year: 1996 ident: ref16 article-title: A framework for dealing with and specifying security requirements in information systems publication-title: Inform Syst Security doi: 10.1007/978-1-5041-2919-0_8 – start-page: 1 year: 1999 ident: ref19 article-title: Fault tree analysis-a history publication-title: Proc 17th Int System Safety Conf – ident: ref75 doi: 10.1109/32.60316 – ident: ref28 doi: 10.1002/spip.150 – year: 2010 ident: ref73 article-title: AndroidOS.FakePlayer description – ident: ref54 doi: 10.1046/j.1365-2575.1999.00052.x – ident: ref10 doi: 10.1109/EDOC.2003.1233846 – year: 1979 ident: ref22 publication-title: Structured Systems Analysis Tools and Techniques – ident: ref51 doi: 10.1109/TSE.2009.67 – ident: ref12 doi: 10.1016/B978-155860808-5/50005-8 – ident: ref14 doi: 10.1016/0167-6423(93)90021-G – ident: ref61 doi: 10.2307/2685263 – ident: ref69 doi: 10.1007/978-3-540-73031-6_27 – ident: ref60 doi: 10.1109/TSMCA.2010.2087017 |
SSID | ssj0005775 ssib053395008 |
Score | 2.2816775 |
Snippet | Model driven security has become an active area of research during the past decade. While many research works have contributed significantly to this objective... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 661 |
SubjectTerms | Computer models Educational institutions Extended Notation Industrial Survey Object oriented modeling Perception Perceptions Programming languages Proposals Security Security aspects Security management Security Modeling Semantics Software engineering Statecharts Studies Subject-Based Experiment Unified Modeling Language |
Title | Extending the UML Statecharts Notation to Model Security Aspects |
URI | https://ieeexplore.ieee.org/document/7042284 https://www.proquest.com/docview/1697515626 https://www.proquest.com/docview/1793269201 |
Volume | 41 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEJ4AJy-iohFFUxMvJi6wj7bbm8RAiBEuQMJtsy3tRcIaWS7-eqfdXTRqjLdNtq90Op1vOi-AW5EazlYh3n6-Zh5KCOGlSigvkNzQELsw994xmbLxInpa0mUN7vexMFpr53ymu_bT2fJXmdrZp7IedwmrojrUUXErYrU-3Tk4p1V-TEpjUZkk-6I3nw2tDxftBqFg1KZR-CKCXE2VHxexky6jJkyqdRVOJS_dXS676v1bysb_LvwIDkuYSQbFuTiGmt6cQLMq4UBKjm7Bw9A9gqP8IogEyWLyTBz8tMFY-ZZMs8JST_KM2KppazIr692RgYvR3J7CYjScP469sqiCpxA75V7A0oAJFZo08g2qv7GUMVeMawSGInLlX1ZSxww5m0aBCQIZCkMD2ddGcLNi4Rk0NtlGnwPRnKaRQQiUcpsDR0kVxX0hUbXlhivfb0Ov2udElRnHbeGLdeI0j75IkDKJpUxSUqYNd_ser0W2jT_atuxG79uVe9yGTkXKpGTHbeIzwRG4MdvrZv8bGclaR9KNznbYhlsoK3CKi99HvoQDO3_hq9uBRv6201eISHJ57Y7iB7j32nc |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGGDhjShPI7EgkbZxYjveQKioQNuFVmKLYtdeqBpE04Vfz9lJCgKE2CLFTiyfz_fZd_cdwIXMrODjCHe_0PAALYQMMi11QJWwLMIu3N939Ae8O4ofntnzElwtcmGMMT74zDTdo_flj3M9d1dlLeEJq-JlWEW7z2iZrfUZ0CEEqxkyGUtk7ZRsy9bwqeOiuFiTRpIzR6TwxQj5qio_tmJvX-42oV-PrAwreWnOC9XU799IG_879C3YqIAmuSlXxjYsmekObNZFHEil07tw3fHX4GjBCGJBMur3iAegLh2rmJFBXvrqSZETVzdtQp6qinfkxmdpzvZgdNcZ3naDqqxCoBE9FQHlGeVSRzaLQ4sH4ESpRGguDEJDGfsCMGNlEo66zWJqKVWRtIyqtrFS2DGP9mFlmk_NARAjWBZbBEGZcCw4Wuk4aUuFh1thhQ7DBrTqeU51xTnuSl9MUn_2aMsUJZM6yaSVZBpwuejxWvJt_NF21030ol01xw04rkWZVgo5S0MuBUI37nqdL16jKjn_SDY1-RzbCAdmJf7i8Pcvn8Fad9jvpb37weMRrLuxlJG7x7BSvM3NCeKTQp36ZfkBTMbdwQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Extending+the+UML+Statecharts+Notation+to+Model+Security+Aspects&rft.jtitle=IEEE+transactions+on+software+engineering&rft.au=El-Attar%2C+Mohamed&rft.au=Luqman%2C+Hamza&rft.au=Karpati%2C+Peter&rft.au=Sindre%2C+Guttorm&rft.date=2015-07-01&rft.issn=0098-5589&rft.eissn=1939-3520&rft.volume=41&rft.issue=7&rft.spage=661&rft.epage=690&rft_id=info:doi/10.1109%2FTSE.2015.2396526&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TSE_2015_2396526 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0098-5589&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0098-5589&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0098-5589&client=summon |