{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:05:44Z","timestamp":1725797144171},"publisher-location":"Boston, MA","reference-count":11,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475780161"},{"type":"electronic","value":"9781402081439"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8143-x_3","type":"book-chapter","created":{"date-parts":[[2005,12,23]],"date-time":"2005-12-23T11:39:43Z","timestamp":1135337983000},"page":"29-45","source":"Crossref","is-referenced-by-count":2,"title":["Security Modelling for Risk Analysis"],"prefix":"10.1007","author":[{"given":"Lam-for","family":"Kwok","sequence":"first","affiliation":[]},{"given":"Dennis","family":"Longley","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"3_CR1","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/162124.162127","volume":"25","author":"R Baskerville","year":"1993","unstructured":"R. Baskerville Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computer Surveys, 25(4) 1993, 375\u2013414.","journal-title":"ACM Computer Surveys"},{"key":"3_CR2","volume-title":"An Open Framework for Risk Management","author":"R Craft","year":"1998","unstructured":"R. Craft, G. Wysss, R. Vandewart and D. Funkhouser. An Open Framework for Risk Management. 21 St National Information Systems Security Conf, 6\u20139 Oct. 1998, Crystal City, Virginia, USA."},{"key":"3_CR3","first-page":"78","volume-title":"Code of Practice: A Standard for Information Security Management","author":"LF Kwok","year":"1997","unstructured":"L. F. Kwok and D. Longley. Code of Practice: A Standard for Information Security Management. Information Security in Research and Business, Proc. IFIP TC11 13\n\n th\n \nInt. Conf. on Information Security (Editors: Yngstrom and Carlsen), IFIP Sec.\u201997, Copenhagen, Denmark, 14\u201316 May 1997, Chapman & Hall 1997, pp.78\u201390."},{"issue":"4","key":"3_CR4","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1108\/09685229710184512","volume":"5","author":"LF Kwok","year":"1997","unstructured":"L. F. Kwok. A Hypertext Information Security Model for Organisations. Information Management and Computer Security, 5 (4) 1997, 138\u2013148.","journal-title":"Information Management and Computer Security"},{"issue":"1","key":"3_CR5","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1108\/09685229910255179","volume":"7","author":"LF Kwok","year":"1999","unstructured":"L. F. Kwok and D. Longley. Information Security Management and Modelling, Information Management and Computer Security, 7(1) 1999, 30\u201339.","journal-title":"Information Management and Computer Security"},{"key":"3_CR6","first-page":"241","volume-title":"Security Modelling for Organisations","author":"A Anderson","year":"1994","unstructured":"A. Anderson, L. F. Kwok and D. Longley. Security Modelling for Organisations. Proc. 2\n\n nd\n \nACM Conf. on Computer and Communications Security, CCS\u201994, Fairfax, Virginia, USA, 2\u20134 Nov 1994, ACM Press 1994, pp.241\u2013250."},{"issue":"8","key":"3_CR7","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1016\/S0167-4048(97)89722-2","volume":"15","author":"LF Kwok","year":"1996","unstructured":"L. F. Kwok and D. Longley. A Security Officer\u2019s Workbench. Computers and Security, 15 (8) 1996, 695\u2013700.","journal-title":"Computers and Security"},{"key":"3_CR8","first-page":"277","volume-title":"A Methodology for Describing Information and Physical Security Architectures","author":"W Caelli","year":"1992","unstructured":"W. Caelli, D. Longley, and A. B. Tickle. A Methodology for Describing Information and Physical Security Architectures. IT Security: The Need for International Cooperation, Proc. IFIP TC11 8\n\n th\n \nInt. Conf. on Information Security (Editors Gable and Caelli), IFIP Sec.\u201992, Singapore, 27\u201329 May 1992, NY:Elsevier Science Publishers 1992, pp.277\u2013296."},{"key":"3_CR9","first-page":"25","volume-title":"ACSW Frontiers 2003","author":"P Fung","year":"2003","unstructured":"P. Fung, L. F. Kwok and D. Longley. Electronic Information Security Documentation. ACSW Frontiers 2003 (Eds. Johnson, Montague and Steketee), Australasian Information Security Workshop (AISW2003), 4\u20137 Feb. 2003, Adelaide, Australia, pp 25\u201331."},{"key":"3_CR10","unstructured":"The Directory, CCITT Rec. X500-X521 ISO\/IEC Standard 9594:1993."},{"key":"3_CR11","volume-title":"PhD thesis, Queensland University of Technology","author":"A Anderson","year":"1997","unstructured":"A. Anderson. The Object Oriented Modelling of Information Systems SecurityRisk, PhD thesis, Queensland University of Technology 1997."}],"container-title":["Security and Protection in Information Processing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8143-X_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,6]],"date-time":"2019-02-06T22:24:51Z","timestamp":1549491891000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8143-X_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781475780161","9781402081439"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8143-x_3","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}