{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:42:46Z","timestamp":1725471766191},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540478201"},{"type":"electronic","value":"9783540478232"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11909033_21","type":"book-chapter","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T14:51:56Z","timestamp":1160578316000},"page":"228-239","source":"Crossref","is-referenced-by-count":4,"title":["Information Modeling for Automated Risk Analysis"],"prefix":"10.1007","author":[{"given":"Howard","family":"Chivers","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Information Security Management Part 2 Specification for information security management systems, British Standards Institution, BS 7799-2 (1999)"},{"key":"21_CR2","unstructured":"Risk Management Guide for Information Technology Systems, National Institute of Standards and Technology (NIST), SP 800-30 (January 2002) (accessed January 2006), http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-30\/sp800-30.pdf"},{"issue":"9","key":"21_CR3","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1002\/spe.693","volume":"35","author":"H. Chivers","year":"2005","unstructured":"Chivers, H., Fletcher, M.: Applying Security Design Analysis to a Service Based System. Software Practice and Experience: Special Issue on Grid Security\u00a035(9), 873\u2013897 (2005)","journal-title":"Software Practice and Experience: Special Issue on Grid Security"},{"key":"21_CR4","first-page":"114","volume-title":"Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW 2005)","author":"H. Chivers","year":"2005","unstructured":"Chivers, H., Jacob, J.: Specifying Information-Flow Controls. In: Proceedings of the Second International Workshop on Security in Distributed Computing Systems (SDCS) (ICDCSW 2005), pp. 114\u2013120. IEEE Computer Society, Columbus, Ohio, USA (2005)"},{"key":"21_CR5","unstructured":"Chivers, H.: Security Design Analysis, Thesis at Department of Computer Science, The University of York, York, UK, accessed July 2006, p. 484 (2006), available online at: http:\/\/www.cs.york.ac.uk\/ftpdir\/reports\/YCST-2006-06.pdf"},{"issue":"4","key":"21_CR6","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/162124.162127","volume":"25","author":"R. Baskerville","year":"1993","unstructured":"Baskerville, R.: Information Systems Security Design Methods: Implications for Information Systems Development. ACM Computing Surveys\u00a025(4), 375\u2013414 (1993)","journal-title":"ACM Computing Surveys"},{"key":"21_CR7","unstructured":"CRAMM Risk Assessment Tool Overview, Insight Consulting Limited (accessed May 2005), available at: http:\/\/www.cramm.com\/riskassesment.htm"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Dimitrakos, T., Raptis, D., Ritchie, B., St\u00f8len, K.: Model-Based Security Risk Analysis for Web Applications: The CORAS approach. In: Proceedings of the EuroWeb 2002, (accessed January 2006) (Electronic Workshops in Computing). British Computer Society, St Anne\u2019s College, Oxford, UK (2002), available on-line at: http:\/\/ewic.bcs.org\/conferences\/2002\/euroweb\/index.htm","DOI":"10.14236\/ewic\/EW2002.6"},{"key":"21_CR9","unstructured":"Swiderski, F. and Snyder, W., Threat Modelling. Microsoft Professional. 2004: Microsoft Press."},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/3-540-45314-8_14","volume-title":"Fundamental Approaches to Software Engineering","author":"J. J\u00fcrjens","year":"2001","unstructured":"J\u00fcrjens, J.: Towards Development of Secure Systems Using UMLsec. In: Hussmann, H. (ed.) FASE 2001. LNCS, vol.\u00a02029, p. 187. Springer, Heidelberg (2001)"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-540-30078-6_11","volume-title":"Electronic Government","author":"C. Kalloniatis","year":"2004","unstructured":"Kalloniatis, C.: Security Requirements Engineering for e-Government Applications: Analysis of Current Frameworks. In: Traunm\u00fcller, R. (ed.) EGOV 2004. LNCS, vol.\u00a03183, pp. 66\u201371. Springer, Heidelberg (2004)"},{"key":"21_CR12","first-page":"20","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"M. Schaefer","year":"1989","unstructured":"Schaefer, M.: Symbol Security Condition Considered Harmful. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 20\u201346. IEEE Computer Society, Oakland, CA (1989)"},{"key":"21_CR13","unstructured":"Mayfield, T., Roskos, J.E., Welke, S.R., Boone, J.M.: Integrity in Automated Information Systems, National Computer Security Center (NCSC), Technical Report 79-91 (accessed January 2006), http:\/\/www.radium.ncsc.mil\/tpep\/library\/rainbow\/C-TR-79-91.txt"},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1109\/SECPRI.1989.36298","volume-title":"Proceedings of the 1989 IEEE Symposium on Security and Privacy","author":"J.L. Jacob","year":"1989","unstructured":"Jacob, J.L.: On The Derivation of Secure Components. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 242\u2013247. IEEE Computer Society, Los Alamitos (1989)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11909033_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,18]],"date-time":"2020-04-18T14:40:02Z","timestamp":1587220802000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11909033_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540478201","9783540478232"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11909033_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}