{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:37Z","timestamp":1725490537717},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540005629"},{"type":"electronic","value":"9783540364658"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36465-x_17","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T09:47:33Z","timestamp":1188294453000},"page":"178-186","source":"Crossref","is-referenced-by-count":7,"title":["Estimating the Cost of Security for COTS Software"],"prefix":"10.1007","author":[{"given":"Donald J.","family":"Reifer","sequence":"first","affiliation":[]},{"given":"Barry W.","family":"Boehm","sequence":"additional","affiliation":[]},{"given":"Murali","family":"Gangadharan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,1,30]]},"reference":[{"unstructured":"Committee on Information Systems Trustworthiness, Trust in Cyberspace. National Academy Press (1999)","key":"17_CR1"},{"unstructured":"Lindqvist, U., and Jonsson, E.: A Map of Security Risks Associated with Using COTS. In: IEEE Computer, June (1998) 60\u201366.","key":"17_CR2"},{"unstructured":"Abts, C., Boehm, B., and Clark, E. B.: COCOTS: A Software COTS-Based System (CBS) Cost Model-Evolving Towards Maintenance Phase Modeling. In: Proceedings of ESCOM (2001)","key":"17_CR3"},{"unstructured":"Boehm, B. W., Abts, C., Brown, A. W., Chulani, S., Clark, B. K., Horowitz, E., Madachy, R., Reifer, D., and Steece, B.: Software Cost Estimation with COCOMO II. Prentice-Hall (2000)","key":"17_CR4"},{"unstructured":"Abts, C., Boehm, B., and Clark, E. B.: COCOTS: A COTS Software Integration and Cost Model-Model Overview and Preliminary Data Findings. In: Proceedings of ESCOM (2000)","key":"17_CR5"},{"unstructured":"Luhn, R., and Spanbauer, S.: Protect Your PC. In: PC World, July (2002) page 92","key":"17_CR6"},{"unstructured":"Mackey, R: Layered Insecurity. Information Security, June (2002) 61\u201368.","key":"17_CR7"},{"unstructured":"Reifer, D. J.: Security: A Rating Concept for COCOMO II. Center for Software Engineering, University of Southern California, May (2002)","key":"17_CR8"},{"unstructured":"Allen, J. H.: The CERT Guide to System and Network Security Practices. Addison-Wesley (2001)","key":"17_CR9"}],"container-title":["Lecture Notes in Computer Science","COTS-Based Software Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36465-X_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,22]],"date-time":"2019-02-22T23:17:19Z","timestamp":1550877439000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36465-X_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540005629","9783540364658"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/3-540-36465-x_17","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}