{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:28:30Z","timestamp":1725542910526},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642115295"},{"type":"electronic","value":"9783642115301"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11530-1_12","type":"book-chapter","created":{"date-parts":[[2010,1,6]],"date-time":"2010-01-06T23:20:06Z","timestamp":1262820006000},"page":"102-110","source":"Crossref","is-referenced-by-count":0,"title":["A Security Architecture to Protect Against Data Loss"],"prefix":"10.1007","author":[{"given":"Clive","family":"Blackwell","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"McAfee, Unsecured economies: protecting vital information (2009), http:\/\/resources.mcafee.com\/content\/NAUnsecuredEconomiesReport"},{"key":"12_CR2","unstructured":"Ponemon Institute. 2008 Annual Survey: Cost of a Data Breach (February 2009), www.encryptionreports.com\/download\/Ponemon_COB_2008_US_090201.pdf"},{"key":"12_CR3","unstructured":"Blackwell, C.: Data Loss: the Essentials (September 2009), IT Governance at www.itgovernance.co.uk or www.27001.com"},{"key":"12_CR4","volume-title":"Data Leaks for Dummies","author":"G. Bunker","year":"2009","unstructured":"Bunker, G., Fraser-King, G.: Data Leaks for Dummies. Wiley, Chichester (2009)"},{"key":"12_CR5","unstructured":"Neumann, P.G., Parker, D.: A Summary of Computer Misuse Techniques. In: Proceedings of the 12th National Computer Security Conference (1989)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Neumann, P.G.: Practical Architectures for Survivable Systems and Networks. SRI International (2000), www.csl.sri.com\/neumann\/survivability.pdf","DOI":"10.21236\/ADA368944"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Searle, J.R.: Minds, Brains, and Programs, from The Behavioral and Brain Sciences, vol.\u00a03. Cambridge University Press, Cambridge (1980), http:\/\/web.archive.org\/web\/20071210043312\/http:\/\/members.aol.com\/NeoNoetics\/MindsBrainsPrograms.html","DOI":"10.1017\/S0140525X00005756"},{"key":"12_CR8","unstructured":"Howard, J.D.: An analysis of security incidents on the Internet 1989-1995. Carnegie Mellon University (1997), www.cert.org\/archive\/pdf\/JHThesis.pdf"},{"key":"12_CR9","unstructured":"Howard, J.D., Longstaff, T.A.: A common language for computer security incidents. Sandia National Laboratories (1998), www.sandia.gov"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Blackwell, C.: The insider threat: Combating the enemy within (2009), IT Governance at www.itgovernance.co.uk or www.27001.com","DOI":"10.2307\/j.ctt5hh7t8"},{"key":"12_CR11","unstructured":"Blackwell, C.: A Security Architecture to Model Destructive Insider Attacks. In: 8th European conference on information warfare. Academic Publishing Ltd. (2009)"},{"key":"12_CR12","unstructured":"Howard, M.: Attack surface: mitigate security risks by minimizing the code you expose to untrusted users. MSDN Magazine (November 2004), http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc163882.aspx"},{"key":"12_CR13","unstructured":"MSNBC. T.J. Maxx data theft worse than first reported (29 March 2007) MSNBC at: www.msnbc.msn.com\/id\/17853440"},{"key":"12_CR14","unstructured":"Poynter, K.: Review of information security at HM Revenue and Customs. HMSO (2008), www.hm-treasury.gov.uk\/d\/poynter_review250608.pdf"},{"key":"12_CR15","volume-title":"4th Cybersecurity Information Intelligence Research Workshop","author":"C. Blackwell","year":"2008","unstructured":"Blackwell, C.: A Multi-layered Security Architecture for Modelling Complex Systems. In: 4th Cybersecurity Information Intelligence Research Workshop. ACM Press, New York (2008)"},{"key":"12_CR16","volume-title":"1st ACM conference on computer and communications security","author":"R. Anderson","year":"1993","unstructured":"Anderson, R.: Why cryptosystems fail. In: 1st ACM conference on computer and communications security. ACM Press, New York (1993)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Information Security and Digital Forensics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11530-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,22]],"date-time":"2024-03-22T11:01:38Z","timestamp":1711105298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11530-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642115295","9783642115301"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11530-1_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}