{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,28]],"date-time":"2024-03-28T00:48:21Z","timestamp":1711586901838},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T00:00:00Z","timestamp":1702425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10207-023-00788-7","type":"journal-article","created":{"date-parts":[[2023,12,13]],"date-time":"2023-12-13T19:02:11Z","timestamp":1702494131000},"page":"1231-1249","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-based multi-organizational cyber risk management framework for collaborative environments"],"prefix":"10.1007","volume":"23","author":[{"given":"Habib","family":"El Amin","sequence":"first","affiliation":[]},{"given":"Lina","family":"Oueidat","sequence":"additional","affiliation":[]},{"given":"Maroun","family":"Chamoun","sequence":"additional","affiliation":[]},{"given":"Abed Ellatif","family":"Samhat","sequence":"additional","affiliation":[]},{"given":"Antoine","family":"Feghali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,13]]},"reference":[{"key":"788_CR1","unstructured":"Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information: Publication : La m\u00e9thode EBIOS Risk Manager - Le guide. Tech. Rep. ANSSI-PA-048-EN, Agence Nationale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information, ANSSI \u2013 51, boulevard de la Tour-Maubourg \u2013 75 700 PARIS 07 S (2019)"},{"key":"788_CR2","unstructured":"Agile risk manager | ebios risk manager software | all4tec. https:\/\/www.all4tec.com\/en\/ebios-risk-manager-certified-solution-agile-risk-manager\/. Accessed on 04-08-2021"},{"key":"788_CR3","doi-asserted-by":"publisher","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., et al.: Hyperledger fabric. Proceedings of the Thirteenth EuroSys Conference (2018). https:\/\/doi.org\/10.1145\/3190508.3190538","DOI":"10.1145\/3190508.3190538"},{"key":"788_CR4","doi-asserted-by":"crossref","unstructured":"Breu, C.S.B.: A framework for the management of intra-organizational security process standardization. Enterprise Interoperability: Interoperability for Agility, Resilience and Plasticity of Collaborations (I-ESA 14 Proceedings) p. 250 (2015)","DOI":"10.1002\/9781119081418.ch35"},{"key":"788_CR5","doi-asserted-by":"crossref","unstructured":"Brunner, M., Mussmann, A., Breu, R.: Introduction of a tool-based continuous information security management system: an exploratory case study. In: 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE (2018). https:\/\/doi.org\/10.1109\/qrs-c.2018.00088","DOI":"10.1109\/QRS-C.2018.00088"},{"key":"788_CR6","doi-asserted-by":"crossref","unstructured":"Brunner, M., Sillaber, C., Breu, R.: Towards automation in information security management systems. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE (2017). https:\/\/doi.org\/10.1109\/qrs.2017.26","DOI":"10.1109\/QRS.2017.26"},{"key":"788_CR7","unstructured":"Bsi-standard 200-2: It-grundschutz-methodology. https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Grundschutz\/International\/bsi-standard-2002_en_pdf.html. (Accessed on 04\/02\/2023)"},{"key":"788_CR8","doi-asserted-by":"crossref","unstructured":"B\u00dcBER, E., \u015eAH\u0130NG\u00d6Z, \u00d6.K.: Blockchain based information sharing mechanism for cyber threat intelligence. Balkan J. Electric. Comput. Eng. 8, 242\u2013253 (2020)","DOI":"10.17694\/bajece.644948"},{"key":"788_CR9","doi-asserted-by":"crossref","unstructured":"Caralli, R., Stevens, J., Young, L., Wilson, W.: Introducing octave allegro: Improving the information security risk assessment process. Tech. Rep. CMU\/SEI-2007-TR-012, Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA (2007). http:\/\/resources.sei.cmu.edu\/library\/asset-view.cfm?AssetID=8419","DOI":"10.21236\/ADA470450"},{"issue":"5","key":"788_CR10","volume":"7","author":"L Cheng","year":"2017","unstructured":"Cheng, L., Liu, F., Yao, D.: Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplin. Rev.: Data Mining and Knowledge Dis. 7(5), e1211 (2017)","journal-title":"Wiley Interdisciplin. Rev.: Data Mining and Knowledge Dis."},{"key":"788_CR11","unstructured":"Cuff, G., Edmonds, J.: Building a secure inter-institutional data sharing platform with blockchain. (2020)"},{"key":"788_CR12","unstructured":"of\u00a0Cybersecurity, L.H.: Risk assessment optimisation with monarc (2022). https:\/\/www.monarc.lu\/publications\/risk-assessment-optimisation-with-monarc\/. Accessed on 25-04-2023"},{"key":"788_CR13","unstructured":"El\u00a0Amin, H.: Risk Management Framework using Blockchain (2022). https:\/\/git.io\/J9Cfu"},{"key":"788_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-018-1883-0","author":"N Elisa","year":"2018","unstructured":"Elisa, N., Yang, L., Chao, F., Cao, Y.: A framework of blockchain-based secure and privacy-preserving e-government system. Wireless Netw. (2018). https:\/\/doi.org\/10.1007\/s11276-018-1883-0","journal-title":"Wireless Netw."},{"key":"788_CR15","doi-asserted-by":"crossref","unstructured":"Giuca, O., Popescu, T.M., Popescu, A.M., Prostean, G., Popescu, D.E.: A survey of cybersecurity risk management frameworks. In: International Workshop Soft Computing Applications, pp. 240\u2013272. Springer (2018)","DOI":"10.1007\/978-3-030-51992-6_20"},{"key":"788_CR16","doi-asserted-by":"crossref","unstructured":"Haji, S., , Tan, Q., Costa, R.S., and: A hybrid model for information security risk assessment. International Journal of Advanced Trends in Computer Science and Engineering pp. 100\u2013106 (2019). 10.30534\/ijatcse\/2019\/1981.12019. https:\/\/doi.org\/10.30534\/ijatcse\/2019\/1981.12019","DOI":"10.30534\/ijatcse\/2019\/1981.12019"},{"key":"788_CR17","doi-asserted-by":"crossref","unstructured":"Huang, Y., Debnath, J., Iorga, M., Kumar, A., Xie, B.: Csat: A user-interactive cyber security architecture tool based on nist-compliance security controls for risk management. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 0697\u20130707. IEEE (2019)","DOI":"10.1109\/UEMCON47517.2019.8993090"},{"key":"788_CR18","doi-asserted-by":"crossref","unstructured":"Hussain, M.A., Abd\u00a0Latiff, M.S., Madni, S.H.H., Rasi, R.Z.R.M., Othman, M.F.I.: Concept of blockchain technology. Int. J. Innovative Comput. 9(2) (2019)","DOI":"10.11113\/ijic.v9n2.238"},{"key":"788_CR19","unstructured":"Hyperledger caliper documentation. https:\/\/hyperledger.github.io\/caliper\/v0.4.2\/getting-started\/. Accessed on 06\/09\/2021"},{"key":"788_CR20","doi-asserted-by":"crossref","unstructured":"IBM: Cost of a data breach report 2021. https:\/\/www.ibm.com\/security\/data-breach(2021). https:\/\/www.ibm.com\/security\/data-breach. IBM Corporation","DOI":"10.1016\/S1361-3723(21)00082-8"},{"key":"788_CR21","doi-asserted-by":"crossref","unstructured":"Imran, S., Hyder, I.: Security issues in databases. In: 2009 Second International Conference on Future Information Technology and Management Engineering, pp. 541\u2013545. IEEE (2009)","DOI":"10.1109\/FITME.2009.140"},{"key":"788_CR22","unstructured":"Initiative, J.T.F.T.: Guide for conducting risk assessments. Tech. Rep. NIST SP 800-30r1, National Institute of Standards and Technology, Gaithersburg, MD (2012). 10.6028\/NIST.SP.800-30r1. https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-30r1.pdf"},{"key":"788_CR23","unstructured":"International Organization for Standardization: Information Technology. Security Techniques. Information Security Risk Management: ISO\/IEC 27005: 2018. International Organization for Standardization (2018)"},{"key":"788_CR24","unstructured":"Ionita, D.: Current established risk assessment methodologies and tools. Master\u2019s thesis, University of Twente (2013)"},{"key":"788_CR25","unstructured":"Information risk assessment methodology 2(iram2) (2021). https:\/\/www.securityforum.org\/solutions-and-insights\/information-risk-assessment-methodology-iram2\/"},{"key":"788_CR26","unstructured":"Eu itsrm, it security risk management methodology v1.2 (2020). https:\/\/ec.europa.eu\/info\/publications\/security-standards-applying-all-europeancommission-information-systems_en"},{"issue":"4","key":"788_CR27","first-page":"760","volume":"16","author":"J Jeong","year":"2020","unstructured":"Jeong, J., Kim, D., Lee, B., Son, Y.: Design and implementation of a digital evidence management model based on hyperledger fabric. J. Inform. Process. Syst. 16(4), 760\u2013773 (2020)","journal-title":"J. Inform. Process. Syst."},{"key":"788_CR28","unstructured":"Lambrinoudakis, C., Gritzalis, S., Xenakis, C., Katsikas, S., Karyda, M., Tsochou, A., Papadatos, K., Rantos, K., Pavlosoglou, Y., Gasparinatos, S., et al.: Compendium of risk management frameworks with potential interoperability: Supplement to the interoperable eu risk management framework report. Athens, Greece, European Union Agency for Cybersecurity (ENISA) (2022)"},{"key":"788_CR29","doi-asserted-by":"crossref","unstructured":"Ma, S., Hao, W., Dai, H.N., Cheng, S., Yi, R., Wang, T.: A blockchain-based risk and information system control framework. In: 2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, pp. 106\u2013113 (2018). https:\/\/doi.org\/10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00031","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00031"},{"key":"788_CR30","unstructured":"McLennan, M.: The global risks report 2021 16th edition (2021)"},{"key":"788_CR31","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review p. 21260 (2008)"},{"key":"788_CR32","unstructured":"Neupart Risk Management. https:\/\/www.neupart.com\/products. Accessed on 04-08-2021"},{"issue":"6","key":"788_CR33","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.ijinfomgt.2010.08.007","volume":"30","author":"S Ozkan","year":"2010","unstructured":"Ozkan, S., Karabacak, B.: Collaborative risk method for information security management practices: a case context within turkey. Int. J. Inf. Manage. 30(6), 567\u2013572 (2010)","journal-title":"Int. J. Inf. Manage."},{"key":"788_CR34","unstructured":"RSA Archer Platform. https:\/\/www.rsa.com\/de-de\/products\/integrated-risk-management\/archer-platform. Accessed on 04-08-2021"},{"issue":"1","key":"788_CR35","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/COMST.2018.2863956","volume":"21","author":"T Salman","year":"2018","unstructured":"Salman, T., Zolanvari, M., Erbad, A., Jain, R., Samaka, M.: Security services using blockchains: a state of the art survey. IEEE Commun. Surv. Tutorials 21(1), 858\u2013880 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"788_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101656","volume":"90","author":"C Schmitz","year":"2020","unstructured":"Schmitz, C., Pape, S.: Lisra: lightweight security risk assessment for decision support in information security. Comput. Security 90, 101656 (2020)","journal-title":"Comput. Security"},{"key":"788_CR37","doi-asserted-by":"crossref","unstructured":"Shalaby, S., Abdellatif, A.A., Al-Ali, A., Mohamed, A., Erbad, A., Guizani, M.: Performance evaluation of hyperledger fabric. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 608\u2013613. IEEE (2020)","DOI":"10.1109\/ICIoT48696.2020.9089614"},{"issue":"2014","key":"788_CR38","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"key":"788_CR39","doi-asserted-by":"publisher","first-page":"6109","DOI":"10.1109\/ACCESS.2018.2888929","volume":"7","author":"P Yuan","year":"2018","unstructured":"Yuan, P., Xiong, X., Lei, L., Zheng, K.: Design and implementation on hyperledger-based emission trading system. IEEE Access 7, 6109\u20136116 (2018)","journal-title":"IEEE Access"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00788-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00788-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00788-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T07:41:50Z","timestamp":1711525310000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00788-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,13]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["788"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00788-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,13]]},"assertion":[{"value":"13 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}