{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:10:15Z","timestamp":1765887015148},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540441571"},{"type":"electronic","value":"9783540457329"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45732-1_11","type":"book-chapter","created":{"date-parts":[[2007,10,11]],"date-time":"2007-10-11T00:38:56Z","timestamp":1192063136000},"page":"94-105","source":"Crossref","is-referenced-by-count":34,"title":["The CORAS Framework for a Model-Based Risk Management Process"],"prefix":"10.1007","author":[{"given":"Rune","family":"Fredriksen","sequence":"first","affiliation":[]},{"given":"Monica","family":"Kristiansen","sequence":"additional","affiliation":[]},{"given":"Bj\u00f8rn Axel","family":"Gran","sequence":"additional","affiliation":[]},{"given":"Ketil","family":"St\u00f8len","sequence":"additional","affiliation":[]},{"given":"Tom Arthur","family":"Opperud","sequence":"additional","affiliation":[]},{"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,18]]},"reference":[{"key":"11_CR1","unstructured":"CORAS: \u201dA Platform for Risk Analysis of Security Critical Systems\u201d, IST-2000-25031,(2000).( http:\/\/www.nr.no\/coras\/ )"},{"key":"11_CR2","unstructured":"OMG: UML proposal to the Object Management Group(OMG), Version 1.4, 2000."},{"key":"11_CR3","unstructured":"ISO\/IEC 10746: Basic Reference Model of Open Distributed Processing, 1999."},{"key":"11_CR4","unstructured":"AS\/NZS 4360: Risk Management. Australian\/New Zealand Standard 1999."},{"key":"11_CR5","unstructured":"Krutchen, P.: The Rational Unified Process, An Introduction, Addison-Wesley (1999)"},{"key":"11_CR6","unstructured":"W3C: Extensible Markup Language (XML) 1.0 October 2000"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Redmill F., Chudleigh M., Catmur J.: Hazop and Software Hazop, Wiley, 1999.","DOI":"10.1108\/imds.2000.100.1.46.2"},{"key":"11_CR8","volume-title":"Reliability and Risk Assessment","author":"J.D. Andrews","year":"1993","unstructured":"Andrews J.D., Moss, T.R.: Reliability and Risk Assessment, 1st Ed. Longman Group UK, 1993.","edition":"1st Ed."},{"issue":"4","key":"11_CR9","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1142\/S0218539394000362","volume":"1","author":"A. Bouti","year":"1994","unstructured":"Bouti A., Kadi A.D.: A state-of-the-art review of FMEA\/FMECA, International Journal of Reliability, Quality and Safety Engineering, vol. 1,no. 4, pp (515\u2013543), 1994.","journal-title":"Quality and Safety Engineering"},{"issue":"2","key":"11_CR10","doi-asserted-by":"publisher","first-page":"172","DOI":"10.2307\/2346564","volume":"24","author":"B. Littlewood","year":"1975","unstructured":"Littlewood B.: A Reliability Model for Systems with Markov Structure, Appl. Stat., 24(2), pp (172\u2013177), 1975.","journal-title":"Appl. Stat."},{"key":"11_CR11","volume-title":"Human Reliability Analysis: Context and Control","author":"E. Hollnagel","year":"1993","unstructured":"Hollnagel E.: Human Reliability Analysis: Context and Control, Academic press, London, UK, 1993."},{"key":"11_CR12","first-page":"1589","volume-title":"MED-INFO 92","author":"B. Barber","year":"1992","unstructured":"Barber B., Davey J.: Use of the CRAMM in Health Information Systems, MED-INFO 92, ed Lun K.C., Degoulet P., Piemme T. E. and Rienho. O., North Holland Publishing Co, Amsterdam, pp (1589\u20131593), 1992."},{"key":"11_CR13","unstructured":"Henley E. J., and Kumamoto, H.: Probabilistic Risk Assessment and Management for Engineers and Scientists. 2nd Ed. IEEE Press, 1996."},{"key":"11_CR14","volume-title":"The Language Specification \u2014 Version 2.2. Research Report DoC","author":"N. Damianou","year":"2000","unstructured":"Damianou N., Dulay N., Lupu E., and Sloman M.: Ponder: A Language for Specifying Security and Management Policies for Distributed Systems. The Language Specification \u2014 Version 2.2. Research Report DoC 2000\/1, Department of Computing, Imperial College, London, April, 2000. 99"},{"key":"11_CR15","unstructured":"Warmer Jos B., and Kleppe Anneke G.: The Object Constraint Language \u2014 precise modeling with UML. Addison-Wesley, 1999."},{"key":"11_CR16","unstructured":"OMG: Meta Object Facility. Object Management Group(OMG), http:\/\/www.omg.org"},{"key":"11_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/3-540-45416-0_2","volume-title":"SAFECOMP 2001","author":"R. Winther","year":"2001","unstructured":"Winther, Rune et al.: Security Assessments of Safety Critical Systems Using HAZOPs, U. Voges (Ed.): SAFECOMP 2001, LNCS 2187, pp. (14\u201324), 2001, Springer-Verlag Berlin Heidelberg 2001."}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45732-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T11:29:01Z","timestamp":1684063741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45732-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540441571","9783540457329"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/3-540-45732-1_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}