{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:46:00Z","timestamp":1743126360038,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475744057"},{"type":"electronic","value":"9780387356129"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/978-0-387-35612-9_13","type":"book-chapter","created":{"date-parts":[[2013,3,10]],"date-time":"2013-03-10T20:05:52Z","timestamp":1362945952000},"page":"169-181","source":"Crossref","is-referenced-by-count":5,"title":["The Coras Approach for Model-Based Risk Management Applied to E-Commerce Domain"],"prefix":"10.1007","author":[{"given":"Dimitris","family":"Raptis","sequence":"first","affiliation":[]},{"given":"Theo","family":"Dimitrakos","sequence":"additional","affiliation":[]},{"given":"Bj\u00f8rn Axel","family":"Gran","sequence":"additional","affiliation":[]},{"given":"Ketil","family":"St\u00f8len","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Australian\/New Zealand Standard AS\/NZS 4360:1999: Risk Management."},{"key":"13_CR2","volume-title":"1589 \u20141593","author":"B Barber","year":"1992","unstructured":"Barber, B., Davey, J. The use of the CCTA risk analysis and management methodology CRAMM. Proc. MEDINF092, North Holland, 1589 \u20141593, 1992."},{"issue":"4","key":"13_CR3","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/162124.162127","volume":"25","author":"R Baskerville","year":"1993","unstructured":"R. Baskerville, Information Systems Security Design Methods: Implications for Information Systems Development, ACM Computing Surveys, Vol. 25, No 4, Dec. 1993, pp. 375\u2013414.","journal-title":"ACM Computing Surveys"},{"key":"13_CR4","volume-title":"Information Resources Management Association International Conference","author":"F Braber","year":"2002","unstructured":"den Braber, F., Dimitrakos, T., Gran, B.A., Stolen K., Aagedal, J.Q. Model-based Risk Management using UML and RUP, Issues and Trends of Information Technology Management in Contemporary Organizations 2002, Information Resources Management Association International Conference, May 2002. (To appear)."},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1142\/S0218539394000362","volume":"1","author":"A Bouti","year":"1994","unstructured":"Bouti, A., Ait Kadi, D. A state-of-the-art review of FMEA\/FMECA. International Journal of Reliability, Quality and Safety Engineering 1: 515\u2013543, 1994.","journal-title":"Quality and Safety Engineering"},{"key":"13_CR6","unstructured":"EP\u201327046\u2013ACTIVE, Final Prototype and User Manual,D4.2.2, Ver. 2.0, 2001\u201302\u201322."},{"key":"13_CR7","unstructured":"K. Fu, E. Sit, K. Smith and N. Feamster, Dos and Don\u2019t of Client Authentication on the Web,MIT Technical Report 818, MIT Laboratory for Computer Science, 2001. http:\/\/cookies.lcs.mit.edu\/webauth: tr.pdf"},{"key":"13_CR8","unstructured":"ISO\/IEC 10746 series: 1995 Basic reference model for open distributed processing."},{"key":"13_CR9","unstructured":"ISO\/IEC TR 13335\u20131:2001: Information technology \u2014 Guidelines for the management of IT Security \u2014 Part 1: Concepts and models for IT Security."},{"key":"13_CR10","unstructured":"ISO\/IEC 17799: 2000 Information technology \u2014 Code of practise for information security management."},{"key":"13_CR11","unstructured":"IEC 1025: 1990 Fault tree analysis (FTA)."},{"key":"13_CR12","volume-title":"Addison-Wesley","author":"P Krutchten","year":"1999","unstructured":"Krutchten, P. The Rational unified process, an introduction. Addison-Wesley, 1999."},{"key":"13_CR13","unstructured":"OMG, Unified Modeling Language (UML) Specification,Ver. 1.3, Mar. 2000."},{"key":"13_CR14","unstructured":"OMG, XML Metadata Interchange (XMI) Specification,Ver. 1.1, Nov. 2000."},{"key":"13_CR15","volume-title":"Wiley","author":"F Redmill","year":"1999","unstructured":"Redmill, F., Chudleigh, M., Catmur, J. Hazop and Software Hazop. Wiley, 1999."},{"key":"13_CR16","unstructured":"World Wide Web Consortium, Extensible Markup Language (XML) v1.0,W3C Recommendation, Second Edition, 6 Oct. 2000."}],"container-title":["IFIP Advances in Information and Communication Technology","Advanced Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-35612-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T12:35:06Z","timestamp":1557578106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-35612-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9781475744057","9780387356129"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-35612-9_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2002]]}}}