{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:22:45Z","timestamp":1758892965690,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_21","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"233-245","source":"Crossref","is-referenced-by-count":8,"title":["Compositional Security Modelling"],"prefix":"10.1007","author":[{"given":"Tristan","family":"Caulfield","sequence":"first","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Williams","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Beautement, A., et al.: Modelling the Human and Technological Costs and Benefits of USB Memory Stick Security. In: Eric Johnson, M. (ed.) Managing Information Risk and the Economics of Security, pp. 141\u2013163. Springer (2008)","DOI":"10.1007\/978-0-387-09762-6_7"},{"key":"21_CR2","unstructured":"Beres, Y., Pym, D., Shiu, S.: Decision Support for Systems Security Investment. In: Proc. Business-driven IT Management (BDIM). IEEE Xplore (2010)"},{"key":"21_CR3","unstructured":"Bezanson, J., Karpinski, S., Shah, V.B., Edelman, A.: Julia: A fast dynamic language for technical computing. arXiv:1209.5145 (2012)"},{"issue":"3","key":"21_CR4","doi-asserted-by":"publisher","first-page":"623","DOI":"10.3982\/ECTA6248","volume":"77","author":"N. Bloom","year":"2009","unstructured":"Bloom, N.: The impact of uncertainty shocks. Econometrica\u00a077(3), 623\u2013685 (2009)","journal-title":"Econometrica"},{"key":"21_CR5","unstructured":"Collinson, M., Monahan, B., Pym, D.: A Discipline of Mathematical Systems Modelling. College Publications (2012)"},{"key":"21_CR6","unstructured":"Core Gnosis, \n                    \n                      http:\/\/www.hpl.hp.com\/research\/systems_security\/gnosis.html"},{"key":"21_CR7","unstructured":"Coulouris, G., Dollimore, J., Kindberg, T.: Distributed Systems: Concepts and Design, 3rd edn. Addison Wesley (2000)"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/0304-3975(85)90093-3","volume":"37","author":"R. Simone de","year":"1985","unstructured":"de Simone, R.: Higher-level synchronising devices in Meije-SCCS. Theoretical Computer Science\u00a037, 245\u2013267 (1985)","journal-title":"Theoretical Computer Science"},{"issue":"4","key":"21_CR9","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1145\/581271.581274","volume":"5","author":"L.A. Gordon","year":"2002","unstructured":"Gordon, L.A., Loeb, M.P.: The Economics of Information Security Investment. ACM Transactions on Information and Systems Security\u00a05(4), 438\u2013457 (2002)","journal-title":"ACM Transactions on Information and Systems Security"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Heathfield, D.F.: Production Functions. Macmillan Press (1971)","DOI":"10.1007\/978-1-349-01267-1"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/3-540-10003-2_79","volume-title":"Automata, Languages and Programming","author":"M. Hennessy","year":"1980","unstructured":"Hennessy, M., Plotkin, G.: On observing nondeterminism and concurrency. In: de Bakker, J.W., van Leeuwen, J. (eds.) ICALP 1980. LNCS, vol.\u00a085, pp. 299\u2013309. Springer, Heidelberg (1980)"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-03549-4_9","volume-title":"Financial Cryptography and Data Security","author":"C. Ioannidis","year":"2009","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Investments and trade-offs in the economics of information security. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 148\u2013166. Springer, Heidelberg (2009)"},{"issue":"2","key":"21_CR13","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.ejor.2011.05.050","volume":"216","author":"C. Ioannidis","year":"2011","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Information security trade-offs and optimal patching policies. European Journal of Operational Research\u00a0216(2), 434\u2013444 (2011)","journal-title":"European Journal of Operational Research"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Fixed costs, investment rigidities, and risk aversion in information security: A utility-theoretic approach. In: Schneier, B. (ed.) Economics of Security and Privacy III, pp. 171\u2013192. Springer (2012)","DOI":"10.1007\/978-1-4614-1981-5_8"},{"key":"21_CR15","unstructured":"julia, \n                    \n                      http:\/\/julialang.org"},{"key":"21_CR16","unstructured":"Keeney, R.L., Raiffa, H.: Decisions with multiple objectives. Wiley (1976)"},{"issue":"3","key":"21_CR17","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0304-3975(83)90114-7","volume":"25","author":"R. Milner","year":"1983","unstructured":"Milner, R.: Calculi for synchrony and asynchrony. Theoret. Comp. Sci.\u00a025(3), 267\u2013310 (1983)","journal-title":"Theoret. Comp. Sci."},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Milner, R.: The Space and Motion of Communicating Agents. CUP (2009)","DOI":"10.1017\/CBO9780511626661"},{"issue":"2","key":"21_CR19","doi-asserted-by":"publisher","first-page":"215","DOI":"10.2307\/421090","volume":"5","author":"P.W. O\u2019Hearn","year":"1999","unstructured":"O\u2019Hearn, P.W., Pym, D.J.: The logic of bunched implications. Bulletin of Symbolic Logic\u00a05(2), 215\u2013244 (1999)","journal-title":"Bulletin of Symbolic Logic"},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1080\/01621459.1986.10478289","volume":"81","author":"A. Zellner","year":"1986","unstructured":"Zellner, A.: Bayesian prediction and estimation using asymmetric loss functions. Journal of the American Statistical Association\u00a081, 446\u2013451 (1986)","journal-title":"Journal of the American Statistical Association"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:12:28Z","timestamp":1582413148000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_21"}},"subtitle":["Structure, Economics, and Behaviour"],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}