{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:19:48Z","timestamp":1725812388761},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319135175"},{"type":"electronic","value":"9783319135182"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13518-2_14","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T05:51:00Z","timestamp":1417413060000},"page":"203-218","source":"Crossref","is-referenced-by-count":0,"title":["The Aniketos Design-Time Framework Applied \u2013 A Case in Air Traffic Management"],"prefix":"10.1007","author":[{"given":"St\u00e9phane","family":"Paul","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"Tedeschi","sequence":"additional","affiliation":[]},{"given":"Erlend Andreas","family":"Gj\u00e6re","sequence":"additional","affiliation":[]},{"given":"Ivonne","family":"Herrera","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Deliverables of SESAR Project 08.01.04 \u2013 Aeronautical information (AIS Airport Manning, Airport Network, Terrain and Obstacles)"},{"key":"14_CR2","unstructured":"Deliverables of SESAR Project 08.01.06 \u2013 Information Modelling Meteorological Domain"},{"key":"14_CR3","unstructured":"Deliverables of SESAR Project 08.03.03 \u2013 Identify and Develop Aeronautical Information ATM Services"},{"key":"14_CR4","unstructured":"Deliverables of SESAR Project 09.19 \u2013 SWIM Air-Ground Capability"},{"key":"14_CR5","unstructured":"Deliverables of SESAR Project 09.31 \u2013 Aeronautical databases"},{"key":"14_CR6","unstructured":"Deliverables of SESAR Project 09.48 \u2013 AIS\/MET Serv. & Data Distr."},{"key":"14_CR7","unstructured":"Deliverables of SESAR Project 13.2.2 \u2013 Aeronautical Information Management sub-system definition"},{"key":"14_CR8","unstructured":"Deliverables of SESAR Work Package 14 Projects \u2013 System Wide Information Management (SWIM)"},{"key":"14_CR9","unstructured":"Deliverables of SESAR Project 16.06.02 \u2013 Security support and coordination function"},{"key":"14_CR10","unstructured":"SESAR Joint Undertaking, SESAR Factsheet n\u00b002\/2010, Business Trajectory \/ \u20184D\u2019 Trajectory (2010), \n                    \n                      http:\/\/www.sesarju.eu\/sites\/default\/files\/documents\/reports\/SESAR_Factsheet_4DTrajectory__2_.pdf\n                    \n                    \n                   (accessed June 06, 2014)"},{"key":"14_CR11","unstructured":"Paja, E., et al.: Final version of the socio-technical security modelling language and tool. Deliverable D1.4, FP7 ICT Secure and Trustworthy Composite Services (ANIKETOS) project (Mai 2013)"},{"key":"14_CR12","unstructured":"French national agency for the security of IT systems (ANSSI). Expression of Needs and Identification of Security Objectives (EBIOS), Risk management method (2010)"},{"key":"14_CR13","unstructured":"CRAMM \u2013 the Total Information Security Toolkit, \n                    \n                      http:\/\/www.cramm.com\/"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis \u2013 The CORAS Approach. Springer (2011)","DOI":"10.1007\/978-3-642-12323-8"},{"key":"14_CR15","unstructured":"D\u2019Errico, M., et al.: Final report on Aniketos applied to industrial case studies. Deliverable D6.4, FP7 ICT Secure and Trustworthy Composite Services (ANIKETOS) project (June 2014)"},{"key":"14_CR16","unstructured":"Beck, E., et al.: Results of the final validation and evaluation of the ANIKETOS platform. Deliverable D7.3, FP7 ICT Secure and Trustworthy Composite Services (ANIKETOS) project (June 2014)"}],"container-title":["Lecture Notes in Computer Science","Secure and Trustworthy Service Composition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13518-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T17:00:22Z","timestamp":1559062822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-13518-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319135175","9783319135182"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13518-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}