{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:11:59Z","timestamp":1748664719322,"version":"3.41.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319253596"},{"type":"electronic","value":"9783319253602"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25360-2_9","type":"book-chapter","created":{"date-parts":[[2015,10,7]],"date-time":"2015-10-07T06:23:32Z","timestamp":1444199012000},"page":"103-115","source":"Crossref","is-referenced-by-count":0,"title":["Security and Business Situational Awareness"],"prefix":"10.1007","author":[{"given":"Roland","family":"Rieke","sequence":"first","affiliation":[]},{"given":"Maria","family":"Zhdanova","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Repp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"9_CR1","first-page":"37","volume":"2013","author":"WMP Aalst van der","year":"2013","unstructured":"van der Aalst, W.M.P.: Business process management: a comprehensive survey. ISRN Softw. Eng. 2013, 37 (2013)","journal-title":"ISRN Softw. Eng."},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-35890-6_22","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"W Arsac","year":"2013","unstructured":"Arsac, W., Laube, A., Plate, H.: Policy chain for securing service oriented architectures. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. LNCS, vol. 7731, pp. 303\u2013317. Springer, Heidelberg (2013)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Callau-Zori, M., Jim\u00e9nez-Peris, R., Gulisano, V., Papatriantafilou, M., Fu, Z., Pati\u00f1o Mart\u00ednez, M.: STONE: a Stream-based DDoS defense framework. In: Proceedings of the 28th Annual ACM Symposium on Applied Computing SAC 2013, pp. 807\u2013812. ACM, New York (2013)","DOI":"10.1145\/2480362.2480517"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/978-3-642-41485-5_2","volume-title":"Critical Information Infrastructures Security","author":"L Coppolino","year":"2013","unstructured":"Coppolino, L., D\u2019Antonio, S., Formicola, V., Romano, L.: Enhancing SIEM technology to protect critical infrastructures. In: H\u00e4mmerli, B.M., Kalstad Svendsen, N., Lopez, J. (eds.) CRITIS 2012. LNCS, vol. 7722, pp. 10\u201321. Springer, Heidelberg (2013)"},{"key":"9_CR5","unstructured":"Deming, W.E.: The new economics for industry, government, education \/ W. Edwards Deming, Massachusetts Institute of Technology, Center for Advanced Engineering Study, Cambridge (1993)"},{"key":"9_CR6","unstructured":"Eichler, J., Rieke, R.: Model-based situational security analysis. In: Proceedings of the 6th International Workshop on Models@run.time at the ACM\/IEEE 14th International Conference on Model Driven Engineering Languages and Systems (MODELS 2011), CEUR Workshop Proceedings, vol. 794, pp. 25\u201336. RWTH Aachen (2011)"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1518\/001872095779049543","volume":"37","author":"M Endsley","year":"1995","unstructured":"Endsley, M.: Toward a theory of situation awareness in dynamic systems. Hum. Factors 37(1), 32\u201364 (1995)","journal-title":"Hum. Factors"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-17245-8_4","volume-title":"Architecting Dependable Systems VII","author":"A Fuchs","year":"2010","unstructured":"Fuchs, A., Rieke, R.: Identification of security requirements in systems of systems by functional security analysis. In: Casimiro, A., de Lemos, R., Gacek, C. (eds.) Architecting Dependable Systems VII. LNCS, vol. 6420, pp. 74\u201396. Springer, Heidelberg (2010)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Granadillo, G., Jacob, G., Debar, H., Coppolino, L.: Combination approach to select optimal countermeasures based on the rori index. In: 2012 Second International Conference on Innovative Computing Technology (INTECH), pp. 38\u201345 (2012)","DOI":"10.1109\/INTECH.2012.6457801"},{"key":"9_CR10","first-page":"1","volume-title":"ISSA","author":"F Innerhofer-Oberperfler","year":"2006","unstructured":"Innerhofer-Oberperfler, F., Breu, R.: Using an enterprise architecture for it risk management. In: Eloff, J.H.P., Labuschagne, L., Eloff, M.M., Venter, H.S. (eds.) ISSA, pp. 1\u201312. ISSA, Pretoria (2006)"},{"key":"9_CR11","unstructured":"Iso Iec: ISO\/IEC 27004:2009 - Information technology - Security techniques - Information security management - Measurement (2009)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Kotenko, I., Chechulin, A.: Attack modeling and security evaluation in SIEM systems. In: International Transactions on Systems Science and Applications, vol. 8. SIWN Press, December 2012","DOI":"10.1109\/GreenCom.2012.24"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Lange, M., Mendling, J.: An experts\u2019 perspective on enterprise architecture goals, framework adoption and benefit assessment. In: 2011 15th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), pp. 304\u2013313, August 2011","DOI":"10.1109\/EDOCW.2011.41"},{"key":"9_CR14","unstructured":"Llanes, M., Prieto, E., Diaz, R., Coppolino, L., Sergio, A., Cristaldi, R., Achemlal, M., Gharout, S., Gaber, C., Hutchison, A., Dennie, K.: Scenario requirements (public version). Technical report, FP7-257475 MASSIF European project, April 2011"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-642-23059-2_13","volume-title":"Business Process Management","author":"FM Maggi","year":"2011","unstructured":"Maggi, F.M., Montali, M., Westergaard, M., van der Aalst, W.M.P.: Monitoring business constraints with linear temporal logic: an approach based on colored automata. In: Rinderle-Ma, S., Toumani, F., Wolf, K. (eds.) BPM 2011. LNCS, vol. 6896, pp. 132\u2013147. Springer, Heidelberg (2011)"},{"key":"9_CR16","unstructured":"MASSIF project consortium: Acquisition and evaluation of the results. Deliverable D2.3.3, FP7-257475 MASSIF European project, September 2013"},{"issue":"4","key":"9_CR17","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.csi.2010.01.006","volume":"32","author":"D Mellado","year":"2010","unstructured":"Mellado, D., Blanco, C., S\u00e1nchez, L.E., Fern\u00e1ndez-Medina, E.: A systematic review of security requirements engineering. Comput. Stand. Interfaces 32(4), 153\u2013165 (2010)","journal-title":"Comput. Stand. Interfaces"},{"key":"9_CR18","unstructured":"Nightingale, D.J., Rhodes, D.H.: Enterprise systems architecting: emerging art and science within engineering systems. In: MIT Engineering Systems Symposium, March 2004"},{"key":"9_CR19","first-page":"228","volume-title":"Computer Network Security, Communications in Computer and Information Science","author":"P Ochsenschl\u00e4ger","year":"2007","unstructured":"Ochsenschl\u00e4ger, P., Rieke, R.: Abstraction based verification of a parameterised policy controlled system. In: Gorodetsky, V., Kotenko, I., Skormin, V.A. (eds.) Computer Network Security, Communications in Computer and Information Science, vol. 1, pp. 228\u2013241. Springer, Heidelberg (2007)"},{"key":"9_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3540-6","volume-title":"Software Reliability Methods","author":"DA Peled","year":"2001","unstructured":"Peled, D.A.: Software Reliability Methods, 1st edn. Springer, Heidelberg (2001)","edition":"1"},{"key":"9_CR21","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-642-33448-1_20","volume-title":"Global Security, Safety and Sustainability and e-Democracy","author":"E Prieto","year":"2011","unstructured":"Prieto, E., Diaz, R., Romano, L., Rieke, R., Achemlal, M.: MASSIF: a promising solution to enhance olympic games IT security. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A. (eds.) ICGS3\/e-Democracy 2012. LNICST, vol. 99, pp. 139\u2013147. Springer, Heidelberg (2011)"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-33704-8_15","volume-title":"Computer Network Security","author":"R Rieke","year":"2012","unstructured":"Rieke, R., Coppolino, L., Hutchison, A., Prieto, E., Gaber, C.: Security and reliability requirements for advanced security event management. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 171\u2013180. Springer, Heidelberg (2012)"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Rieke, R., Repp, J., Zhdanova, M., Eichler, J.: Monitoring security compliance of critical processes. In: 2014 22th Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 525\u2013560. IEEE Computer Society, February 2014","DOI":"10.1109\/PDP.2014.106"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Rieke, R., Sch\u00fctte, J., Hutchison, A.: Architecting a security strategy measurement and management system. In: Proceedings of the Workshop on Model-Driven Security MDsec 2012, pp. 2:1\u20132:6. ACM, New York (2012)","DOI":"10.1145\/2422498.2422500"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-642-14706-7_25","volume-title":"Computer Network Security","author":"R Rieke","year":"2010","unstructured":"Rieke, R., Stoynova, Z.: Predictive security analysis for event-driven processes. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol. 6258, pp. 321\u2013328. Springer, Heidelberg (2010)"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Rieke, R., Zhdanova, M., Repp, J., Giot, R., Gaber, C.: Fraud detection in mobile payment utilizing process behavior analysis. In: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), pp. 662\u2013669. IEEE Computer Society (2013)","DOI":"10.1109\/ARES.2013.87"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Schiefer, J., Rozsnyai, S., Rauscher, C., Saurer, G.: Event-driven rules for sensing and responding to business situations. In: Jacobsen, H.A., M\u00fchl, G., Jaeger, M.A. (eds.) DEBS. ACM International Conference Proceeding Series, vol. 233, pp. 198\u2013205. ACM (2007)","DOI":"10.1145\/1266894.1266934"},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-642-33704-8_16","volume-title":"Computer Network Security","author":"J Sch\u00fctte","year":"2012","unstructured":"Sch\u00fctte, J., Rieke, R., Winkelvos, T.: Model-based security event management. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2012. LNCS, vol. 7531, pp. 181\u2013190. Springer, Heidelberg (2012)"},{"key":"9_CR29","doi-asserted-by":"publisher","DOI":"10.1201\/b17776","volume-title":"Enterprise Security Architecture: A Business-Driven Approach","author":"J Sherwood","year":"2005","unstructured":"Sherwood, J., Clark, A., Lynas, D.: Enterprise Security Architecture: A Business-Driven Approach. CMP Books, San Francisco (2005)"},{"issue":"3","key":"9_CR30","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1147\/sj.313.0590","volume":"31","author":"JF Sowa","year":"1992","unstructured":"Sowa, J.F., Zachman, J.A.: Extending and formalizing the framework for information systems architecture. IBM Syst. J. 31(3), 590\u2013616 (1992)","journal-title":"IBM Syst. J."},{"issue":"1","key":"9_CR31","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s10799-007-0024-8","volume":"9","author":"P Tallon","year":"2008","unstructured":"Tallon, P.: Inside the adaptive enterprise: an information technology capabilities perspective on business process agility. Inf. Technol. Manag. 9(1), 21\u201336 (2008)","journal-title":"Inf. Technol. Manag."},{"key":"9_CR32","unstructured":"The Open Group: TOGAF Standard Version 9.1 (2012). http:\/\/pubs.opengroup.org\/architecture\/togaf9-doc\/arch\/ . Accessed 24 May 2015"},{"issue":"2","key":"9_CR33","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1109\/TSC.2010.17","volume":"4","author":"S Tjoa","year":"2011","unstructured":"Tjoa, S., Jakoubi, S., Goluch, G., Kitzler, G., Goluch, S., Quirchmayr, G.: A formal approach enabling risk-aware business process modeling and simulation. IEEE Trans. Serv. Comput. 4(2), 153\u2013166 (2011)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"9_CR34","unstructured":"TOGAF-SABSA Integration WG: TOGAF and SABSA Integration. Whitepaper. The Open Group, The SABSA Institute, October 2011"},{"key":"9_CR35","unstructured":"Verissimo, P., et al.: Massif architecture document. Technical report, FP7-257475 MASSIF European project, April 2012. http:\/\/www.massif-project.eu\/sites\/default\/files\/deliverables\/MASSIF_Architecturedocument_v15_final.zip . Accessed 24 May 2015"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Zhdanova, M., Repp, J., Rieke, R., Gaber, C., Hemery, B.: No smurfs: Revealing fraud chains in mobile money transfers. In: Proceedings of 2014 International Conference on Availability, Reliability and Security, ARES 2014, pp. 11\u201320. IEEE Computer Society (2014)","DOI":"10.1109\/ARES.2014.10"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25360-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T22:55:57Z","timestamp":1748645757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25360-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319253596","9783319253602"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25360-2_9","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}