{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:59:40Z","timestamp":1725868780831},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319480565"},{"type":"electronic","value":"9783319480572"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_8","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T04:37:01Z","timestamp":1477111021000},"page":"119-140","source":"Crossref","is-referenced-by-count":3,"title":["Security Risk Management in the Aviation Turnaround Sector"],"prefix":"10.1007","author":[{"given":"Raimundas","family":"Matulevi\u010dius","sequence":"first","affiliation":[]},{"given":"Alex","family":"Norta","sequence":"additional","affiliation":[]},{"given":"Chibozur","family":"Udokwu","sequence":"additional","affiliation":[]},{"given":"Rein","family":"N\u00f5ukas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"key":"8_CR1","unstructured":"US Department of Transportation: Aircraft weight and balance handbook (2007). http:\/\/tiny.cc\/m7xkcy"},{"key":"8_CR2","unstructured":"NATA Safety 1st eToolkit (2015). http:\/\/tiny.cc\/5nzkcy"},{"key":"8_CR3","first-page":"734","volume":"36","author":"VU Anton","year":"2014","unstructured":"Anton, V.U., Eduardo, B.F.: An extensible pattern-based library, taxonomy of security threats for distributed systems. Secur. Inf. Syst. Adv. New Challenges 36, 734\u2013747 (2014)","journal-title":"Secur. Inf. Syst. Adv. New Challenges"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Bartelt, C., Rausch, A., Rehfeldt, K.: Quo vadis cyber-physical systems: research areas of cyber-physical ecosystems: a position paper. In: Proceedings of the 1st International Workshop on Control Theory for Software Engineering, CTSE 2015, pp. 22\u201325. ACM, New York (2015)","DOI":"10.1145\/2804337.2804341"},{"key":"8_CR5","volume-title":"The global airline industry","author":"P Belobaba","year":"2015","unstructured":"Belobaba, P., Odoni, A., Barnhart, C.: The global airline industry. Wiley, Chichester (2015)"},{"key":"8_CR6","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/978-3-642-12544-7_16","volume-title":"Intentional Perspectives on Information Systems Engineering","author":"E Dubois","year":"2010","unstructured":"Dubois, E., Heymans, P., Mayer, N., Matulevi\u010dius, R.: A systematic approach to define the domain of information system security risk management. In: Nurcan, S., Salinesi, C., Souveyet, C., Ralyt\u00e9, J. (eds.) Intentional Perspectives on Information Systems Engineering, pp. 289\u2013306. Springer, Heidelberg (2010)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Kutvonen, L., Norta, A., Ruohomaa, S.: Inter-enterprise business transaction management in open service ecosystems. In: 2012 IEEE 16th International on Enterprise Distributed Object Computing Conference (EDOC), pp. 31\u201340. IEEE (2012)","DOI":"10.1109\/EDOC.2012.14"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Leonardi, M., Piracci, E., Galati, G.: Ads-b vulnerability to low cost jammers: risk assessment and possible solutions. In: 2014 Tyrrhenian International Workshop on Digital Communications-Enhanced Surveillance of Aircraft and Vehicles (TIWDC\/ESAV), pp. 41\u201346. IEEE (2014)","DOI":"10.1109\/TIWDC-ESAV.2014.6945445"},{"key":"8_CR9","volume-title":"Socioanalytic Methods: Discovering the Hidden in Organisations and Social Systems","author":"S Long","year":"2013","unstructured":"Long, S.: Socioanalytic Methods: Discovering the Hidden in Organisations and Social Systems. Karnac Books, London (2013)"},{"key":"8_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/978-3-540-69062-7_6","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"Neil Arthur McDougall Maiden","year":"2008","unstructured":"Maiden, Neil Arthur McDougall, Ncube, Cornelius, Lockerbie, James: Inventing Requirements: Experiences with an Airport Operations System. In: Rolland, Colette (ed.) REFSQ 2008. LNCS, vol. 5025, pp. 58\u201372. Springer, Heidelberg (2008)"},{"key":"8_CR11","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.jss.2013.11.1098","volume":"95","author":"F Massacci","year":"2014","unstructured":"Massacci, F., Paci, F., Tedeschi, A.: Assessing a requirements evolution approach: empirical studies in the air traffic management domain. J. Syst. Soft. 95, 70\u201388 (2014)","journal-title":"J. Syst. Soft."},{"key":"8_CR12","unstructured":"Mayer, N.: Model-based management of information system security risk. Ph.D. thesis. University of Namur (2009)"},{"key":"8_CR13","unstructured":"Business Process Model. Notation (bpmn) version 2.0. Object Management Group specification (2011). http:\/\/www.bpmn.org"},{"key":"8_CR14","unstructured":"N\u00f5ukas, R.: Service brokering environment for an airline, (Master Thesis). Tallinn University of Technology (2015)"},{"key":"8_CR15","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-21915-8_1","volume-title":"Perspectives in Business Informatics Research","author":"Alex Norta","year":"2015","unstructured":"Norta, Alex: Creation of Smart-Contracting Collaborations for Decentralized Autonomous Organizations. In: Matulevi\u010dius, Raimundas, Dumas, Marlon (eds.) BIR 2015. LNBIP, vol. 229, pp. 3\u201317. Springer, Heidelberg (2015)"},{"key":"8_CR16","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.datak.2014.04.001","volume":"91","author":"A Norta","year":"2014","unstructured":"Norta, A., Grefen, P., Narendra, N.C.: A reference architecture for managing dynamic inter-organizational business processes. Data Knowl. Eng. 91, 52\u201389 (2014)","journal-title":"Data Knowl. Eng."},{"issue":"1","key":"8_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13174-015-0023-7","volume":"6","author":"A Norta","year":"2015","unstructured":"Norta, A., Ma, L., Duan, Y., Rull, A., K\u00f5lvart, M., Taveter, K.: eContractual choreography-language properties towards cross-organizational business collaboration. J. Internet Serv. Appl. 6(1), 1\u201323 (2015)","journal-title":"J. Internet Serv. Appl."},{"key":"8_CR18","unstructured":"Samar\u00fctel, S., Matulevi\u010dius, R., Norta, A., N\u00f5ukas, R. In: Horkoff, J., Jeusfeld, M., Persson, A. (eds.) The Practice of Enterprise Modeling. LNBIP, vol. 267, 1st edn. Springer, Heidelberg (2016)"},{"issue":"8","key":"8_CR19","doi-asserted-by":"crossref","first-page":"1834","DOI":"10.1109\/JPROC.2012.2235131","volume":"101","author":"K Sampigethaya","year":"2013","unstructured":"Sampigethaya, K., Poovendran, R.: Aviation cyber-physical systems: foundations for future aircraft and air transport. Proc. IEEE 101(8), 1834\u20131855 (2013)","journal-title":"Proc. IEEE"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Shim, W., Massacci, F., Tedeschi, A., Pollini, A.: A relative cost-benefit approach for evaluating alternative airport security policies. In: 2014 Ninth International Conference on Availability, Reliability and Security (ARES), pp. 514\u2013522. IEEE (2014)","DOI":"10.1109\/ARES.2014.76"},{"key":"8_CR21","doi-asserted-by":"crossref","DOI":"10.1002\/0471028959.sof142","volume-title":"Goal Question Metric (GQM) Approach","author":"R Solingen van","year":"2002","unstructured":"van Solingen, R., Basili, V., Caldiera, G., Rombach, H.D.: Goal Question Metric (GQM) Approach. Wiley, New York (2002)"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T22:47:23Z","timestamp":1568501243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}