{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:36:26Z","timestamp":1742913386172,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_24","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"339-352","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Formal Modeling and Analysis with Humans in Infrastructures for IoT Health Care Systems"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kamm\u00fcller","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"24_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-319-20376-8_16","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"T Chen","year":"2015","unstructured":"Chen, T., Kamm\u00fcller, F., Nemli, I., Probst, C.W.: A probabilistic analysis framework for malicious insider threats. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 178\u2013189. Springer, Cham (2015). doi:10.1007\/978-3-319-20376-8_16"},{"unstructured":"CHIST-ERA: Success: secure accessibility for the internet of things (2016). http:\/\/www.chistera.eu\/projects\/success","key":"24_CR2"},{"key":"24_CR3","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1086\/286983","volume":"15","author":"CG Hempel","year":"1948","unstructured":"Hempel, C.G., Oppenheim, P.: Studies in the logic of explanation. Philos. Sci. 15, 135\u2013175 (1948)","journal-title":"Philos. Sci."},{"key":"24_CR4","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-319-18467-8_23","volume-title":"ICT Systems Security and Privacy Protection","author":"R Jhawar","year":"2015","unstructured":"Jhawar, R., Kordy, B., Mauw, S., Radomirovi\u0107, S., Trujillo-Rasua, R.: Attack trees with sequential conjunction. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IAICT, vol. 455, pp. 339\u2013353. Springer, Cham (2015). doi:10.1007\/978-3-319-18467-8_23"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-04167-9_9","volume-title":"Formal Methods for Components and Objects","author":"L Henrio","year":"2009","unstructured":"Henrio, L., Kamm\u00fcller, F., Rivera, M.: An asynchronous distributed component model and its semantics. In: Boer, F.S., Bonsangue, M.M., Madelaine, E. (eds.) FMCO 2008. LNCS, vol. 5751, pp. 159\u2013179. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-04167-9_9"},{"unstructured":"Kamm\u00fcller, F.: Isabelle insider framework with attack trees and modelchecking (2016). https:\/\/www.dropbox.com\/sh\/rx8d09pf31cv8bd\/AAALKtaP8HMX642fi04Og4NLa?dl=0","key":"24_CR6"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-319-47072-6_13","volume-title":"Data Privacy Management and Security Assurance","author":"F Kamm\u00fcller","year":"2016","unstructured":"Kamm\u00fcller, F.: Isabelle modelchecking for insider threats. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/QASA -2016. LNCS, vol. 9963, pp. 196\u2013210. Springer, Cham (2016). doi:10.1007\/978-3-319-47072-6_13"},{"doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F., Kerber, M.: Investigating airplane safety and security against insider threats using logical modeling. In: IEEE Security and Privacy Workshops, Workshop on Research in Insider Threats, WRIT 2016. IEEE (2016)","key":"24_CR8","DOI":"10.1109\/SPW.2016.47"},{"doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F., Kerber, M., Probst, C.W.: Towards formal analysis of insider threats for auctions. In: 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2016. ACM (2016)","key":"24_CR9","DOI":"10.1145\/2995959.2995963"},{"key":"24_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-39381-0_21","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"F Kamm\u00fcller","year":"2016","unstructured":"Kamm\u00fcller, F., Nurse, J.R.C., Probst, C.W.: Attack tree analysis for insider threats on the IoT using Isabelle. In: Tryfonas, T. (ed.) HAS 2016. LNCS, vol. 9750, pp. 234\u2013246. Springer, Cham (2016). doi:10.1007\/978-3-319-39381-0_21"},{"issue":"3","key":"24_CR11","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1006269330992","volume":"23","author":"F Kamm\u00fcller","year":"1999","unstructured":"Kamm\u00fcller, F., Paulson, L.C.: A formal proof of sylow\u2019s theorem. J. Autom. Reason. 23(3), 235\u2013264 (1999)","journal-title":"J. Autom. Reason."},{"doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F., Probst, C.W.: Invalidating policies using structural information. In: IEEE Security and Privacy Workshops, Workshop on Research in Insider Threats, WRIT 2013. IEEE (2013)","key":"24_CR12","DOI":"10.1109\/SPW.2013.36"},{"doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F., Probst, C.W.: Combining generated data models with formal invalidation for insider threat analysis. In: IEEE Security and Privacy Workshops, Workshop on Research in Insider Threats, WRIT 2014. IEEE (2014)","key":"24_CR13","DOI":"10.1109\/SPW.2014.45"},{"unstructured":"Kamm\u00fcller, F., Probst, C.W.: Modeling and verification of insider threats using logical analysis. IEEE Syst. J. (2016). Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter Intelligence","key":"24_CR14"},{"key":"24_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2014.07.001","volume":"13\u201314","author":"B Kordy","year":"2014","unstructured":"Kordy, B., Pitre-Cambacds, L., Schweitzer, P.: Dag-based attack and defense modeling: don\u2019t miss the forest for the attack trees. Comput. Sci. Rev. 13\u201314, 1\u201338 (2014)","journal-title":"Comput. Sci. Rev."},{"issue":"1","key":"24_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1093\/logcom\/exs029","volume":"24","author":"B Kordy","year":"2014","unstructured":"Kordy, B., Mauw, S., Radomirovic, S., Schweitzer, P.: Attack-defense trees. J. Logic Comput. 24(1), 55\u201387 (2014). Oxford Journals","journal-title":"J. Logic Comput."},{"doi-asserted-by":"crossref","unstructured":"Kordy, B., Kordy, P., Mauw, S., Schweitzer, P.: ADTool: security analysis with attack-defense trees (extended version). CoRR abs\/1305.6829 (2013). http:\/\/arxiv.org\/abs\/1305.6829","key":"24_CR17","DOI":"10.1007\/978-3-642-40196-1_15"},{"key":"24_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-319-27810-0_3","volume-title":"Semantics, Logics, and Calculi","author":"CW Probst","year":"2016","unstructured":"Probst, C.W., Kamm\u00fcller, F., Hansen, R.R.: Formal modelling and analysis of socio-technical systems. In: Probst, C.W., Hankin, C., Hansen, R.R. (eds.) Semantics, Logics, and Calculi. LNCS, vol. 9560, pp. 54\u201373. Springer, Cham (2016). doi:10.1007\/978-3-319-27810-0_3"},{"key":"24_CR19","volume-title":"Digital Security in a Networked World","author":"B Schneier","year":"2004","unstructured":"Schneier, B., Secrets, L.: Digital Security in a Networked World. Wiley, Hoboken (2004)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:58:10Z","timestamp":1625104690000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}