{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:12:49Z","timestamp":1761581569642,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319611754"},{"type":"electronic","value":"9783319611761"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61176-1_14","type":"book-chapter","created":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T01:54:25Z","timestamp":1498010065000},"page":"259-274","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Towards Actionable Mission Impact Assessment in the Context of Cloud Computing"],"prefix":"10.1007","author":[{"given":"Xiaoyan","family":"Sun","sequence":"first","affiliation":[]},{"given":"Anoop","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,22]]},"reference":[{"unstructured":"Proceedings of DARPA Information Survivability Conference and Exposition, Anaheim, California, 12\u201314 June 2001, Volume I & Volume II (2001)","key":"14_CR1"},{"unstructured":"D\u2019Amico, A., Buchanan, L., Goodall, J.: Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions, and users. In: Proceedings of the 5th International Conference on Information Warfare and Security (2010)","key":"14_CR2"},{"key":"14_CR3","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/978-3-319-08624-8_11","volume-title":"Intelligent Methods for Cyber Warfare","author":"J Holsopple","year":"2015","unstructured":"Holsopple, J., Yang, S.J., Sudit, M.: Mission impact assessment for cyber warfare. Intelligent Methods for Cyber Warfare, vol. 563, pp. 239\u2013266. Springer, Cham (2015)"},{"unstructured":"Jakobson, G.: Mission cyber security situation assessment using impact dependency graphs. In: Information Fusion (FUSION) (2011)","key":"14_CR4"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-88313-5_2","volume-title":"Computer Security - ESORICS 2008","author":"RE Sawilla","year":"2008","unstructured":"Sawilla, R.E., Ou, X.: Identifying critical attack assets in dependency attack graphs. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 18\u201334. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-88313-5_2"},{"key":"14_CR6","volume-title":"Evaluating the Impact of Cyber Attacks on Missions","author":"S Musman","year":"2009","unstructured":"Musman, S., Temin, A., Tanner, M., Fox, D., Pridemore, B.: Evaluating the Impact of Cyber Attacks on Missions. MITRE Corporation, Bedford (2009)"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/21.87068","volume":"18","author":"RR Yager","year":"1988","unstructured":"Yager, R.R.: On ordered weighted averaging aggregation operation in multicriteria decision making. IEEE Trans. Syst. Man Cybern. 18, 183\u2013190 (1988)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"doi-asserted-by":"crossref","unstructured":"Ou, X., Boyer, W.F., McQueen, M.A.: A scalable approach to attack graph generation. In: ACM CCS (2006)","key":"14_CR8","DOI":"10.1145\/1180405.1180446"},{"unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: MulVAL: a logic-based network security analyzer. In: USENIX Security (2005)","key":"14_CR9"},{"unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.M.: Automated generation and analysis of attack graphs. In: Security and Privacy (S&P) (2002)","key":"14_CR10"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"189","DOI":"10.3233\/JCS-2002-101-209","volume":"10","author":"CR Ramakrishnan","year":"2002","unstructured":"Ramakrishnan, C.R., Sekar, R.: Model-based analysis of configuration vulnerabilities. J. Comput. Secur. 10, 189\u2013209 (2002)","journal-title":"J. Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Proceedings of Workshop on New Security Paradigms (1998)","key":"14_CR12","DOI":"10.1145\/310889.310919"},{"key":"14_CR13","series-title":"Massive Computing","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_9","volume-title":"Managing Cyber Threats","author":"S Jajodia","year":"2005","unstructured":"Jajodia, S., Noel, S., O\u2019Berry, B.: Topological analysis of network attack vulnerability. In: Kumar, V., Srivastava, J., Lazarevic, A. (eds.) Managing Cyber Threats. Massive Computing, vol. 5. Springer, USA (2005)"},{"doi-asserted-by":"crossref","unstructured":"Ammann, P., Wijesekera, D., Kaushik, S.: Scalable graph-based network vulnerability analysis. In: ACM CCS (2002)","key":"14_CR14","DOI":"10.1145\/586110.586140"},{"doi-asserted-by":"crossref","unstructured":"Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: ACSAC (2006)","key":"14_CR15","DOI":"10.1109\/ACSAC.2006.39"},{"key":"14_CR16","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23829-6_1","volume-title":"International Conference on Security and Privacy in Communication Networks","author":"X Sun","year":"2015","unstructured":"Sun, X., Dai, J., Singhal, A., Liu, P.: Inferring the stealthy bridges between enterprise network islands in cloud using cross-layer Bayesian networks. In: Tian, J., Jing, J., Srivatsa, M. (eds.) International Conference on Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 152. Springer, Cham (2015)"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., et al.: Homealone: co-residency detection in the cloud via side-channel analysis. In: 2011 IEEE Symposium on Security and Privacy. IEEE (2011)","key":"14_CR17","DOI":"10.1109\/SP.2011.31"},{"doi-asserted-by":"crossref","unstructured":"Ristenpart, T., et al.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM (2009)","key":"14_CR18","DOI":"10.1145\/1653662.1653687"},{"doi-asserted-by":"crossref","unstructured":"Younis, Y., Kifayat, K., Merabti, M.: Cache side-channel attacks in cloud computing. In: International Conference on Cloud Security Management (ICCSM) (2014)","key":"14_CR19","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.259"},{"unstructured":"Chen, X., Zhang, M., Mao, Z.M., Bahl, P.: Automating network application dependency discovery: experiences, limitations, and new solutions. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI) (2008)","key":"14_CR20"},{"doi-asserted-by":"crossref","unstructured":"Natarajan, A., Ning, P., Liu, Y., Jajodia, S., Hutchinson, S.E.: NSDMiner: automated discovery of network service dependencies. In: Proceeding of IEEE International Conference on Computer Communications (2012)","key":"14_CR21","DOI":"10.1109\/INFCOM.2012.6195642"},{"unstructured":"Peddycord III, B., Ning, P., Jajodia, S.: On the accurate identification of network service dependencies in distributed systems. In: USENIX Association Proceedings of the 26th International Conference on Large Installation System Administration: Strategies, Tools, and Techniques (2012)","key":"14_CR22"},{"unstructured":"http:\/\/www.graphviz.org\/","key":"14_CR23"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61176-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T15:48:12Z","timestamp":1710344892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-61176-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319611754","9783319611761"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61176-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 June 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Philadelphia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dbsec2017.ittc.ku.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}