{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T13:51:36Z","timestamp":1750859496553,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678153"},{"type":"electronic","value":"9783319678160"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_1","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T06:43:16Z","timestamp":1505198596000},"page":"3-18","source":"Crossref","is-referenced-by-count":8,"title":["A Proof Calculus for Attack Trees in Isabelle"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kamm\u00fcller","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-642-54792-8_16","volume-title":"Principles of Security and Trust","author":"F Arnold","year":"2014","unstructured":"Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.: Time-dependent analysis of attacks. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 285\u2013305. Springer, Heidelberg (2014). doi:\n10.1007\/978-3-642-54792-8_16"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-319-20376-8_16","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"T Chen","year":"2015","unstructured":"Chen, T., Kamm\u00fcller, F., Nemli, I., Probst, C.W.: A probabilistic analysis framework for malicious insider threats. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 178\u2013189. Springer, Cham (2015). doi:\n10.1007\/978-3-319-20376-8_16"},{"key":"1_CR3","unstructured":"CHIST-ERA. Success: Secure accessibility for the internet of things (2016). \nhttp:\/\/www.chistera.eu\/projects\/success"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1086\/286983","volume":"15","author":"CG Hempel","year":"1948","unstructured":"Hempel, C.G., Oppenheim, P.: Studies in the logic of explanation. Philos. Sci. 15, 135\u2013175 (1948)","journal-title":"Philos. Sci."},{"key":"1_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-319-18467-8_23","volume-title":"ICT Systems Security and Privacy Protection","author":"R Jhawar","year":"2015","unstructured":"Jhawar, R., Kordy, B., Mauw, S., Radomirovi\u0107, S., Trujillo-Rasua, R.: Attack trees with sequential conjunction. In: Federrath, H., Gollmann, D. (eds.) SEC 2015. IFIP AICT, vol. 455, pp. 339\u2013353. Springer, Cham (2015). doi:\n10.1007\/978-3-319-18467-8_23"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/978-3-319-47072-6_13","volume-title":"Data Privacy Management and Security Assurance","author":"F Kamm\u00fcller","year":"2016","unstructured":"Kamm\u00fcller, F.: Isabelle modelchecking for insider threats. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM\/QASA -2016. LNCS, vol. 9963, pp. 196\u2013210. Springer, Cham (2016). doi:\n10.1007\/978-3-319-47072-6_13"},{"key":"1_CR7","unstructured":"Kamm\u00fcller, F.: Isabelle insider framework with Kripke structures, CTL, attack trees and refinement (2017). \nhttps:\/\/www.dropbox.com\/sh\/rx8d09pf31cv8bd\/AAALKtaP8HMX642fi04Og4NLa?dl=0"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F., Kerber, M., Probst, C.: Towards formal analysis of insider threats for auctions. In: 8th ACM CCS International Workshop on Managing Insider Security Threats, MIST 2016. ACM (2016)","DOI":"10.1145\/2995959.2995963"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-39381-0_21","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"F Kamm\u00fcller","year":"2016","unstructured":"Kamm\u00fcller, F., Nurse, J.R.C., Probst, C.W.: Attack tree analysis for insider threats on the IoT using Isabelle. In: Tryfonas, T. (ed.) HAS 2016. LNCS, vol. 9750, pp. 234\u2013246. Springer, Cham (2016). doi:\n10.1007\/978-3-319-39381-0_21"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F., Probst, C.W.: Invalidating policies using structural information. In: IEEE Security and Privacy Workshops (SPW). IEEE (2013)","DOI":"10.1109\/SPW.2013.36"},{"key":"1_CR11","first-page":"534","volume":"11","author":"F Kamm\u00fcller","year":"2017","unstructured":"Kamm\u00fcller, F., Probst, C.W.: Modeling and verification of insider threats using logical analysis. IEEE Syst. J. Special Issue Insider Threats Inf. Secur., Digit. Espionage, Counter Intell. 11, 534\u2013545 (2017)","journal-title":"IEEE Syst. J. Special Issue Insider Threats Inf. Secur., Digit. Espionage, Counter Intell."},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1093\/logcom\/exs029","volume":"24","author":"B Kordy","year":"2014","unstructured":"Kordy, B., Mauw, S., Radomirovic, S., Schweitzer, P.: Attack-defense trees. J. Logic Comput. 24(1), 55\u201387 (2014)","journal-title":"J. Logic Comput."},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cosrev.2014.07.001","volume":"13\u201314","author":"B Kordy","year":"2014","unstructured":"Kordy, B., Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Schweitzer, P.: Dag-based attack and defense modeling: don\u2019t miss the forest for the attack trees. Comput. Sci. Rev. 13\u201314, 1\u201338 (2014)","journal-title":"Comput. Sci. Rev."},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-319-22975-1_11","volume-title":"Formal Modeling and Analysis of Timed Systems","author":"R Kumar","year":"2015","unstructured":"Kumar, R., Ruijters, E., Stoelinga, M.: Quantitative attack tree analysis via priced timed automata. In: Sankaranarayanan, S., Vicario, E. (eds.) FORMATS 2015. LNCS, vol. 9268, pp. 156\u2013171. Springer, Cham (2015). doi:\n10.1007\/978-3-319-22975-1_11"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-319-27810-0_3","volume-title":"Semantics, Logics, and Calculi","author":"CW Probst","year":"2016","unstructured":"Probst, C.W., Kamm\u00fcller, F., Hansen, R.R.: Formal modelling and analysis of\u00a0socio-technical systems. In: Probst, C.W., Hankin, C., Hansen, R.R. (eds.) Semantics, Logics, and Calculi. LNCS, vol. 9560, pp. 54\u201373. Springer, Cham (2016). doi:\n10.1007\/978-3-319-27810-0_3"},{"key":"1_CR16","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"B Schneier","year":"2004","unstructured":"Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley, New York (2004)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,21]],"date-time":"2018-08-21T19:07:12Z","timestamp":1534878432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}