{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T16:54:19Z","timestamp":1771692859206,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540223795","type":"print"},{"value":"9783540278009","type":"electronic"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-27800-9_34","type":"book-chapter","created":{"date-parts":[[2010,9,5]],"date-time":"2010-09-05T19:00:38Z","timestamp":1283713238000},"page":"391-401","source":"Crossref","is-referenced-by-count":12,"title":["Information Security Risk Assessment, Aggregation, and Mitigation"],"prefix":"10.1007","author":[{"given":"Arjen","family":"Lenstra","sequence":"first","affiliation":[]},{"given":"Tim","family":"Voss","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Basel Committee\u2019s Risk Management Conference on Leading Edge Issues in Operational Risk Management, New York, May 29-30 (2003), Presentations available from \n                    \n                      www.newyorkfed.org\/pihome\/news\/speeches\/2003\/con052903.html"},{"key":"34_CR2","volume-title":"Risk Management, value at risk and beyond","author":"P. Embrechts","year":"2002","unstructured":"Embrechts, P., McNeil, A., Straumann, D.: Correlation and dependence in risk management: properties and pitfalls. In: Dempster, M.A.H. (ed.) Risk Management, value at risk and beyond, August 1999, ch.\u00a07, Cambridge University Press, Cambridge (January 2002)"},{"key":"34_CR3","unstructured":"National institute of standards and technology, Guideline for automatic data processing risk analysis, FIPS PUB 65 (August 1979)"},{"key":"34_CR4","unstructured":"Pisinger, D.: A minimal algorithm for the multiple-choice knapsack problem. Technical report 94\/25, DIKU, University of Kopenhagen, Denmark, available from \n                    \n                      www.diku.dk\/~pisinger"},{"key":"34_CR5","unstructured":"Voss, T.: A simple one-dimensional quantitative risk assessment model, v. 1.4, internal Citigroup Information Security Office document (February 2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-27800-9_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T17:37:47Z","timestamp":1558287467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-27800-9_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540223795","9783540278009"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-27800-9_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}