{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T06:36:30Z","timestamp":1757313390275,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540231769"},{"type":"electronic","value":"9783540301387"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30138-7_26","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:10:34Z","timestamp":1284855034000},"page":"311-324","source":"Crossref","is-referenced-by-count":19,"title":["An Approach for Model-Based Risk Assessment"],"prefix":"10.1007","author":[{"given":"Bj\u00f8rn Axel","family":"Gran","sequence":"first","affiliation":[]},{"given":"Rune","family":"Fredriksen","sequence":"additional","affiliation":[]},{"given":"Atoosa P. -J.","family":"Thunem","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Thunem, A.P.-J.: Modelling of Knowledge Intensive Computerised Systems Based on Capability-Oriented Agent Theory (COAT). In: Proc. International IEEE Conference on Integration of Knowledge Intensive Multi-Agent Systems, IEEE-KIMAS 2003, Cambridge (MA), USA, pp. 58\u201363 (2003)","DOI":"10.1109\/KIMAS.2003.1245022"},{"issue":"5","key":"26_CR2","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/21.376495","volume":"25","author":"C.J. Garrett","year":"1985","unstructured":"Garrett, C.J., Guarro, S.B., Apostolakis, G.E.: The dynamic flow graph methodology for assessing the dependability of embedded software systems. IEEE Trans. on Systems, Man, and Cybernetics\u00a025(5), 824\u2013840 (1985)","journal-title":"IEEE Trans. on Systems, Man, and Cybernetics"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Jalashgar, A., Thunem, A.P.-J.: A Cognitive and Formal Terminology for Descriptive Parameters in Concurrent Real-Time Distributed Software Systems, ch. 2, Part 3. In: Soft Computing for Risk Evaluation and Management, pp. 229\u2013248. Physica Verlag Publisher (2001)","DOI":"10.1007\/978-3-7908-1814-7_13"},{"key":"26_CR4","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1002\/(SICI)1098-111X(199802\/03)13:2\/3<159::AID-INT4>3.0.CO;2-Z","volume":"13","author":"A. Jalashgar","year":"1998","unstructured":"Jalashgar, A., Thunem, A.P.-J.: Identification of Hidden Failures in Process Control Systems Based on the HMG Method. International Journal of Intelligent Systems\u00a013, 159\u2013179 (1998)","journal-title":"International Journal of Intelligent Systems"},{"key":"26_CR5","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/0029-5493(87)90304-9","volume":"104","author":"I.S. Kim","year":"1987","unstructured":"Kim, I.S., Modarres, M.: Application of Goal Tree-Success Tree Model as the Knowledge- Base of Operator Advisory System. Nuclear Engineering & Design J.\u00a0104, 67\u201381 (1987)","journal-title":"Nuclear Engineering & Design J."},{"key":"26_CR6","unstructured":"CORAS: A Platform for Risk Analysis of Security Critical systems, IST-2000-25031 (2000), http:\/\/coras.sourceforge.net\/"},{"key":"26_CR7","unstructured":"Fredriksen, R., Gran, B.A., St\u00f8len, K., Djordjevic, I.: Experiences from application of model-based risk assessment. In: Swets, Zeitlinger (eds.) Proc. European Conference on Safety and Reliability (ESREL 2003), vol.\u00a01, pp. 643\u2013648 (2003)"},{"key":"26_CR8","volume-title":"Hazop and Software Hazop","author":"F. Redmill","year":"1999","unstructured":"Redmill, F., Chudleigh, M., Catmur, J.: Hazop and Software Hazop. Wiley & Sons, Chichester (1999)"},{"key":"26_CR9","volume-title":"Reliability and Risk Assessment","author":"J.D. Andrews","year":"1993","unstructured":"Andrews, J.D., Moss, T.R.: Reliability and Risk Assessment, 1st edn. Longman Group, UK (1993)","edition":"1"},{"issue":"4","key":"26_CR10","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1142\/S0218539394000362","volume":"1","author":"A. Bouti","year":"1994","unstructured":"Bouti, A., Kadi, A.D.: A state-of-the-art review of FMEA\/FMECA. International Journal of Reliability, Quality and Safety Engineering\u00a01(4), 515\u2013543 (1994)","journal-title":"International Journal of Reliability, Quality and Safety Engineering"},{"issue":"2","key":"26_CR11","doi-asserted-by":"publisher","first-page":"172","DOI":"10.2307\/2346564","volume":"24","author":"B. Littlewood","year":"1975","unstructured":"Littlewood, B.: A Reliability Model for Systems with Markov Structure. Applied Statistics\u00a024(2), 172\u2013177 (1975)","journal-title":"Applied Statistics"},{"key":"26_CR12","first-page":"1589","volume-title":"MEDINFO 1992","author":"B. Barber","year":"1992","unstructured":"Barber, B., Davey, J.: Use of the CRAMM in Health Information Systems. In: Lun, K.C., Degoulet, P., Piemme, T.E., Rienhoff, O. (eds.) MEDINFO 1992, pp. 1589\u20131593. North Holland Publishing Co., Amsterdam (1992)"},{"key":"26_CR13","unstructured":"OMG. Unified Modeling Language specification. Version 1.4 (2001)"},{"key":"26_CR14","unstructured":"Houmb, S.-H., den Braber, F., Lund, M.S., St\u00f8len, K.: Towards a UML profile for modelbased risk assessment. In: Proc. UML 2002 Satellite Workshop on Critical Systems Development with UML, Munich University of Technology, pp. 79\u201391 (2002)"},{"key":"26_CR15","unstructured":"Contribution in response to request for proposals for UML Profile for Modelling Quality of Service and Fault Tolerance Characteristics and Mechanisms issued by the Object Management Group. Submitted by SINTEF in collaboration with OpenIT, September 9, 2002. Resubmitted in revised form, May and (August 2003)"},{"key":"26_CR16","unstructured":"Australian Standard: Risk Management. AS\/NZS 4360:1999. Strathfield: Standards Australia (1999)"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/3-540-45416-0_2","volume-title":"Computer Safety, Reliability and Security","author":"R. Winther","year":"2001","unstructured":"Winther, R., Johnsen, O.A., Gran, B.A.: Security Assessments of Safety Critical Systems Using HAZOPs. In: Voges, U. (ed.) SAFECOMP 2001. LNCS, vol.\u00a02187, pp. 14\u201324. Springer, Heidelberg (2001)"},{"key":"26_CR18","first-page":"206","volume-title":"Proc. Medical Informatics Europe (MIE 2003)","author":"Y. Stamatiou","year":"2003","unstructured":"Stamatiou, Y., et al.: The CORAS approach for model-based risk management applied to a telemedicine service. In: Proc. Medical Informatics Europe (MIE 2003), pp. 206\u2013211. IOS Press, Amsterdam (2003)"},{"key":"26_CR19","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-0-387-35612-9_13","volume-title":"Proc. Communication and Multimedia Security (CMS 2002)","author":"D. Raptis","year":"2002","unstructured":"Raptis, D., Dimitrakos, T., Gran, B.A., St\u00f8len, K.: The CORAS Approach for Modelbased Risk Management applied to e-Commerce Domain. In: Proc. Communication and Multimedia Security (CMS 2002), pp. 169\u2013181. Kluwer, Dordrecht (2002)"},{"key":"26_CR20","unstructured":"SECURIS, Model-driven development and analysis of secure information systems, Research Council of Norway 152839\/220"},{"key":"26_CR21","unstructured":"IEC 61508: Functional Safety of Electrical\/Electronic\/Programmable Electronic Safety- Related (E\/E\/PE) Systems, 1998-2000"},{"key":"26_CR22","volume-title":"Software Safety and Reliability","author":"D.S. Herrmann","year":"1999","unstructured":"Herrmann, D.S.: Software Safety and Reliability. IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"den Braber, F., Dimitrakos, T., Gran, B.A., Soldal Lund, M., St\u00f8len, K., Aagedal, J.\u00d8.: UML and the Unified Process. In: Favre, L. (ed.) The CORAS methodology: Model-based risk assessment using UML and UP, pp. 332\u2013357. IRM Press (2003)","DOI":"10.4018\/978-1-93177-744-5.ch017"},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-540-39878-3_16","volume-title":"Computer Safety, Reliability, and Security","author":"J. G\u00f3rski","year":"2003","unstructured":"G\u00f3rski, J., Jarzebowicz, A., Leszczyna, R., Miler, J., Olszewski, M.E.: An approach to trust case development. In: Anderson, S., Felici, M., Littlewood, B. (eds.) SAFECOMP 2003. LNCS, vol.\u00a02788, pp. 193\u2013206. Springer, Heidelberg (2003)"},{"key":"26_CR25","first-page":"120","volume-title":"Proc. TOOLS_PACIFIC 2000","author":"G. Sindre","year":"2000","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements by misuse cases. In: Proc. TOOLS_PACIFIC 2000, pp. 120\u2013131. IEEE Computer Society Press, Los Alamitos (2000)"},{"key":"26_CR26","unstructured":"St\u00f8len, K., den Braber, F., Fredriksen, R., Gran, B.A., Houmb, S.H., Soldal Lund, M., Stamatiou, Y.C., Aagedal, J.\u00d8.: Model-based risk assessment - the CORAS approach. In: Proc. Norsk Informatikkkonferanse (NIK 2002), Tapir, pp. 239\u2013249 (2002)"},{"key":"26_CR27","unstructured":"Thunem, A.P.-J., Fredriksen, R., Gran, B.A.: An Information Retrieval Terminology for Model-Based Risk Assessment. Paper to appear in proceedings from ESREL\/PSAM7, Berlin (2004)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30138-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T22:37:11Z","timestamp":1740523031000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30138-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540231769","9783540301387"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30138-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}