{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:58:13Z","timestamp":1725555493394},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540890959"},{"type":"electronic","value":"9783540891734"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89173-4_12","type":"book-chapter","created":{"date-parts":[[2010,5,8]],"date-time":"2010-05-08T07:58:06Z","timestamp":1273305486000},"page":"135-148","source":"Crossref","is-referenced-by-count":7,"title":["Using Dependent CORAS Diagrams to Analyse Mutual Dependency"],"prefix":"10.1007","author":[{"given":"Gyrd","family":"Br\u00e6ndeland","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Heidi E. I.","family":"Dahl","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Iselin","family":"Engan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ketil","family":"St\u00f8len","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"12_CR1","first-page":"51","volume-title":"EDOC 2002","author":"J.\u00d8. Aagedal","year":"2002","unstructured":"Aagedal, J.\u00d8., den Braber, F., Dimitrakos, T., Gran, B.A., Raptis, D., St\u00f8len, K.: Model-based risk assessment to improve enterprise security. In: EDOC 2002, pp. 51\u201364. IEEE Computer Society Press, Los Alamitos (2002)"},{"issue":"3","key":"12_CR2","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1145\/203095.201069","volume":"17","author":"M. Abadi","year":"1995","unstructured":"Abadi, M., Lamport, L.: Conjoining specifications. ACM Transactions on programming languages and systems\u00a017(3), 507\u2013534 (1995)","journal-title":"ACM Transactions on programming languages and systems"},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2003.1159030","volume":"20","author":"I.F. Alexander","year":"2003","unstructured":"Alexander, I.F.: Misuse cases: Use cases with hostile intent. IEEE Software\u00a020(1), 58\u201366 (2003)","journal-title":"IEEE Software"},{"key":"12_CR4","unstructured":"Dahl, H.E.I., Hogganvik, I., St\u00f8len, K.: Structured semantics for the CORAS security risk modelling language. Technical Report A970, SINTEF ICT (2007)"},{"key":"12_CR5","first-page":"115","volume-title":"IWPC 2005","author":"I. Hogganvik","year":"2005","unstructured":"Hogganvik, I., St\u00f8len, K.: On the comprehension of security risk scenarios. In: IWPC 2005, pp. 115\u2013124. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"12_CR6","first-page":"13","volume-title":"ISESE 2005","author":"I. Hogganvik","year":"2005","unstructured":"Hogganvik, I., St\u00f8len, K.: Risk analysis terminology for IT systems: Does it match intuition. In: ISESE 2005, pp. 13\u201323. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"12_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1007\/11880240_40","volume-title":"Model Driven Engineering Languages and Systems","author":"I. Hogganvik","year":"2006","unstructured":"Hogganvik, I., St\u00f8len, K.: A graphical approach to risk identification, motivated by empirical investigations. In: Nierstrasz, O., Whittle, J., Harel, D., Reggio, G. (eds.) MoDELS 2006. LNCS, vol.\u00a04199, pp. 574\u2013588. Springer, Heidelberg (2006)"},{"key":"12_CR8","unstructured":"IEC60300. Event Tree Analysis in Dependability management \u2013 Part 3: Application guide \u2013 Section 9: Risk analysis of technological systems (1995)"},{"key":"12_CR9","unstructured":"IEC61025. Fault Tree Analysis (FTA) (1990)"},{"key":"12_CR10","unstructured":"ISO\/IEC 14977:1996(E). Information Technology \u2014 Syntactic Metalanguage \u2014 Extended BNF, 1 edn. (1996)"},{"key":"12_CR11","volume-title":"Object-Oriented Software Engineering. A Use Case Driven Approach","author":"I. Jacobson","year":"1992","unstructured":"Jacobson, I., Christenson, M., Jonsson, P., \u00d6vergaard, G.: Object-Oriented Software Engineering. A Use Case Driven Approach. Addison-Wesley, Reading (1992)"},{"key":"12_CR12","unstructured":"Jones, C.B.: Development Methods for Computer Programmes Including a Notion of Interference. PhD thesis, Oxford University, UK (1981)"},{"key":"12_CR13","volume-title":"Secure Systems Development with UML","author":"J. J\u00fcrjens","year":"2005","unstructured":"J\u00fcrjens, J.: Secure Systems Development with UML. Springer, Heidelberg (2005)"},{"key":"12_CR14","unstructured":"Lamport, L.: How to write a proof. Technical report, Digital Systems Research Center (1993)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D.A., Doser, J.: SecureUML: A UML-based modeling language for model-driven security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"12_CR16","unstructured":"Lund, M.S., Hogganvik, I., Seehusen, F., St\u03c6len, K.: UML profile for security assessment. Technical Report STF40 A03066, SINTEF ICT (2003)"},{"issue":"4","key":"12_CR17","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/TSE.1981.230844","volume":"7","author":"J. Misra","year":"1981","unstructured":"Misra, J., Chandy, K.M.: Proofs of networks of processes. IEEE Transactions on Software Engineering\u00a07(4), 417\u2013426 (1981)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"12_CR18","unstructured":"OMG. Unified Modeling Language Specification, version 2.0 (2004)"},{"key":"12_CR19","unstructured":"OMG. UML Profile for Modeling Quality of Service and Fault Tolerance Characteristics and Mechanisms (2005)"},{"issue":"12","key":"12_CR20","first-page":"21","volume":"24","author":"B. Schneier","year":"1999","unstructured":"Schneier, B.: Attack trees: Modeling security threats. Dr. Dobb\u2019s Journal of Software Tools\u00a024(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s Journal of Software Tools"},{"key":"12_CR21","first-page":"120","volume-title":"TOOLS-PACIFIC 2000","author":"G. Sindre","year":"2000","unstructured":"Sindre, G., Opdahl, A.L.: Eliciting security requirements with misuse cases. In: TOOLS-PACIFIC 2000, pp. 120\u2013131. IEEE Computer Society, Los Alamitos (2000)"},{"key":"12_CR22","unstructured":"Sindre, G., Opdahl, A.L.: Templates for misuse case description. In: REFSQ 2001, pp. 125\u2013136 (2001)"}],"container-title":["Lecture Notes in Computer Science","Critical Information Infrastructures Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89173-4_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T12:17:17Z","timestamp":1619525837000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89173-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540890959","9783540891734"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89173-4_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}