{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T14:58:45Z","timestamp":1725548325922},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642041167"},{"type":"electronic","value":"9783642041174"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-04117-4_1","type":"book-chapter","created":{"date-parts":[[2010,2,22]],"date-time":"2010-02-22T16:44:00Z","timestamp":1266857040000},"page":"3-20","source":"Crossref","is-referenced-by-count":4,"title":["A Framework for System Security"],"prefix":"10.1007","author":[{"given":"Clark","family":"Thomborson","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"S.T. Redwine Jr.: Towards an organization for software system security principles and guidelines, version 1.0., Technical Report 08-01, Institute for Infrastructure and Information Assurance, James Madison University (February 2008)"},{"key":"1_CR2","volume-title":"The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling","author":"R. Jain","year":"1991","unstructured":"R.\u00a0Jain: The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation, and Modeling (John Wiley and Sons, New York 1991)"},{"key":"1_CR3","volume-title":"Code version 2.0","author":"L. Lessig","year":"2006","unstructured":"L.\u00a0Lessig: Code version 2.0 (Basic Books, New York, 2006)"},{"key":"1_CR4","unstructured":"The Open Group: Risk taxonomy, Technical standard C081 (January 2009)"},{"key":"1_CR5","volume-title":"Trust and Power","author":"N. Luhmann","year":"1979","unstructured":"N.\u00a0Luhmann: Trust and Power (John Wiley and Sons, New York 1979), English translation by H. Davis et\u00a0al."},{"key":"1_CR6","unstructured":"M.\u00a0Azuma: SQuaRE: The next generation of the ISO\/IEC 9126 and 14598 international standards series on software product quality, Project Control: Satisfying the Customer (Proc. ESCOM 2001) (Shaker Publishing, 2001) pp. 337\u2013346"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"S.\u00a0Jajodia, P.\u00a0Samarati, V.S.\u00a0Subrahmanian: A logical language for expressing authorizations, IEEE Symposium on Security and Privacy (1997) pp. 31\u201342, 1997","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"1_CR8","volume-title":"The History of Information Security: A Comprehensive Handbook","author":"D. Gollman","year":"2007","unstructured":"D.\u00a0Gollman: Security models. In: The History of Information Security: A Comprehensive Handbook, ed. by K.\u00a0de Leeuw, J.\u00a0Bergstra (Elsevier, Amsterdam 2007)"},{"key":"1_CR9","unstructured":"R.\u00a0O\u2019Brien, C.\u00a0Rogers: Developing applications on LOCK, Proc. 14th National Security Conference, Washington (1991) pp. 147\u2013156"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"C.\u00a0Bettini, S.\u00a0Jajodia, X.S.\u00a0Wang, D.\u00a0Wijesekera: Provisions and obligations in policy management and security applications, Proc. 28th Conf. on Very Large Databases (2002) pp. 502\u2013513","DOI":"10.1016\/B978-155860869-6\/50051-2"},{"issue":"2\/3","key":"1_CR11","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1142\/S0218843005001110","volume":"14","author":"A.D.H. Farrell","year":"2005","unstructured":"A.D.H.\u00a0Farrell, M.J.\u00a0Sergot, M.\u00a0Sall\u00e9, C.\u00a0Bartolini: Using the event calculus for tracking the normative state of contracts, Int. J. Coop. Inf. Syst. 14(2\/3), 99\u2013129 (2005)","journal-title":"Int. J. Coop. Inf. Syst."},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10207-006-0005-7","volume":"5","author":"P. Giorgini","year":"2006","unstructured":"P.\u00a0Giorgini, F.\u00a0Massacci, J.\u00a0Mylopoulos, N.\u00a0Zannone: Requirements engineering for trust management: model, methodology, and reasoning, Int. J. Inf. Secur. 5(4), 257\u2013274 (2006)","journal-title":"Int. J. Inf. Secur."},{"key":"1_CR13","unstructured":"The Jericho Forum: Position paper: Collaboration oriented architectures (April 2008)"}],"container-title":["Handbook of Information and Communication Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04117-4_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T10:57:24Z","timestamp":1619780244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04117-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642041167","9783642041174"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04117-4_1","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}