{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T19:20:43Z","timestamp":1769973643021,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642136771","type":"print"},{"value":"9783642136788","type":"electronic"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13678-8_4","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T01:18:48Z","timestamp":1277169528000},"page":"135-167","source":"Crossref","is-referenced-by-count":24,"title":["Performance and Security Tradeoff"],"prefix":"10.1007","author":[{"given":"Katinka","family":"Wolter","sequence":"first","affiliation":[]},{"given":"Philipp","family":"Reinecke","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Series in Parallel Computing","volume-title":"Modelling with Generalized Stochastic Petri Nets","author":"M.A. Marsan","year":"1995","unstructured":"Marsan, M.A., Balbo, G., Conte, G., Donatelli, S.: Modelling with Generalized Stochastic Petri Nets. Series in Parallel Computing. John Wiley & Sons, Chichester (1995)"},{"key":"4_CR2","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/ARES.2009.142","volume-title":"International Conference on Availability, Reliability and Security","author":"J. Almasizadeh","year":"2009","unstructured":"Almasizadeh, J., Azgomi, M.A.: Intrusion process modeling for security quantification. In: International Conference on Availability, Reliability and Security, pp. 114\u2013121. IEEE Computer Society, Los Alamitos (2009)"},{"issue":"1","key":"4_CR3","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avi\u017eienis","year":"2004","unstructured":"Avi\u017eienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"The Center\u00a0for Internet\u00a0Security. The CIS Security Metrics v1.0.0 (May 2009)","DOI":"10.1201\/9781420052862.ch1"},{"key":"4_CR5","first-page":"644","volume-title":"AINAW 2008: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications \u2013 Workshops","author":"J.-H. Cho","year":"2008","unstructured":"Cho, J.-H., Chen, I.-R., Feng, P.-G.: Performance analysis of dynamic group communication systems with intrusion detection integrated with batch rekeying in mobile ad hoc networks. In: AINAW 2008: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications \u2013 Workshops, Washington, DC, USA, pp. 644\u2013649. IEEE Computer Society, Los Alamitos (2008)"},{"issue":"10","key":"4_CR6","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TSE.2002.1041052","volume":"28","author":"D.D. Deavours","year":"2002","unstructured":"Deavours, D.D., Clark, G., Courtney, T., Daly, D., Derisavi, S., Doyle, J.M., Sanders, W.H., Webster, P.G.: The M\u00f6bius Framework and Its Implementation. Transactions on Software Engineering\u00a028(10), 956\u2013969 (2002)","journal-title":"Transactions on Software Engineering"},{"key":"4_CR7","unstructured":"Dingle, N.J., Harrison, P.G., Knottenbelt, W.J.: Hydra: Hypergraph-based distributed response-time analyzer. In: Arabnia, H.R., Mun, Y. (eds.) Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2003, Las Vegas, Nevada, USA, June 23-26, vol.\u00a01, pp. 215\u2013219. CSREA Press (2003)"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.entcs.2009.02.051","volume":"232","author":"N.J. Dingle","year":"2009","unstructured":"Dingle, N.J., Knottenbelt, W.J.: Automated customer-centric performance analysis of generalised stochastic petri nets using tagged tokens. Electron. Notes Theor. Comput. Sci.\u00a0232, 75\u201388 (2009)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Freiling, F.C.: Introduction to security metrics. In: Dependability Metrics, pp. 129\u2013132 (2005)","DOI":"10.1007\/978-3-540-68947-8_11"},{"key":"4_CR10","volume-title":"Performance Analysis of Communication Systems with Non-Markovian Stochastic Petri Nets","author":"R. German","year":"2000","unstructured":"German, R.: Performance Analysis of Communication Systems with Non-Markovian Stochastic Petri Nets. John Wiley & Sons, Inc., Chichester (2000)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1007\/3-540-58021-2_20","volume-title":"Computer Performance Evaluation","author":"S. Gilmore","year":"1994","unstructured":"Gilmore, S., Hillston, J.: The pepa workbench: A tool to support a process algebra-based approach to performance modelling. In: Haring, G., Kotsis, G. (eds.) TOOLS 1994. LNCS, vol.\u00a0794, pp. 353\u2013368. Springer, Heidelberg (1994)"},{"key":"4_CR12","doi-asserted-by":"publisher","DOI":"10.1002\/0470841923","volume-title":"Performance of Computer Communication Systems: A Model-Based Approach","author":"B.R. Haverkort","year":"1998","unstructured":"Haverkort, B.R.: Performance of Computer Communication Systems: A Model-Based Approach. John Wiley & Sons, Chichester (1998)"},{"key":"4_CR13","volume-title":"A Compositional Approach to Performance Modelling","author":"J. Hillston","year":"1994","unstructured":"Hillston, J.: A Compositional Approach to Performance Modelling. Cambridge University Press, Cambridge (1994)"},{"key":"4_CR14","volume-title":"A Compositional Approach to Performance Modelling (Distinguished Dissertations in Computer Science)","author":"J. Hillston","year":"2005","unstructured":"Hillston, J.: A Compositional Approach to Performance Modelling (Distinguished Dissertations in Computer Science). Cambridge University Press, New York (2005)"},{"key":"4_CR15","volume-title":"The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation and Modeling","author":"R. Jain","year":"1991","unstructured":"Jain, R.: The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation and Modeling. Wiley, New York (1991)"},{"key":"4_CR16","volume-title":"Security Metrics: Replacing Fear, Uncertainty and Doubt","author":"A. Jaquith","year":"2007","unstructured":"Jaquith, A.: Security Metrics: Replacing Fear, Uncertainty and Doubt. Addison-Wesley Professional, Reading (2007)"},{"issue":"12","key":"4_CR17","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1109\/32.489070","volume":"21","author":"B. Kitchenham","year":"1995","unstructured":"Kitchenham, B., Pfleeger, S.L., Fenton, N.: Towards a framework for software measurement validation. IEEE Trans. Softw. Eng.\u00a021(12), 929\u2013944 (1995)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"4_CR18","first-page":"63","volume":"7","author":"C. Lamprecht","year":"2006","unstructured":"Lamprecht, C., van Moorsel, A., Tomlinson, P., Thomas, N.: Investigating the efficiency of cryptographic algorithms in online transactions. International Journal of Simulation: Systems, Science & Technology\u00a07(2), 63\u201375 (2006)","journal-title":"International Journal of Simulation: Systems, Science & Technology"},{"key":"4_CR19","volume-title":"Performance Modelling with Deterministic and Stochastic Petri Nets","author":"C. Lindemann","year":"1998","unstructured":"Lindemann, C.: Performance Modelling with Deterministic and Stochastic Petri Nets. John Wiley & Sons, Chichester (1998)"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"211","DOI":"10.3233\/JCS-1993-22-308","volume":"2","author":"B. Littlewood","year":"1993","unstructured":"Littlewood, B., Brocklehurst, S., Fenton, N., Mellor, P., Page, S., Wright, D., Dobson, J., Mcdermid, J., Gollmann, D.: Towards operational measures of computer security. Journal of Computer Security\u00a02, 211\u2013229 (1993)","journal-title":"Journal of Computer Security"},{"key":"4_CR21","first-page":"505","volume-title":"DSN 2002: Proceedings of the 2002 International Conference on Dependable Systems and Networks","author":"B.B. Madan","year":"2002","unstructured":"Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: Modeling and quantification of security attributes of software systems. In: DSN 2002: Proceedings of the 2002 International Conference on Dependable Systems and Networks, Washington, DC, USA, pp. 505\u2013514. IEEE Computer Society Press, Los Alamitos (2002)"},{"issue":"8","key":"4_CR22","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1109\/TC.1980.1675654","volume":"29","author":"J.F. Meyer","year":"1980","unstructured":"Meyer, J.F.: On evaluating the performability of degradable computing systems. IEEE Transactions on Computers\u00a029(8), 720\u2013731 (1980)","journal-title":"IEEE Transactions on Computers"},{"key":"4_CR23","unstructured":"Meyer, J.F.: Performability modeling: Back to the future? In: Proceedings of the 8th International Workshop on Performability Modeling of Computer and Communication Systems, pp. 5\u20139, CTIT (2007)"},{"key":"4_CR24","volume-title":"IEEE International Workshop on Petri Nets and Performance Models","author":"A.S. Miner","year":"2003","unstructured":"Miner, A.S.: Computing response time distributions using stochastic petri nets and matrix diagrams. In: IEEE International Workshop on Petri Nets and Performance Models. IEEE Computer Society, Los Alamitos (2003)"},{"key":"4_CR25","volume-title":"Probabilistic modelling","author":"I. Mitrani","year":"1998","unstructured":"Mitrani, I.: Probabilistic modelling. Cambridge University Press, New York (1998)"},{"key":"4_CR26","volume-title":"Matrix-Geometric Solutions in Stochastic Models. An Algorithmic Approach","author":"M.F. Neuts","year":"1981","unstructured":"Neuts, M.F.: Matrix-Geometric Solutions in Stochastic Models. An Algorithmic Approach. Dover Publications, Inc., New York (1981)"},{"issue":"1","key":"4_CR27","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TDSC.2004.11","volume":"1","author":"D.M. Nicol","year":"2004","unstructured":"Nicol, D.M., Sanders, W.H., Trivedi, K.S.: Model-based evaluation: From dependability to security. IEEE Trans. Dependable Secur. Comput.\u00a01(1), 48\u201365 (2004)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"4_CR28","first-page":"83","volume-title":"Performability Modelling: Techniques and Tools","author":"K.R. Pattipati","year":"1998","unstructured":"Pattipati, K.R., Mallubhatla, R., Gopalakrishna, V., Viswanatham, N.: Markov-Reward Models and Hyperbolic Systems. In: Performability Modelling: Techniques and Tools, pp. 83\u2013106. Wiley, Chichester (1998)"},{"key":"4_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-2367-3","volume-title":"Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package","author":"R.A. Sahner","year":"1996","unstructured":"Sahner, R.A., Trivedi, K.S., Puliafito, A.: Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package. Kluwer Academic Publishers, Dordrecht (1996)"},{"key":"4_CR30","unstructured":"van Moorsel, A., Bondavalli, A., Pinter, G., Madeira, H., Majzik, I., Dur\u00e3es, J., Karlsson, J., Falai, L., Strigini, L., Vieira, M., Vadursi, M., Lollini, P., Esposito, R.: State of the art. Technical Report D2.1, Assessing, Measuring and Benchmarking Resilience (AMBER) (April 2008)"},{"key":"4_CR31","first-page":"37","volume-title":"NSPW 2009: Proceedings of the New Security Pradigms Workshop 2009","author":"V. Verendel","year":"2009","unstructured":"Verendel, V.: Quantified security is a weak hypothesis: A critical survey of results and assumptions. In: NSPW 2009: Proceedings of the New Security Pradigms Workshop 2009, pp. 37\u201350. ACM, New York (2009)"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Wang, Y., Lin, C., Li, Q.-L.: Performance analysis of email systems under three types of attacks. Performance Evaluation (2010) (in Press) (Corrected Proof)","DOI":"10.1016\/j.peva.2010.01.003"},{"issue":"9","key":"4_CR33","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1109\/32.6178","volume":"14","author":"E.J. Weyuker","year":"1988","unstructured":"Weyuker, E.J.: Evaluating software complexity measures. IEEE Trans. Softw. Eng.\u00a014(9), 1357\u20131365 (1988)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Thomas, N.: Efficient solutions of a pepa model of a key distribution centre. Performance Evaluation (2009) (in Press) (Corrected Proof)","DOI":"10.1016\/j.peva.2009.07.005"},{"key":"4_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/3-540-46429-8_14","volume-title":"Computer Performance Evaluation. Modelling Techniques and Tools","author":"A. Zimmermann","year":"2000","unstructured":"Zimmermann, A., German, R., Freiheit, J., Hommel, G.: Petri Net Modelling and Performability Evaluation with TimeNET 3.0. In: Haverkort, B.R., Bohnenkamp, H.C., Smith, C.U. (eds.) TOOLS 2000. LNCS, vol.\u00a01786, pp. 188\u2013202. Springer, Heidelberg (2000)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods for Quantitative Aspects of Programming Languages"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13678-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T08:38:12Z","timestamp":1559205492000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13678-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642136771","9783642136788"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13678-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}