{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:28Z","timestamp":1725562588440},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_1","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"1-20","source":"Crossref","is-referenced-by-count":7,"title":["Service Dependencies in Information Systems Security"],"prefix":"10.1007","author":[{"given":"Herv\u00e9","family":"Debar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nizar","family":"Kheir","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nora","family":"Cuppens-Boulahia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"1_CR1","first-page":"230","volume":"2","author":"A.M. Turing","year":"1936","unstructured":"Turing, A.M.: On computable numbers, with an application to the entscheidungsproblem. Proceedings of the London Mathematical Society\u00a02, 230\u2013265 (1936)","journal-title":"Proceedings of the London Mathematical Society"},{"key":"1_CR2","first-page":"1","volume-title":"John von Neumann Collected Works","author":"H.H. Goldstine","year":"1963","unstructured":"Goldstine, H.H., von Neumann, J.: On the principles of large scale computing machines. In: Taub, A. (ed.) John von Neumann Collected Works, vol.\u00a0V, pp. 1\u201332. The Macmillan Co., New York (1963)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Shenker, S., Wroclawski, J.: Network element service specification template. Network Working Group Request for Comments (1997), http:\/\/www.ietf.org\/rfc\/rfc2216.txt","DOI":"10.17487\/rfc2216"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Boyle, J., Cohen, R., Durham, D., Rajan, R., Herzog, S., Sastry, A.: The cops (common open policy service) protocol. Network Working Group Request for Comments (2000), http:\/\/www.ietf.org\/rfc\/rfc2748.txt","DOI":"10.17487\/rfc2748"},{"key":"1_CR5","first-page":"24","volume-title":"POLICY 2005: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, Washington, DC, USA","author":"P.J. Albuquerque de","year":"2005","unstructured":"de Albuquerque, P.J., Krumm, H., de Geus, P.L.: Policy modeling and refinement for network security systems. In: POLICY 2005: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, Washington, DC, USA, pp. 24\u201333. IEEE Computer Society, Los Alamitos (2005)"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1023\/A:1015902715532","volume":"10","author":"C. Ensel","year":"2002","unstructured":"Ensel, C., Keller, A.: An approach for managing service dependencies with xml and the resource description framework. J. Netw. Syst. Manage.\u00a010, 147\u2013170 (2002)","journal-title":"J. Netw. Syst. Manage."},{"key":"1_CR7","unstructured":"Ding, H., Sha, L.: Dependency algebra: A tool for designing robust real-time systems. In: IEEE International on Real-Time Systems Symposium, pp. 210\u2013220 (2005)"},{"key":"1_CR8","first-page":"1842","volume-title":"Proceedings of EUROCON 2005","author":"M. Randic","year":"2005","unstructured":"Randic, M., Blaskovic, B., Knezevic, P.: Modeling service dependencies in ad hoc collaborative systems. In: Proceedings of EUROCON 2005, pp. 1842\u20131845. IEEE Computer Society, Los Alamitos (2005)"},{"key":"1_CR9","unstructured":"Keller, A., Kar, G.: Dynamic dependencies in application service management. In: Proceedings of the 2000 International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 2000, Las Vegas, NV, USA (2000)"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Dacier, M., Deswarte, Y., Ka\u00e2niche, M.: Quantitative assessment of operational security: Models and tools. In: LAAS Research Report 96493 (1996)","DOI":"10.1007\/978-1-5041-2919-0_15"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using specification-based intrusion detection for automated response. In: Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection, pp. 136\u2013154 (2003)","DOI":"10.1007\/978-3-540-45248-5_8"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1109\/CSAC.2002.1176302","volume-title":"ACSAC 2002: Proceedings of the 18th Annual Computer Security Applications Conference, Washington, DC, USA","author":"T. Toth","year":"2002","unstructured":"Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: ACSAC 2002: Proceedings of the 18th Annual Computer Security Applications Conference, Washington, DC, USA, p. 301. IEEE Computer Society, Los Alamitos (2002)"},{"key":"1_CR13","first-page":"1035","volume-title":"LCN 2007: Proceedings of the 32nd IEEE Conference on Local Computer Networks, Washington, DC, USA","author":"M. Jahnke","year":"2007","unstructured":"Jahnke, M., Thul, C., Martini, P.: Graph based metrics for intrusion response measures in computer networks. In: LCN 2007: Proceedings of the 32nd IEEE Conference on Local Computer Networks, Washington, DC, USA, pp. 1035\u20131042. IEEE Computer Society, Los Alamitos (2007)"},{"key":"1_CR14","unstructured":"Gruschke, B.: Integrated event management: Event correlation using dependency graphs. In: Proceedings of DSOM 1998, Ninth Annual IFIP\/IEEE International Workshop on Distributed Systems: Operations and Management, Newark, DE, USA (1998)"},{"key":"1_CR15","first-page":"14","volume-title":"A System Dependability Modeling Framework using AADL and GSPNs","author":"A.E. Rugina","year":"2007","unstructured":"Rugina, A.E., Kanoun, K., Ka\u00e2niche, M.: Architecting dependable systems IV. In: A System Dependability Modeling Framework using AADL and GSPNs, pp. 14\u201338. Springer, Heidelberg (2007)"},{"key":"1_CR16","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.istr.2005.07.002","volume":"10","author":"M. Papadaki","year":"2005","unstructured":"Papadaki, M., Furnell, S.: Informing the decision process in an automated intrusion response system. Information Security Technical Report\u00a010, 150\u2013161 (2005)","journal-title":"Information Security Technical Report"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Noel, S., Jajodia, S.: Managing attack graph complexity through visual hierarchical aggregation. In: CCS Workshop on Visualization and Data Mining for Computer Security (2004)","DOI":"10.1145\/1029208.1029225"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-30101-1_17","volume-title":"Formal Methods for Components and Objects","author":"O. Sheyner","year":"2004","unstructured":"Sheyner, O., Wing, J.: Tools for generating and analyzing attack graphs. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol.\u00a03188, pp. 344\u2013371. Springer, Heidelberg (2004)"},{"key":"1_CR19","unstructured":"Noel, S., Jajodia, S., O\u2019Berry, B., Jacobs, M.: Efficient minimum-cost network hardening via exploit dependency graphs. In: Proceedings of the 19th Annual Conference ACSAC (2003)"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using specification-based intrusion detection for automated response. In: Proceedings of the 6th International Symposium RAID, pp. 136\u2013154 (2003)","DOI":"10.1007\/978-3-540-45248-5_8"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Jahnke, M., Thul, C., Martini, P.: Graph based metrics for intrusion response measures in computer networks. In: 32nd IEEE Conference on Local Computer Networks (2007)","DOI":"10.1109\/LCN.2007.45"},{"key":"1_CR22","unstructured":"Kheir, N., Debar, H., Cuppens-Boulahia, N., Cuppens, F., Viinikka, J.: Cost assessment for intrusion response using dependency graphs. In: Proc. IFIP International Conference N2S (2009)"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Toth, T., Kruegel, C.: Evaluating the impact of automated intrusion response mechanisms. In: Proceedings of the 18th Annual Conference ACSAC (2002)","DOI":"10.1109\/CSAC.2002.1176302"},{"key":"1_CR24","unstructured":"International Society of Automotive Engineers: SAE-AS5506: SAE architecture analysis and design language (2004)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Strasburg, C., Stakhanova, N., Basu, S., Wong, J.S.: Intrusion response cost assessment methodology. In: Proceedings of the 4th International Symposium ASIACCS, pp. 388\u2013391 (2009)","DOI":"10.1145\/1533057.1533112"},{"key":"1_CR26","unstructured":"International Society of Automotive Engineers: SAE-AS5506\/1: SAE architecture analysis and design language, error model annex (2006)"},{"key":"1_CR27","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s11416-007-0039-z","volume":"3","author":"Y. Thomas","year":"2007","unstructured":"Thomas, Y., Debar, H., Cuppens, F., Cuppens-Boulahia, N.: Enabling automated threat response through the use of a dynamic security policy. Journal in Computer Virology (JCV)\u00a03, 195\u2013210 (2007)","journal-title":"Journal in Computer Virology (JCV)"},{"key":"1_CR28","first-page":"114","volume":"1","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J., Winsborough, W.: Design of a role-based trust-management framework. Proceedings of the the 2002 IEEE Symposium on Security and Privacy\u00a01, 114 (2002)","journal-title":"Proceedings of the the 2002 IEEE Symposium on Security and Privacy"},{"key":"1_CR29","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029, 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"1_CR30","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1007\/BF03219974","volume":"61","author":"F. Cuppens","year":"2006","unstructured":"Cuppens, F., Autrel, F., Yacine Bouzida, J.G., Gombault, S., Sans, T.: Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. Annals of Telecommunications\u00a061, 197\u2013217 (2006)","journal-title":"Annals of Telecommunications"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:32Z","timestamp":1606186592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}