{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:14:04Z","timestamp":1725700444982},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642324970"},{"type":"electronic","value":"9783642324987"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32498-7_43","type":"book-chapter","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T14:04:28Z","timestamp":1344953068000},"page":"562-577","source":"Crossref","is-referenced-by-count":5,"title":["Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures"],"prefix":"10.1007","author":[{"given":"Fredrik","family":"Seehusen","sequence":"first","affiliation":[]},{"given":"Bj\u00f8rnar","family":"Solhaug","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","unstructured":"Alberts, C.J., Davey, J.: OCTAVE criteria version 2.0. Technical report CMU\/SEI-2001-TR-016, Carnegie Mellon University (2004)"},{"key":"43_CR2","unstructured":"Barber, B., Davey, J.: The use of the CCTA risk analysis and management methodology CRAMM in health information systems. In: 7th International Congress on Medical Informatics (MEDINFO 1992), pp. 1589\u20131593. North-Holland (1992)"},{"issue":"10","key":"43_CR3","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1016\/j.jss.2010.05.069","volume":"83","author":"G. Br\u00e6ndeland","year":"2010","unstructured":"Br\u00e6ndeland, G., Refsdal, A., St\u00f8len, K.: Modular analysis and modelling of risk scenarios with dependencies. Journal of Systems and Software\u00a083(10), 1995\u20132013 (2010)","journal-title":"Journal of Systems and Software"},{"issue":"1-2","key":"43_CR4","first-page":"12","volume":"3","author":"M. Breu","year":"2011","unstructured":"Breu, M., Breu, R., L\u00f6w, S.: MoVEing forward: Towards an architecture and processes for a Living Models infrastructure. International Journal On Advances in Life Sciences\u00a03(1-2), 12\u201322 (2011)","journal-title":"International Journal On Advances in Life Sciences"},{"key":"43_CR5","unstructured":"Communication from the Commission on a European programme for critical infrastructure protection. In: The European Commission, COM, 786 final (2006)"},{"key":"43_CR6","unstructured":"EUROCONTROL: Air traffic management strategy for the years 2000+ (2003)"},{"key":"43_CR7","unstructured":"Innerhofer-Oberperfler, F., Breu, R.: Using an enterprise architecture for IT risk management. In: Information Security South Africa Conference, ISSA 2006 (2006)"},{"key":"43_CR8","unstructured":"International Organization for Standardization: ISO 31000 Risk management \u2013 Principles and guidelines (2009)"},{"key":"43_CR9","unstructured":"Ligaarden, O.S., Refsdal, A., St\u00f8len, K.: Using indicators to monitor security risk in systems of systems: How to capture and measure the impact of service dependencies on the security of provided services. In: IT Security Governance Innovations: Theory and Research. IGI Global (to appear, 2012)"},{"issue":"5","key":"43_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MC.2010.134","volume":"43","author":"M.S. Lund","year":"2010","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Evolution in relation to risk and trust management. Computer\u00a043(5), 49\u201355 (2010)","journal-title":"Computer"},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Model-Driven Risk Analysis \u2013 The CORAS Approach. Springer (2011)","DOI":"10.1007\/978-3-642-12323-8"},{"key":"43_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-642-23082-0_9","volume-title":"Foundations of Security Analysis and Design VI","author":"M.S. Lund","year":"2011","unstructured":"Lund, M.S., Solhaug, B., St\u00f8len, K.: Risk Analysis of Changing and Evolving Systems Using CORAS. In: Aldini, A., Gorrieri, R. (eds.) FOSAD VI. LNCS, vol.\u00a06858, pp. 231\u2013274. Springer, Heidelberg (2011)"},{"key":"43_CR13","series-title":"SCI","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-642-05183-8_6","volume-title":"Advances in Intelligent Information Systems","author":"F. Massacci","year":"2010","unstructured":"Massacci, F., Mylopoulos, J., Zannone, N.: Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology. In: Ras, Z.W., Tsay, L.-S. (eds.) Advances in Intelligent Information Systems. SCI, vol.\u00a0265, pp. 147\u2013174. Springer, Heidelberg (2010)"},{"key":"43_CR14","unstructured":"Microsoft Solutions for Security and Compliance and Microsoft Security Center of Excellence: The Security Risk Management Guide (2006)"},{"key":"43_CR15","unstructured":"Object Management Group: OMG Unified Modeling Language (OMG UML), Superstructure. Version 2.2, OMG Document: formal\/2009-02-02 (2009)"},{"key":"43_CR16","doi-asserted-by":"crossref","unstructured":"Peltier, T.R.: Information Security Risk Analysis, 2nd edn. Auerbach Publications (2005)","DOI":"10.1201\/9781420031195"},{"key":"43_CR17","unstructured":"Report on the industrial validation of SecureChange solutions. SecureChange project deliverable D1.3 (2012)"}],"container-title":["Lecture Notes in Computer Science","Multidisciplinary Research and Practice for Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32498-7_43.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:04:55Z","timestamp":1620129895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32498-7_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642324970","9783642324987"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32498-7_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}