{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T06:25:48Z","timestamp":1769754348410,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642330179","type":"print"},{"value":"9783642330186","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-33018-6_2","type":"book-chapter","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T09:14:19Z","timestamp":1345713259000},"page":"13-23","source":"Crossref","is-referenced-by-count":9,"title":["A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes"],"prefix":"10.1007","author":[{"given":"Angel Jesus","family":"Varela-Vaca","sequence":"first","affiliation":[]},{"given":"Robert","family":"Warschofsky","sequence":"additional","affiliation":[]},{"given":"Rafael M.","family":"Gasca","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Pozo","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"UML Profile for Modeling QoS and Fault Tolerance Characteristics and Mechanisms (2009), \n                    http:\/\/www.omg.org\/spec\/QFTP\/1.1"},{"key":"2_CR2","unstructured":"Common Weakness Enumeration (2011), \n                    http:\/\/cwe.mitre.org\/index.html"},{"key":"2_CR3","unstructured":"NIST National Vulnerability Database (2011), \n                    http:\/\/nvd.nist.gov\/"},{"key":"2_CR4","unstructured":"OPBUS tools (2012), \n                    http:\/\/estigia.lsi.us.es\/angel\/OPBUS\/"},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"2042","DOI":"10.1016\/j.asoc.2010.07.002","volume":"11","author":"E. Corchado","year":"2011","unstructured":"Corchado, E., Herrero, L.: Neural visualization of network traffic data for intrusion detection. Applied Soft Computing\u00a011(2), 2042\u20132056 (2011)","journal-title":"Applied Soft Computing"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Menzel, M., Warschofsky, R., Meinel, C.: A pattern-driven generation of security policies for service-oriented architectures. In: 2010 IEEE International Conference on Web Services (ICWS), pp. 243\u2013250 (July 2010)","DOI":"10.1109\/ICWS.2010.25"},{"key":"2_CR7","unstructured":"Menzel, M.: Model-driven Security in Service-oriented Architectures. Ph.D. thesis. Hasso-Plattner - University of Potsdam (2010)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in service-oriented business process management. In: International Conference on Availability, Reliability and Security (ARES), pp. 41\u201348. IEEE Computer Society (2009)","DOI":"10.1109\/ARES.2009.90"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Mrutyunjaya, Abraham, A., Das, S., Patra, M.R.: Intelligent Decision Technologies 5(4), 347\u2013356 (2011)","DOI":"10.3233\/IDT-2011-0117"},{"key":"2_CR10","unstructured":"Rosemann, M., zur Muehlen, M.: Integrating risks in business process models. In: 16th Australasian Conference on Information Systems (ACIS 2005), Paper 50, pp. 1\u201310 (2005)"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Security Engineering with Patterns - Origins, Theoretical Models, and New Applications","year":"2003","unstructured":"Schumacher, M. (ed.): Security Engineering with Patterns - Origins, Theoretical Models, and New Applications. LNCS, vol.\u00a02754. Springer, Heidelberg (2003)"},{"key":"2_CR12","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"M. Schumacher","year":"2006","unstructured":"Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. John Wiley and Sons, Ltd (2006)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Varela-Vaca, A.J., Gasca, R.M.: OPBUS: Fault Tolerance against integrity attacks in business processes. In: 3rd International Conference on Computational Intelligence in Security for Information Systems, CISIS 2010 (2010)","DOI":"10.1007\/978-3-642-16626-6_23"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Varela-Vaca, A., Gasca, R., Jimenez-Ramirez, A.: A model-driven engineering approach with diagnosis of non-conformance of security objectives in business process models. In: 2011 Fifth International Conference on Research Challenges in Information Science (RCIS), pp. 1\u20136 (May 2011)","DOI":"10.1109\/RCIS.2011.6006844"},{"issue":"4","key":"2_CR15","first-page":"211","volume":"55","author":"C. Wolter","year":"2009","unstructured":"Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. Journal of Systems Architecture - Embedded Systems Design\u00a055(4), 211\u2013223 (2009)","journal-title":"Journal of Systems Architecture - Embedded Systems Design"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference CISIS\u201912-ICEUTE\u00b412-SOCO\u00b412 Special Sessions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33018-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T22:27:46Z","timestamp":1676068066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33018-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642330179","9783642330186"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33018-6_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}