{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:56:35Z","timestamp":1742918195346,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334269"},{"type":"electronic","value":"9783642334276"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33427-6_5","type":"book-chapter","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T09:38:39Z","timestamp":1345714719000},"page":"64-79","source":"Crossref","is-referenced-by-count":0,"title":["A Framework for Modelling Security Architectures in Services Ecosystems"],"prefix":"10.1007","author":[{"given":"Matthew","family":"Collinson","sequence":"first","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]},{"given":"Barry","family":"Taylor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Beautement, A., Pym, D.: Structured systems economics for security management. In: Moore, T. (ed.) Proc. WEIS 2010, Harvard (2010), \n                        http:\/\/weis2010.econinfosec.org\/papers\/session6\/weis2010_beautement.pdf"},{"key":"5_CR2","unstructured":"Coulouris, G., Dollimore, J., Kindberg, T.: Distributed Systems: Concepts and Design, 3rd edn. Addison Wesley (2000)"},{"key":"5_CR3","unstructured":"Collinson, M., Monahan, B., Pym, D.: A Discipline of Mathematical Systems Modelling. College Publications (2012)"},{"key":"5_CR4","unstructured":"Collinson, M., Monahan, B., Pym, D.: Semantics for structured systems modelling and simulation. In: Proc. Simutools 2010. ACM Digital Library (2010) ISBN 78-963-9799-87-5"},{"issue":"b","key":"5_CR5","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.1093\/logcom\/exp021","volume":"19","author":"M. Collinson","year":"2009","unstructured":"Collinson, M., Monahan, B., Pym, D.: A logical and computational theory of located resource. Journal of Logic and Computation\u00a019(b), 1207\u20131244 (2009)","journal-title":"Journal of Logic and Computation"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"959","DOI":"10.1017\/S0960129509990077","volume":"19","author":"M. Collinson","year":"2009","unstructured":"Collinson, M., Pym, D.: Algebra and logic for resource-based systems modelling. Mathematical Structures in Computer Science\u00a019, 959\u20131027 (2009), doi:10.1017\/S0960129509990077","journal-title":"Mathematical Structures in Computer Science"},{"key":"5_CR7","unstructured":"Core Gnosis, \n                        http:\/\/www.hpl.hp.com\/research\/systems_security\/gnosis.html"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-03549-4_9","volume-title":"Financial Cryptography and Data Security","author":"C. Ioannidis","year":"2009","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Investments and Trade-offs in the Economics of Information Security. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 148\u2013166. Springer, Heidelberg (2009)"},{"issue":"2","key":"5_CR9","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.ejor.2011.05.050","volume":"216","author":"C. Ioannidis","year":"2012","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Information security trade-offs and optimal patching policies. European Journal of Operational Research\u00a0216(2), 434\u2013444 (2012)","journal-title":"European Journal of Operational Research"},{"issue":"2, 3-4","key":"5_CR10","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s00165-009-0107-x","volume":"22","author":"M. Collinson","year":"2010","unstructured":"Collinson, M., Pym, D.: Algebra and logic for access control [and erratum]. Formal Aspects of Computing\u00a022(2, 3-4), 83\u2013104 (2010)","journal-title":"Formal Aspects of Computing"},{"issue":"3","key":"5_CR11","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/0304-3975(83)90114-7","volume":"25","author":"R. Milner","year":"1983","unstructured":"Milner, R.: Calculi for synchrony and asynchrony. TCS\u00a025(3), 267\u2013310 (1983)","journal-title":"TCS"},{"key":"5_CR12","unstructured":"Beautement, A., Pym, D.: The structure and dynamics of systems security economics, \n                        https:\/\/www.abdn.ac.uk\/~csc335\/actors.pdf"},{"key":"5_CR13","unstructured":"Parsons, T.: The Social System. Routledge (1951)"},{"key":"5_CR14","unstructured":"Merton, R.: Social Theory and Social Structure. Macmillan (1968)"},{"key":"5_CR15","unstructured":"Brown, L., Harding, A.: Social modelling and public policy: application of microsimulation modelling in Australia. Journal of Artificial Societies and Social Simulation\u00a05(4) (2002)"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0001-6918(91)90003-I","volume":"78","author":"H. Johnson","year":"1991","unstructured":"Johnson, H., Johnson, P.: Task knowledge structures: Psychological basis and integration into system design. Acta Psychologica\u00a078(1), 3\u201326 (1991)","journal-title":"Acta Psychologica"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-36235-5_5","volume-title":"Interactive Systems. Design, Specification, and Verification","author":"N. Souchon","year":"2002","unstructured":"Souchon, N., Limbourg, Q., Vanderdonckt, J.: Task Modelling in Multiple Contexts of Use. In: Forbrig, P., Limbourg, Q., Urban, B., Vanderdonckt, J. (eds.) DSV-IS 2002. LNCS, vol.\u00a02545, pp. 59\u201373. Springer, Heidelberg (2002)"},{"key":"5_CR18","unstructured":"Sterman, J.D.: Business Dynamics: Systems thinking and modeling for a complex world. McGraw Hill (2000)"},{"key":"5_CR19","unstructured":"Pidd, M.: Tools for Thinking: Modelling in Management Science. Wiley (2003)"},{"key":"5_CR20","unstructured":"Gonzalez, J., Sawicka, A.: A framework for human factors in information security. In: WSEAS International Conference on Information Security, Rio de Janeiro (2002)"},{"issue":"12","key":"5_CR21","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A.L. Adams","year":"1999","unstructured":"Adams, A.L., Sasse, M.A.: Users are not the enemy: Why users compromise security mechanisms and how to take remedial measures. Comm. ACM\u00a042(12), 40\u201346 (1999)","journal-title":"Comm. ACM"},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(09)70127-7","volume":"10","author":"A. Beautement","year":"2009","unstructured":"Beautement, A., Sasse, M.: The compliance budget: The economics of user effort in information security. Computer Fraud & Security\u00a010, 8\u201312 (2009)","journal-title":"Computer Fraud & Security"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Beautement, A., Coles, R., Griffin, J., Ioannidis, C., Monahan, B., Pym, D., Sasse, A., Wonham, M.: Modelling the Hum. and Tech. Costs and Bens. of USB Memory Stick Sec. In: Johnson, M.E. (ed.) Managing Inf. Risk and the Econ. of Sec., pp. 141\u2013163. Springer (2008)","DOI":"10.1007\/978-0-387-09762-6_7"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Kabir, M., Han, J., Colman, A.: Modeling and coordinating social interactions in pervasive environments. In: Proc. 16th IEEE Int. Conf. on Eng. Complex Comp. Sys., pp. 243\u2013252 (2011)","DOI":"10.1109\/ICECCS.2011.31"},{"key":"5_CR25","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/0304-3975(85)90093-3","volume":"37","author":"R. de Simone","year":"1985","unstructured":"de Simone, R.: Higher-level synchronising devices in Meije-SCCS. TCS\u00a037, 245\u2013267 (1985)","journal-title":"TCS"},{"key":"5_CR26","unstructured":"Hoare, C.A.R.: Communicating Sequential Processes. Prentice-Hall International (1985)"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Baldwin, A., Pym, D., Shiu, S.: Enterprise information risk management: Dealing with cloud computing. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing: Selected Topics. Communications and Networks. Springer (2012)","DOI":"10.1007\/978-1-4471-4189-1_8"},{"issue":"4","key":"5_CR28","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.sysarc.2008.10.002","volume":"55","author":"C. Wolter","year":"2009","unstructured":"Wolter, C., Menzel, M., Schaad, A., Miseldine, P., Meinel, C.: Model-driven business process security requirement specification. Journal of Systems Architecture\u00a055(4), 211\u2013223 (2009)","journal-title":"Journal of Systems Architecture"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Menzel, M., Thomas, I., Meinel, C.: Security requirements specification in service-oriented business process management. In: Proc. ARES 2009, pp. 41\u201348. IEEE (2009)","DOI":"10.1109\/ARES.2009.90"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Blackwell, C.: A multi-layered security architecture for modelling complex systems. In: Proc. 4th Ann. Workshop on Cybersecurity and Information Intelligence Res. ACM (2008)","DOI":"10.1145\/1413140.1413180"},{"key":"5_CR31","unstructured":"Beres, Y., Pym, D., Shiu, S.: Decision Support for Systems Security Investment. In: Proc. Business-driven IT Management (BDIM 2010). IEEE Xplore (2010)"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented and Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33427-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T05:37:46Z","timestamp":1676785066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33427-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334269","9783642334276"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33427-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}