{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T04:26:56Z","timestamp":1744086416215,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336775"},{"type":"electronic","value":"9783642336782"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33678-2_3","type":"book-chapter","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T15:02:42Z","timestamp":1346943762000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Risk Assessment for Airworthiness Security"],"prefix":"10.1007","author":[{"given":"Silvia","family":"Gil Casals","sequence":"first","affiliation":[]},{"given":"Philippe","family":"Owezarski","sequence":"additional","affiliation":[]},{"given":"Gilles","family":"Descargues","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"SAE International (Society of Automotive Engineers, Inc.): Certification Considerations for Highly-Integrated Or Complex Aircraft Systems (ARP-4754), USA (1996)"},{"key":"3_CR2","unstructured":"SAE International (Society of Automotive Engineers): Guidelines and methods for constructing the safety assessment process on civil airborne systems and equipment (ARP-4761), USA (1996)"},{"key":"3_CR3","unstructured":"Radio Technical Commission for Aeronautics (RTCA SC-167) and European Organization for Civil Aviation Electronics (EUROCAE WG-12): Software considerations in airborne systems and equipment certification (DO-178B\/ED-12), Washington, USA (1992)"},{"key":"3_CR4","unstructured":"European Organization for Civil Aviation Electronics (EUROCAE WG-46) and Radio Technical Commission for Aeronautics (RTCA SC-180): Design assurance guidance for airborne electronic hardware (DO-254\/ED-80), Paris, France (2000)"},{"key":"3_CR5","unstructured":"De Cerchio, R., Riley, C.: Aircraft systems cyber security. In: IEEE\/AIAA Digital Avionics Systems Conference, Seattle, USA, pp. 1C3.1\u20131C3.7 (2011)"},{"key":"3_CR6","unstructured":"European Organization for Civil Aviation Equipment (EUROCAE WG-72) and Radio Technical Commission for Aeronautics (RTCA SC-216): Airworthiness security process specification, ED-202 (2010)"},{"key":"3_CR7","unstructured":"RTCA SC-216 and EUROCAE WG-72: Airworthiness security methods and considerations (ED-203). Working draft version rev.9.5 (2011)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Jacob, J.M.: High assurance security and safety for digital avionics. In: 23rd IEEE\/AIAA Digital Avionics Systems Conference, Salt Lake City, USA, vol.\u00a02, pp. 8.E.4\u20138.1-9 (2004)","DOI":"10.1109\/DASC.2004.1390776"},{"key":"3_CR9","unstructured":"International Organization for Standardization: Common Criteria for Information Technology Security Evaluation (CC v.3.1) (2009), http:\/\/www.commoncriteriaportal.org"},{"key":"3_CR10","unstructured":"Ministerio de Administraciones Publicas (Spanish Ministry for Public Administrations), MAGERIT. Spain (2005)"},{"key":"3_CR11","unstructured":"Insight Consulting: CRAMM (CCTA Risk Analysis and Management Method). United Kingdom (2003)"},{"key":"3_CR12","unstructured":"National Institute for Standards and Technology (NIST): Risk Management Guide for Information Technology systems. United States (2002)"},{"key":"3_CR13","unstructured":"Carnegie Mellon University, SEI (Software Engineering Institute): OCTAVE v2.0. USA (2005)"},{"key":"3_CR14","unstructured":"CLUSIF (Club for the Security of Information in France): MEHARI (Method for Harmonized Analysis of Risk), France (2010)"},{"key":"3_CR15","unstructured":"Direction Centrale de la S\u00e9curit\u00e9 des Syst\u00e8mes d\u2019Information (DCSSI): EBIOS\u00a0- Expression des Besoins et Identification des Objectifs de S\u00e9curit\u00e9, Paris, France (2004)"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Liao, N., Li, F., Song, Y.: Research on real-time network security risk assessment and forecast. In: 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA), Changsha, China, vol.\u00a03, pp. 84\u201387 (2010)","DOI":"10.1109\/ICICTA.2010.273"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Alhabeeb, M., Almuhaideb, A., Dung, L.P., Srinivasan, B.: Information Security Threats Classification Pyramid. In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, Paderborn, Germany, pp. 208\u2013213 (2010)","DOI":"10.1109\/WAINA.2010.39"},{"key":"3_CR18","unstructured":"Ortalo, R., Deswarte, Y., Kaaniche, M.: Experimenting with quantitative evaluation tools for monitoring operational security. In: 6th International Conference on Dependable Computing for Critical Application (DCCA-6), Garmish, Germany (1997)"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Ben Mahmoud, M.S., Larrieu, N., Pirovano, A.: A risk propagation based quantitative assessment methodology for network security. In: 2011 Conference on Network and Information Systems Security (SAR-SSI), La Rochelle, France, pp. 1\u20139 (2011)","DOI":"10.1109\/SAR-SSI.2011.5931372"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33678-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T23:27:18Z","timestamp":1744068438000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33678-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336775","9783642336782"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33678-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}