{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:32:21Z","timestamp":1745469141495,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642357428"},{"type":"electronic","value":"9783642357435"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-35743-5_3","type":"book-chapter","created":{"date-parts":[[2012,12,14]],"date-time":"2012-12-14T01:40:42Z","timestamp":1355449242000},"page":"12-41","source":"Crossref","is-referenced-by-count":2,"title":["A Denotational Model for Component-Based Risk Analysis"],"prefix":"10.1007","author":[{"given":"Gyrd","family":"Br\u00e6ndeland","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Atle","family":"Refsdal","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ketil","family":"St\u00f8len","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Ahrens, F.: Why it\u2019s so hard for Toyota to find out what\u2019s wrong. The Washington Post (March 2010)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Br\u00e6ndeland, G., Refsdal, A., St\u00f8len, K.: A denotational model for component-based risk analysis. Technical Report 363, University of Oslo, Department of Informatics (2011)","DOI":"10.1007\/978-3-642-35743-5_3"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Br\u00e6ndeland, G., St\u00f8len, K.: Using model-driven risk analysis in component-based development. In: Dependability and Computer Engineering: Concepts for Software-Intensive Systems. IGI Global (2011)","DOI":"10.4018\/978-1-60960-747-0.ch015"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Broy, M., St\u00f8len, K.: Specification and development of interactive systems \u2013 Focus on streams, interfaces and refinement. Monographs in computer science. Springer (2001)","DOI":"10.1007\/978-1-4613-0091-5"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Courant, R., Robbins, H.: What Is Mathematics? An Elementary Approach to Ideas and Methods. Oxford University Press (1996)","DOI":"10.1093\/oso\/9780195105193.001.0001"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-44685-0_24","volume-title":"CONCUR 2001 - Concurrency Theory","author":"L. Alfaro de","year":"2001","unstructured":"de Alfaro, L., Henzinger, T.A., Jhala, R.: Compositional Methods for Probabilistic Systems. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001. LNCS, vol.\u00a02154, pp. 351\u2013365. Springer, Heidelberg (2001)"},{"key":"3_CR7","unstructured":"Derman, C.: Finite state Markovian decision process. Mathematics in science and engineering, vol.\u00a067. Academic Press (1970)"},{"key":"3_CR8","unstructured":"Dudley, R.M.: Real analysis and probability. Cambridge studies in advanced mathematics, Cambridge (2002)"},{"key":"3_CR9","unstructured":"Probability theory. Encyclop\u00e6dia Britannica Online (2009)"},{"key":"3_CR10","unstructured":"Folland, G.B.: Real Analysis: Modern Techniques and Their Applications. Pure and Applied Mathematics, 2nd edn. John Wiley and Sons Ltd., USA (1999)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Halmos, P.R.: Measure Theory. Springer (1950)","DOI":"10.1007\/978-1-4684-9440-2"},{"issue":"4","key":"3_CR12","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/s10270-005-0087-0","volume":"4","author":"\u00d8. Haugen","year":"2005","unstructured":"Haugen, \u00d8., Husa, K.E., Runde, R.K., St\u00f8len, K.: STAIRS towards formal design with sequence diagrams. Software and System Modeling\u00a04(4), 355\u2013357 (2005)","journal-title":"Software and System Modeling"},{"key":"3_CR13","unstructured":"He, J., Josephs, M., Hoare, C.A.R.: A theory of synchrony and asynchrony. In: IFIP WG 2.2\/2.3 Working Conference on Programming Concepts and Methods, pp. 459\u2013478. North Holland (1990)"},{"key":"3_CR14","first-page":"2009","volume":"73","author":"ISO","year":"2009","unstructured":"ISO. Risk management \u2013 Vocabulary, ISO Guide 73:2009 (2009)","journal-title":"ISO Guide"},{"key":"3_CR15","unstructured":"J\u00fcrjens, J. (ed.): Secure systems development with UML. Springer (2005)"},{"issue":"1","key":"3_CR16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/52.976939","volume":"19","author":"K.M. Khan","year":"2002","unstructured":"Khan, K.M., Han, J.: Composing security-aware software. IEEE Software\u00a019(1), 34\u201341 (2002)","journal-title":"IEEE Software"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Khan, K.M., Han, J.: Deriving systems level security properties of component based composite systems. In: Australian Software Engineering Conference, pp. 334\u2013343 (2005)","DOI":"10.1109\/ASWEC.2005.21"},{"key":"3_CR18","unstructured":"Komj\u00e1th, P., Totik, V.: Problems and theorems in classical set theory. Problem books in mathematics. Springer (2006)"},{"issue":"7","key":"3_CR19","doi-asserted-by":"publisher","first-page":"600","DOI":"10.2307\/2974556","volume":"102","author":"L. Lamport","year":"1993","unstructured":"Lamport, L.: How to write a proof. American Mathematical Monthly\u00a0102(7), 600\u2013608 (1993)","journal-title":"American Mathematical Monthly"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/3-540-45800-X_33","volume-title":"\u00abUML\u00bb 2002 - The Unified Modeling Language. Model Engineering, Concepts, and Tools","author":"T. Lodderstedt","year":"2002","unstructured":"Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol.\u00a02460, pp. 426\u2013441. Springer, Heidelberg (2002)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Meyn, S.: Control Techniques for Complex Networks. Cambridge University Press (2007)","DOI":"10.1017\/CBO9780511804410"},{"key":"3_CR22","unstructured":"OMG. Unified Modeling LanguageTM (OMG UML), Superstructure, Version 2.3 (2010)"},{"key":"3_CR23","unstructured":"Refsdal, A.: Specifying Computer Systems with Probabilistic Sequence Diagrams. PhD thesis, Faculty of Mathematics and Natural Sciences, University of Oslo (2008)"},{"key":"3_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/11768869_12","volume-title":"Formal Methods for Open Object-Based Distributed Systems","author":"A. Refsdal","year":"2006","unstructured":"Refsdal, A., Runde, R.K., St\u00f8len, K.: Underspecification, Inherent Nondeterminism and Probability in Sequence Diagrams. In: Gorrieri, R., Wehrheim, H. (eds.) FMOODS 2006. LNCS, vol.\u00a04037, pp. 138\u2013155. Springer, Heidelberg (2006)"},{"key":"3_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/11804192_5","volume-title":"Formal Methods for Components and Objects","author":"R.K. Runde","year":"2006","unstructured":"Runde, R.K., Haugen, \u00d8., St\u00f8len, K.: The Pragmatics of STAIRS. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2005. LNCS, vol.\u00a04111, pp. 88\u2013114. Springer, Heidelberg (2006)"},{"key":"3_CR26","unstructured":"Segala, R.: Modeling and Verification of Randomized Distributed Real-Time Systems. PhD thesis, Laboratory for Computer Science, Massachusetts Institute of Technology (1995)"},{"issue":"2","key":"3_CR27","first-page":"250","volume":"2","author":"R. Segala","year":"1995","unstructured":"Segala, R., Lynch, N.A.: Probabilistic simulations for probabilistic processes. Nordic Journal of Computing\u00a02(2), 250\u2013273 (1995)","journal-title":"Nordic Journal of Computing"},{"issue":"2","key":"3_CR28","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/0304-3975(94)00286-0","volume":"152","author":"K. Seidel","year":"1995","unstructured":"Seidel, K.: Probabilistic communicationg processes. Theoretical Computer Science\u00a0152(2), 219\u2013249 (1995)","journal-title":"Theoretical Computer Science"},{"key":"3_CR29","unstructured":"Sere, K., Troubitsyna, E.: Probabilities in action system. In: Proceedings of the 8th Nordic Workshop on Programming Theory (1996)"},{"key":"3_CR30","unstructured":"Skorokhod, A.V.: Basic principles and application of probability theory. Springer (2005)"},{"key":"3_CR31","unstructured":"Standards Australia, Standards New Zealand. Australian\/New Zealand Standard. Risk Management, AS\/NZS 4360:2004 (2004)"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Weisstein, E.W.: CRC Concise Encyclopedia of Mathematics, 2nd edn. Chapman & Hall\/CRC (2002)","DOI":"10.1201\/9781420035223"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Component Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35743-5_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T17:54:17Z","timestamp":1745430857000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35743-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642357428","9783642357435"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35743-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}