{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:11:22Z","timestamp":1725718282413},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368172"},{"type":"electronic","value":"9783642368189"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36818-9_27","type":"book-chapter","created":{"date-parts":[[2013,3,4]],"date-time":"2013-03-04T16:14:54Z","timestamp":1362413694000},"page":"261-270","source":"Crossref","is-referenced-by-count":7,"title":["On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Ksiezopolski","sequence":"first","affiliation":[]},{"given":"Damian","family":"Rusinek","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Wierzbicki","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Jaquith, A.: Security Metrics: Replacing Fear, Uncertainty, and Doubt. Addison Wesley (2007)"},{"key":"27_CR2","unstructured":"J\u00fcrjens, J.: Secure System Development with UML. Springer (2007)"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s10009-007-0048-8","volume":"9","author":"J. J\u00fcrjens","year":"2007","unstructured":"J\u00fcrjens, J.: Tools for Secure Systems Development with UML. International Journal on Software Tools for Technology Transfer\u00a09, 527\u2013544 (2007)","journal-title":"International Journal on Software Tools for Technology Transfer"},{"issue":"4","key":"27_CR4","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1016\/j.cose.2012.01.006","volume":"31","author":"B. Ksiezopolski","year":"2012","unstructured":"Ksiezopolski, B.: QoP-ML: Quality of Protection modelling language for cryptographic protocols. Computers & Security\u00a031(4), 569\u2013596 (2012)","journal-title":"Computers & Security"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1016\/j.cose.2006.11.002","volume":"26","author":"B. Ksiezopolski","year":"2007","unstructured":"Ksiezopolski, B., Kotulski, Z.: Adaptable security mechanism for the dynamic environments. Computers & Security\u00a026, 246\u2013255 (2007)","journal-title":"Computers & Security"},{"key":"27_CR6","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-02671-3_28","volume":"158","author":"B. Ksiezopolski","year":"2009","unstructured":"Ksiezopolski, B., Kotulski, Z., Szalachowski, P.: Adaptive approach to network security. Communications in Computer and Information Science\u00a0158, 233\u2013241 (2009)","journal-title":"Communications in Computer and Information Science"},{"key":"27_CR7","first-page":"1873","volume":"26","author":"C. Lambrinoudakis","year":"2003","unstructured":"Lambrinoudakis, C., Gritzalis, S., Dridi, F., Pernul, G.: Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy 2003. Computers & Security\u00a026, 1873\u20131883 (2003)","journal-title":"Computers & Security"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"LeMay, E., Unkenholz, W., Parks, D.: Adversary-Driven State-Based System Security Evaluation. In: Workshop on Security Metrics - MetriSec (2010)","DOI":"10.1145\/1853919.1853926"},{"key":"27_CR9","unstructured":"Lindskog, S.: Modeling and Tuning Security from a Quality of Service Perspective. PhD dissertation, Department of Computer Science and Engineering, Chalmers University of Technology, Goteborg, Sweden (2005)"},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"1336","DOI":"10.1016\/j.comcom.2009.03.003","volume":"32","author":"A. Luo","year":"2009","unstructured":"Luo, A., Lin, C., Wang, K., Lei, L., Liu, C.: Quality of protection analysis and performance modeling in IP multimedia subsystem. Computers Communications\u00a032, 1336\u20131345 (2009)","journal-title":"Computers Communications"},{"key":"27_CR11","unstructured":"Openssl Project: http:\/\/www.openssl.org\/"},{"key":"27_CR12","volume-title":"Sixth International Workshop on Software and Performance","author":"D.C. Petriu","year":"2007","unstructured":"Petriu, D.C., Woodside, C.M., Petriu, D.B., Xu, J., Israr, T., Georg, G., France, R., Bieman, J.M., Houmb, S.H., J\u00fcrjens, J.: Performance Analysis of Security Aspects in UML Models. In: Sixth International Workshop on Software and Performance. ACM, Buenos Aires (2007)"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Sun, Y., Kumar, A.: Quality od Protection(QoP): A quantitative methodology to grade security services. In: 28th Confrence on Distributed Computing Systems Workshop, pp. 394\u2013399 (2008)","DOI":"10.1109\/ICDCS.Workshops.2008.73"},{"key":"27_CR14","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.ipl.2010.01.004","volume":"110","author":"P. Szalachowski","year":"2010","unstructured":"Szalachowski, P., Ksiezopolski, B., Kotulski, Z.: CMAC, CCM and GCM\/GMAC: advanced modes of operation of symmetric block ciphers in the Wireless Sensor Networks. Information Processing Letters\u00a0110, 247\u2013251 (2010)","journal-title":"Information Processing Letters"},{"key":"27_CR15","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.cose.2010.02.003","volume":"29","author":"M. Theoharidou","year":"2010","unstructured":"Theoharidou, M., Kotzanikolaou, P., Gritzalis, S.: A multi-layer Criticality Assessment methodology based on interdependencies. Computers & Security\u00a029, 643\u2013658 (2010)","journal-title":"Computers & Security"},{"key":"27_CR16","unstructured":"RFC 5246: The Transport Layer Security (TLS) Protocol v.1.2 (2008)"}],"container-title":["Lecture Notes in Computer Science","Information and Communicatiaon Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36818-9_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T11:28:52Z","timestamp":1562758132000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36818-9_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368172","9783642368189"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36818-9_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}