{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:23:07Z","timestamp":1725790987366},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642550317"},{"type":"electronic","value":"9783642550324"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55032-4_40","type":"book-chapter","created":{"date-parts":[[2014,3,25]],"date-time":"2014-03-25T06:15:38Z","timestamp":1395728138000},"page":"405-412","source":"Crossref","is-referenced-by-count":3,"title":["Assets Dependencies Model in Information Security Risk Management"],"prefix":"10.1007","author":[{"given":"Jakub","family":"Breier","sequence":"first","affiliation":[]},{"given":"Frank","family":"Schindler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"NIST Special Publication 800-53 Managing Information Security Risk - Organization, Mission, and Information System View. NIST (2011)"},{"key":"40_CR2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/508171.508187","volume-title":"Proceedings of the 2001 Workshop on New Security Paradigms, NSPW 2001","author":"B. Blakley","year":"2001","unstructured":"Blakley, B., McDermott, E., Geer, D.: Information security is information risk management. In: Proceedings of the 2001 Workshop on New Security Paradigms, NSPW 2001, pp. 97\u2013104. ACM, New York (2001)"},{"key":"40_CR3","unstructured":"ISO. ISO\/IEC Std. ISO 27005:2011, Information technology \u2013 Security techniques \u2013 Information security risk management. ISO (2011)"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Leitner, A., Schaumuller-Bichl, I.: Arima - a new approach to implement iso\/iec 27005. In: 2nd International Logistics and Industrial Informatics, LINDI 2009, pp. 1\u20136 (2009)","DOI":"10.1109\/LINDI.2009.5258624"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Loloei, I., Shahriari, H.R., Sadeghi, A.: A model for asset valuation in security risk analysis regarding assets\u2019 dependencies. In: 2012 20th Iranian Conference on Electrical Engineering (ICEE), pp. 763\u2013768 (2012)","DOI":"10.1109\/IranianCEE.2012.6292456"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Mayer, J., Lemes Fagundes, L.: A model to assess the maturity level of the risk management process in information security. In: IFIP\/IEEE International Symposium on Integrated Network Management-Workshops, IM 2009, pp. 61\u201370 (2009)","DOI":"10.1109\/INMW.2009.5195935"},{"issue":"2","key":"40_CR7","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/S0378-7206(03)00044-2","volume":"41","author":"B. Suh","year":"2003","unstructured":"Suh, B., Han, I.: The is risk analysis based on a business model. Inf. Manage.\u00a041(2), 149\u2013158 (2003)","journal-title":"Inf. Manage."},{"key":"40_CR8","unstructured":"Tatar, U., Karabacak, B.: An hierarchical asset valuation method for information security risk analysis. In: 2012 International Conference on Information Society (i-Society), pp. 286\u2013291 (2012)"},{"key":"40_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-642-21694-7_2","volume-title":"Critical Information Infrastructures Security","author":"N. Vavoulas","year":"2011","unstructured":"Vavoulas, N., Xenakis, C.: A quantitative risk analysis approach for deliberate threats. In: Xenakis, C., Wolthusen, S. (eds.) CRITIS 2010. LNCS, vol.\u00a06712, pp. 13\u201325. Springer, Heidelberg (2011)"},{"key":"40_CR10","unstructured":"Williams, R., Pandelios, G., Behrens, S.: Software Risk Evaluation (SRE) method description (version 2.0). Software Engineering Institute (1999)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55032-4_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T23:06:55Z","timestamp":1648681615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55032-4_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642550317","9783642550324"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55032-4_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}