{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:09:47Z","timestamp":1743070187980,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811359064"},{"type":"electronic","value":"9789811359071"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5907-1_39","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T07:01:52Z","timestamp":1549522912000},"page":"361-370","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Software Requirements for an Ultra Large Scale System to Compute Multi Dimension Mean Failure Cost"],"prefix":"10.1007","author":[{"given":"Mouna","family":"Jouini","sequence":"first","affiliation":[]},{"given":"Latifa","family":"Ben Arfa Rabai","sequence":"additional","affiliation":[]},{"given":"Ridha","family":"Khedri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"key":"39_CR1","unstructured":"ISO\/IEC 17799: (E), Information technology\u2014Security techniques\u2014Code of practice for information security management (2005)"},{"issue":"1","key":"39_CR2","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1108\/09685229910255179","volume":"7","author":"Lam\u2010for Kwok","year":"1999","unstructured":"Kwok, L., Dennis Longley, D.: Information security management and modeling. Inf. Manage. Comput. Secur. 7, 30\u201340 (1999)","journal-title":"Information Management & Computer Security"},{"key":"39_CR3","unstructured":"NIST SP 800-53: Information Security Handbook: A Guide for Managers (2006)"},{"key":"39_CR4","unstructured":"National Institute of Standards and Technology, Information Security - Guide for Conducting Risk Assessments (2002)"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: Risk management guide for information technology systems: Recommendations of the national institute of standards and technology. National Institute of Standards and Technology (NIST) Special Publication 800-30, U.S. Government Printing Office (2001)","DOI":"10.6028\/NIST.SP.800-30"},{"issue":"4","key":"39_CR6","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s11334-010-0123-2","volume":"6","author":"Anis Ben Aissa","year":"2010","unstructured":"Aissa, A.B., Abercrombie, R.K., Sheldon, F.T., Mili, A.: Quantifying security threats and their potential impacts: a case study. ISSE 6(4), 269\u2013281 (2010)","journal-title":"Innovations in Systems and Software Engineering"},{"key":"39_CR7","unstructured":"Mayer, N.: Model-based management of information system security risk. Ph.D. Thesis (2009)"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Avizienis, A., Laprie, J.C., Randell, B.: Dependability and its threats: a taxonomy. In: IFIP Congress Topical Sessions, pp. 91\u2013120 (2004)","DOI":"10.1007\/978-1-4020-8157-6_13"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Jouini, M., Ben Arfa Rabai, L.: A Security Risk Management Model for Cloud Computing\nSystems: Infrastructure as a Service. SpaCCS 2017, pp. 594\u2013608 (2017)","DOI":"10.1007\/978-3-319-72389-1_47"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Jouini, M., Ben Arfa Rabai, L., Kh\u00e9dri, R.: A multidimensional approach towards a quantitative assessment of security threats. ANT\/SEIT 2015, pp. 507\u2013514 (2015)","DOI":"10.1016\/j.procs.2015.05.024"},{"issue":"3","key":"39_CR11","doi-asserted-by":"publisher","first-page":"32","DOI":"10.4018\/IJCAC.2016070103","volume":"6","author":"Mouna Jouini","year":"2016","unstructured":"Jouini, M., Ben Arfa Rabai, L.: A security framework for secure cloud computing environments. IJCAC 6(3), 32\u201344 (2016)","journal-title":"International Journal of Cloud Applications and Computing"},{"issue":"2","key":"39_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJERTCS.2016070101","volume":"7","author":"Mouna Jouini","year":"2016","unstructured":"Jouini, M., Ben Arfa Rabai, L.: A multi-dimensional mean failure cost model to enhance security of cloud computing systems. IJERTCS 7(2), 1\u201314 (2016)","journal-title":"International Journal of Embedded and Real-Time Communication Systems"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Goettelmann, E., Dahman, K., Gateau, B., Dubois, E., Godart, C.: A security risk assessment model for business process deployment in the cloud, SCC. IEEE, pp. 307\u2013314 (2014)","DOI":"10.1109\/SCC.2014.48"},{"key":"39_CR14","unstructured":"Zhao, X., Dai, M., Ren, S., Li, L., Duan, Z.: Risk assessment model of information security for transportation industry system based on risk matrix. Appl. Math. Inf. Sci. 3, 1301\u20131306 (2014)"},{"key":"39_CR15","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/B978-0-12-800221-6.00006-0","volume-title":"Security Risk Assessment","author":"John M. White","year":"2014","unstructured":"White, J.M.: Security Risk Assessment Managing Physical and Operational Security (2014)"},{"key":"39_CR16","unstructured":"Sun, L., Srivastava, R.P., Mock, T.J.: An information systems security risk assessment model under dempsterschafer theory of belief functions. J. Manage. Inf. Syst. 22(4), 109\u2013142 (2006)"},{"key":"39_CR17","unstructured":"Nincic, D.J., Bruce, C.: The utility of risk assessment tools in maritime security analysis. \n                    http:\/\/iamu-edu.org\/wp-content\/uploads\/2014\/07\/28_TheUtilityofRisk.pdf"},{"key":"39_CR18","unstructured":"Daly, J.C.K.: Al-Qaeda and maritime terrorism, part I, The Terrorism Monitor, Jamestown Foundation (2003)"},{"key":"39_CR19","doi-asserted-by":"crossref","unstructured":"Richardson, M.: A time bomb for global trade: Maritime-related terrorism in an age of weapons of mass destruction, Viewpoints, Institute of South East Asian Studies (2004)","DOI":"10.1355\/9789812305381"}],"container-title":["Communications in Computer and Information Science","Parallel and Distributed Computing, Applications and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5907-1_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:02:48Z","timestamp":1558396968000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5907-1_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811359064","9789811359071"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5907-1_39","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PDCAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Parallel and Distributed Computing: Applications and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pdcat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.pdcat2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}