{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:42:27Z","timestamp":1762004547320},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,8,31]],"date-time":"2013-08-31T00:00:00Z","timestamp":1377907200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s10207-013-0207-8","type":"journal-article","created":{"date-parts":[[2013,8,30]],"date-time":"2013-08-30T08:12:17Z","timestamp":1377850337000},"page":"63-79","source":"Crossref","is-referenced-by-count":25,"title":["RORI-based countermeasure selection using the OrBAC formalism"],"prefix":"10.1007","volume":"13","author":[{"given":"Gustavo","family":"Gonzalez Granadillo","sequence":"first","affiliation":[]},{"given":"Malek","family":"Belhaouane","sequence":"additional","affiliation":[]},{"given":"Herv\u00e9","family":"Debar","sequence":"additional","affiliation":[]},{"given":"Gr\u00e9goire","family":"Jacob","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,31]]},"reference":[{"key":"207_CR1","unstructured":"Brocke, J., Strauch, G., Buddendick, C.: Return on security investment. In: Design Principles of Measurement System Based on Capital Budgeting, Information Systems Technology and its Applications, pp. 21\u201332 (2007)"},{"key":"207_CR2","unstructured":"Cremonini, M., Martini, P.: Evaluating information security investment from attackers perspective: the return-on-attack (ROA). In: Proceedings of the 4th Workshop on the Economics on Information Security (2005)"},{"key":"207_CR3","doi-asserted-by":"crossref","unstructured":"Jeffrey, M.: Return on investment analysis for e-business projects, internet encyclopedia, 1st edn. Hossein Bidgoli Editor, vol. 3, pp. 211\u2013236 (2004)","DOI":"10.1002\/047148296X.tie154"},{"key":"207_CR4","doi-asserted-by":"crossref","unstructured":"Kheir, N., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: A service dependency model for cost-sensitive intrusion response. In: 15th European Symposium on Research in Computer Security, pp. 626\u2013642 (2010)","DOI":"10.1007\/978-3-642-15497-3_38"},{"key":"207_CR5","unstructured":"Schmidt, M.: Return on investment (ROI) definition, meaning and use, encyclopedia of business terms and methods. Available at: http:\/\/www.business-case-analysis.com\/return-on-investment.html . Accessed 15 Aug 2013 (2011)"},{"key":"207_CR6","unstructured":"Sonnenreich, W., Albanese, J., Stout, B.: Return on security investment (ROSI). A practical quantitative model. J. Res. Pract. Inf. Technol. 38(1), 55\u201356 (2006)"},{"key":"207_CR7","doi-asserted-by":"crossref","unstructured":"Stakhanova, N., Basu, S., Wong, J.: A cost-sensitive model for preemptive intrusion response systems. In: 21st International Conference on Advanced Networking and Applications (2007)","DOI":"10.1109\/AINA.2007.9"},{"key":"207_CR8","doi-asserted-by":"crossref","unstructured":"Kim, D., Lee, T., In, H.: Effective security safeguard selection process for return on security investment. In: Asia-Pacific services computing conference (2008)","DOI":"10.1109\/APSCC.2008.182"},{"key":"207_CR9","unstructured":"Kheir, N.: Response policies and countermeasures: management of service dependencies and intrusion and reaction impacts. PhD Thesis, Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications de Bretagne (2010)"},{"key":"207_CR10","doi-asserted-by":"crossref","unstructured":"Nakatsu, D., Li, Y., Sakijama, K., Ohta, K.: Combination of SW countermeasure and CPU modification on FPGA against power analysis. In: 11th International Conference on Information Security Applications, pp. 258\u2013272 (2011)","DOI":"10.1007\/978-3-642-17955-6_19"},{"key":"207_CR11","unstructured":"Harwood, D., Torbic, D., Richard, K., Meyer, M.: SafetyAnalyst: software tools for safety management of specific highway sites. Federal Highway Administration, Publication No. FHWA-HRT-10-063 (2010)"},{"key":"207_CR12","unstructured":"Duan, C., Cleland-Huang, J.: Automated safeguard selection strategies. CTI Research Symposium (2006)"},{"key":"207_CR13","doi-asserted-by":"crossref","unstructured":"Tae Hyun, K., Dong-Guk, H., Katsujuki O., Jongin L.: Generic cryptanalysis of combined countermeasures with randomized BSD representations. In: 7th International Federation for Information Processing (IFIP), Smart Card Research and Advanced Applications, pp. 119\u2013134 (2006)","DOI":"10.1007\/11733447_9"},{"key":"207_CR14","unstructured":"Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: 8th International Workshop on Policies for Distributed Systems and Networks (2003)"},{"key":"207_CR15","unstructured":"Miege, A.: Definition of a formal framework for specifying security policies. The OrBAC model and extensions. PhD Thesis, Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications Paris (2005)"},{"key":"207_CR16","unstructured":"Cuppens, F., Cuppens-Boulahia, N., Miege, A.: Inheritance hierarchies in the Or-BAC model and application in a network environment. In: The 2nd Foundation of Computer Security, Workshop (2004)"},{"issue":"4","key":"207_CR17","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s10207-007-0051-9","volume":"7","author":"F Cuppens","year":"2007","unstructured":"Cuppens, F., Cuppens-Boulahia, N.: Modelling contextual security policies. Int. J. Inf. Secur. 7(4), 285\u2013305 (2007)","journal-title":"Int. J. Inf. Secur."},{"key":"207_CR18","unstructured":"Kosutic, D.: Is it possible to calculate the Return on Security Investment (ROSI)? Available at: http:\/\/blog.iso27001standard.com\/2011\/06\/13\/is-it-possible-to-calculate-the-return-on-security-investment-rosi\/ (2011)"},{"key":"207_CR19","unstructured":"Locher, C.: Methodologies for evaluating information security investments\u2013what basel II can change in the financial industry. In: ECIS Proceedings, Paper 122 (2005)"},{"key":"207_CR20","unstructured":"Lockstep Consulting.: A guide for government agencies calculating return on security investment. Available at: http:\/\/lockstep.com.au\/library\/return_on_investment (2004)"},{"key":"207_CR21","unstructured":"Puangsri, P.: Quantified return on information security investment\u2014a model for cost-benefit analysis. Delf University of Technology, Master Thesis (2009)"},{"key":"207_CR22","volume-title":"Return on Investment Analysis for E-business Projects, The Internet Encyclopedia","author":"M Jeffery","year":"2004","unstructured":"Jeffery, M.: Return on Investment Analysis for E-business Projects, The Internet Encyclopedia. Wiley, London (2004)"},{"key":"207_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1137\/1012001","volume":"12","author":"J Halton","year":"1970","unstructured":"Halton, J.: A retrospective and prospective survey of the Monte Carlo method. SIAM Rev. 12, 1\u201363 (1970)","journal-title":"SIAM Rev."},{"key":"207_CR24","first-page":"187","volume-title":"Triangular Distribution Ch 40 in Statistical Distributions","author":"M Evans","year":"2000","unstructured":"Evans, M., Hastings, N., Peacock, B.: Triangular Distribution Ch 40 in Statistical Distributions, 3rd edn, pp. 187\u2013188. Wiley, New York (2000)","edition":"3"},{"key":"207_CR25","unstructured":"National Institute of Standards and Technologies: Guide for conducting risk assessment. Available at: http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-30-rev1\/sp800_30_r1.pdf (2012)"},{"key":"207_CR26","unstructured":"International Standard ISO\/IEC 27005: Information Technology\u2014Security Techniques\u2014Information Security Risk Management (2008)"},{"key":"207_CR27","unstructured":"Clusif: MEHARI 2010\u2014risk analysis and treatment guide. Available at: http:\/\/www.clusif.asso.fr\/fr\/production\/ouvrages\/pdf\/MEHARI-2010-Risk-Analysis-and-Treatment-Guide.pdf (2010)"},{"key":"207_CR28","unstructured":"ANSSI: EBIOS 2010\u2014expression of needs and identification of security objectives. Available at: http:\/\/www.ssi.gouv.fr\/en\/the-anssi\/publications-109\/methods-to-achieve-iss\/ebios-2010-expression-of-needs-and-identification-of-security-objectives.html (2010)"},{"key":"207_CR29","unstructured":"Siemens Enterprise: The logic behind CRAMM\u2019s assessment of measures of risk and determination of appropriate countermeasures. Technical Report. Available at: http:\/\/www.cramm.com\/downloads\/techpapers.htm (2005)"},{"key":"207_CR30","unstructured":"SDL Team Microsoft: Attack surface analyzer 1.0 released. Available at: http:\/\/blogs.msdn.com\/b\/sdl\/archive\/2012\/08\/02\/attack-surface-analyzer-1-0-released.aspx (2012)"},{"key":"207_CR31","volume-title":"Risk Analysis and Security Countermeasure Selection","author":"T Norman","year":"2010","unstructured":"Norman, T.: Risk Analysis and Security Countermeasure Selection. CRC Press, Taylor & Francis Group, London (2010)"},{"key":"207_CR32","unstructured":"Swiler, L., Paez, T., Mayes, R.: Epistemic uncertainty quantification tutorial. In: Conference and Exposition on Structural Dynamics\u2014Model Verification and Validation, IMAC XXVII (2009)"},{"key":"207_CR33","unstructured":"Sandia National Laboratories: DAKOTA, A multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification and sensitivity analysis. Available at: http:\/\/dakota.sandia.gov\/index.html"},{"key":"207_CR34","unstructured":"MASSIF Deliverable D5.2.1: Decision support, simulation, and deployment software components. Available at: http:\/\/www.massifproject.eu\/list_deliverables (2012)"},{"key":"207_CR35","unstructured":"Manadhata, P.: An attack surface metric. PhD Thesis, School of Computer Science, Carnegie Mellon University (2008)"},{"key":"207_CR36","doi-asserted-by":"crossref","unstructured":"Manadhata, P., Wing, J., Flynn, M., McQueen, M.: Measuring the attack surfaces of tWO FTP Deamons. In: Proceedings of the 2nd ACM Workshop on Wuality of Protection, pp. 3\u201310 (2006)","DOI":"10.1145\/1179494.1179497"},{"key":"207_CR37","unstructured":"Manadhata, P., Karabulut, Y., Wing, J.: Measuring the attack surfaces of SAP business applications. In: IEEE International Symposium on Software Reliability Engineering (2008)"},{"key":"207_CR38","unstructured":"Manadhata, P., Wing, J.: An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371\u2013386 (2010)"},{"key":"207_CR39","doi-asserted-by":"crossref","unstructured":"Howard, M., Wing, J.: Measuring relative attack surfaces. In: Computer Security in the 21st Century, pp. 109\u2013137 (2005)","DOI":"10.1007\/0-387-24006-3_8"},{"key":"207_CR40","doi-asserted-by":"crossref","unstructured":"Gonzalez Granadillo, G., Debar, H., Jacob, G., Gaber, C., Achemlal, M.: Individual countermeasure selection based on the return on response investment index. In: International Conference Mathematical Methods, Models and Architectures for Computer Network Security, LNCS 7531, pp. 156\u2013170 (2012)","DOI":"10.1007\/978-3-642-33704-8_14"},{"key":"207_CR41","volume-title":"Discrete and Combinatorial Mathematics. An Applied Introduction","author":"R Grimaldit","year":"1985","unstructured":"Grimaldit, R.: Discrete and Combinatorial Mathematics. An Applied Introduction. Addison-Wesley, Reading, MA (1985)"},{"key":"207_CR42","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511801655","volume-title":"Analytic Combinatorics","author":"P Flajolet","year":"2009","unstructured":"Flajolet, P., Sedgewick, R.: Analytic Combinatorics. Cambridge University Press, Cambridge (2009)"},{"key":"207_CR43","doi-asserted-by":"crossref","DOI":"10.1002\/9780471743064","volume-title":"Probability, Statistics, and Stochastic Processes","author":"P Olofsson","year":"2005","unstructured":"Olofsson, P.: Probability, Statistics, and Stochastic Processes. Wiley, London (2005)"},{"key":"207_CR44","unstructured":"Rheinfurth, M.H., Howell, L.W.: Probability and statistics in aerospace engineering. NASA Center for AeroSpace Information (1998)"},{"key":"207_CR45","volume-title":"Discrete Mathematics and its Applications","author":"K Rosen","year":"1994","unstructured":"Rosen, K.: Discrete Mathematics and its Applications. McGraw Hill, New York (1994)"},{"key":"207_CR46","doi-asserted-by":"crossref","unstructured":"Granadillo, G.G., Debar, H., Jacob, G., Coppolino, L.: Combination approach to select optimal countermeasures based on the RORI Index. In: Second International Conference on the Innovative Computing Technology (2012)","DOI":"10.1109\/INTECH.2012.6457801"},{"key":"207_CR47","unstructured":"Horrocks, I., Patel-Schneider, P., Boley, H., Tabet, S., Grosof, B., Dean, M.: SWRL: A semantic web rule language combining OWL and RuleML, W3C member submission. Available at: http:\/\/www.w3.org\/Submission\/SWRL (2004)"},{"key":"207_CR48","doi-asserted-by":"crossref","unstructured":"Gonzalez, Granadillo G., Mustapha, Y.B.: An ontology-driven approach to model SIEM information and operations using the SWRL formalism. Int. J. Electron. Secur. Digit. Forensics 4(2\/3), 104\u2013123 (2012)","DOI":"10.1504\/IJESDF.2012.048412"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-013-0207-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-013-0207-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-013-0207-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T17:35:10Z","timestamp":1563816910000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-013-0207-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,31]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["207"],"URL":"https:\/\/doi.org\/10.1007\/s10207-013-0207-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,31]]}}}