{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:07:54Z","timestamp":1730282874661,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127476","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T16:34:31Z","timestamp":1330619671000},"page":"1267-1272","source":"Crossref","is-referenced-by-count":1,"title":["A methodology for the structured security analysis of interconnections"],"prefix":"10.1109","author":[{"given":"D.","family":"Boonstra","sequence":"first","affiliation":[]},{"given":"H.A.","family":"Schotanus","sequence":"additional","affiliation":[]},{"given":"C.A.A","family":"Verkoelen","sequence":"additional","affiliation":[]},{"given":"A.C.M.","family":"Smulders","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Common Criteria for Information Technology Security Evaluation v3 Part 1 Introduction and general model","year":"2009","key":"3"},{"journal-title":"Decomposition of the Security Requirements for Connected Information Domains","year":"0","author":"schotanus","key":"2"},{"journal-title":"Whitepaper Interconnected Networks and Security","year":"2010","author":"smulders","key":"10"},{"key":"1","first-page":"529","article-title":"NATO Network Enabled Capability Feasibility Study - Executive Summary","volume":"a247","author":"buckman","year":"2010","journal-title":"Phil Trans Roy Soc London"},{"journal-title":"Directive on the Security of Information","year":"2005","key":"7"},{"journal-title":"Voorschrift Informatiebeveiliging Rijksdienst - Bijzondere Informatie","year":"2004","key":"6"},{"journal-title":"Common Criteria for Information Technology Security Evaluation - Part 3 Security Assurance Components","year":"2009","key":"5"},{"journal-title":"Common Criteria for Information Technology Security Evaluation Part 2 Security Functional Components","year":"2009","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/283751.283772"},{"journal-title":"IRAM III - Threat and Vulnerability Assessment - Supporting Information Information Security Forum","year":"0","key":"8"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127476.pdf?arnumber=6127476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T14:42:42Z","timestamp":1490107362000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127476\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127476","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}