{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:59:53Z","timestamp":1725580793318},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/crisis.2009.5411967","type":"proceedings-article","created":{"date-parts":[[2010,2,17]],"date-time":"2010-02-17T13:30:04Z","timestamp":1266413404000},"page":"123-126","source":"Crossref","is-referenced-by-count":5,"title":["Untrustworthiness: A trust-based security metric"],"prefix":"10.1109","author":[{"given":"Afonso Araujo","family":"Neto","sequence":"first","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"OWASP Top 10","article-title":"Open Web Application Security Project (OWASP)","year":"2007","key":"ref10"},{"key":"ref11","article-title":"A Guide to Security Metrics","author":"payne","year":"2006","journal-title":"SANS Institute Information Security Reading Room"},{"key":"ref12","article-title":"Top Ten Database Security Threats","author":"shoulman","year":"2009","journal-title":"White Paper"},{"key":"ref13","article-title":"Security Metrics for Communication Systems","author":"torgerson","year":"2007","journal-title":"12th ICCRTS Newport"},{"journal-title":"Common Criteria","article-title":"Commercial Database Management System Protection Profile (C.DBMS PP)","year":"1998","key":"ref4"},{"journal-title":"CIS Benchmarks\/Scoring tools","article-title":"Center for Internet Security","year":"2008","key":"ref3"},{"year":"2005","key":"ref6","article-title":"INFOSEC Research Council. Hard Problem List"},{"journal-title":"Common Criteria","article-title":"Database Management System Protection Profile (DBMS PP)","year":"2000","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1998.738653"},{"key":"ref7","article-title":"Directions in Security Metrics Research","author":"jansen","year":"2009","journal-title":"NISTIR 7564"},{"key":"ref2","article-title":"A Trust-Based Benchmark for DBMS Configurations","author":"ara\u00fajo neto","year":"2009","journal-title":"Proceedings of the IEEE International Symposium Pacific Rim Dependable Computing (PRDC'09)"},{"key":"ref1","article-title":"Towards Assessing the Security of DBMS Configurations","author":"ara\u00fajo neto","year":"2008","journal-title":"International conf on Dependable Systems and Networks (DSN 2000)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2008.45"}],"event":{"name":"2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009)","start":{"date-parts":[[2009,10,19]]},"location":"Toulouse","end":{"date-parts":[[2009,10,22]]}},"container-title":["2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5405769\/5411964\/05411967.pdf?arnumber=5411967","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T23:33:59Z","timestamp":1489880039000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5411967\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/crisis.2009.5411967","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}