{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:59Z","timestamp":1750306559657,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["EC-SPRIDE"],"award-info":[{"award-number":["EC-SPRIDE"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2683467.2683474","type":"proceedings-article","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T13:32:15Z","timestamp":1420464735000},"page":"69-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["An Asset to Security Modeling?"],"prefix":"10.1145","author":[{"given":"Andreas","family":"Poller","sequence":"first","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany"}]},{"given":"Sven","family":"T\u00fcrpe","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology, Darmstadt, Germany"}]},{"given":"Katharina","family":"Kinder-Kurlanda","sequence":"additional","affiliation":[{"name":"GESIS - Leibniz-Institute for the Social Sciences, K\u00f6ln, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"R.\n       \n      Anderson\n    .\n      \n  \n   \n  Liability and computer security: Nine principles. In D. Gollmann editor Computer Security -- ESORICS 94 volume \n  875\n   of \n  LNCS pages \n  231\n  --\n  245\n  . \n  Springer Berlin \/ Heidelberg 1994\n  .   R. Anderson. Liability and computer security: Nine principles. In D. Gollmann editor Computer Security -- ESORICS 94 volume 875 of LNCS pages 231--245. Springer Berlin \/ Heidelberg 1994.","DOI":"10.1007\/3-540-58618-0_67"},{"key":"e_1_3_2_1_2_1","unstructured":"R. J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley 2nd edition 2010.   R. J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley 2nd edition 2010."},{"volume-title":"Proc. WEIS","year":"2010","author":"B\u00f6hme R.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00117"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1091015"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2103_2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0092-x"},{"volume-title":"Pitman","year":"1984","author":"Freeman R. E.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2013.6613114"},{"key":"e_1_3_2_1_10_1","unstructured":"D. Gollmann. Computer Security. Wiley 3rd edition 2011.   D. Gollmann. Computer Security. Wiley 3rd edition 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70754"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719032"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1988.tb01168.x"},{"volume-title":"39th annual IASSIST conference","year":"2013","author":"Kinder-Kurlanda K.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413296.2413303"},{"volume-title":"Springer","year":"2011","author":"Lund M. S.","key":"e_1_3_2_1_16_1"},{"volume-title":"National Institute of Standards and Technology","year":"2011","author":"Managing","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807763"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/366173.366208"},{"issue":"2","key":"e_1_3_2_1_20_1","first-page":"61","article-title":"Strategies for assessing and managing organizational stakeholders","volume":"5","author":"Savage G. T.","year":"1991","journal-title":"The Executive"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.2218\/ijdc.v8i2.285"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/794197.795068"},{"volume-title":"Microsoft Press","year":"2004","author":"Swiderski F.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057977.1057979"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"}],"event":{"name":"NSPW '14: New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Victoria British Columbia Canada","acronym":"NSPW '14"},"container-title":["Proceedings of the 2014 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683474","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2683467.2683474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:59Z","timestamp":1750227179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683474"}},"subtitle":["Analyzing Stakeholder Collaborations Instead of Threats to Assets"],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":25,"alternative-id":["10.1145\/2683467.2683474","10.1145\/2683467"],"URL":"https:\/\/doi.org\/10.1145\/2683467.2683474","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}