iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/QRE.3052
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T13:43:55Z","timestamp":1693057435653},"reference-count":16,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2021,12,29]],"date-time":"2021-12-29T00:00:00Z","timestamp":1640736000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Quality & Reliability Eng"],"published-print":{"date-parts":[[2022,6]]},"abstract":"Abstract<\/jats:title>Business critical systems (BCS) are those systems whose failure may lead to loss of business or damage to reputation in the market. This is often due to the interruption of service caused by the system being unusable. Therefore, non functional requirements (NFRs) such as availability and security play a crucial role during the development of BCS to mitigate impact to the risk. Nowadays, E\u2010commerce businesses contribute a significant amount to the GDP of any country. Availability of such systems should be high as well as these systems should be secured against threats. Therefore, in this work, a framework is proposed for the availability analysis during the design phase of the BCS. Also, an approach is used for the security analysis of BCS. A case study of the E\u2010commerce business system is taken to illustrate our framework.<\/jats:p>","DOI":"10.1002\/qre.3052","type":"journal-article","created":{"date-parts":[[2021,12,29]],"date-time":"2021-12-29T09:27:24Z","timestamp":1640770044000},"page":"2218-2232","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Availability and security analysis of business\u2010critical systems: A case study of e\u2010commerce business process"],"prefix":"10.1002","volume":"38","author":[{"given":"Mohan Rao","family":"Mamdikar","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering National Institute of Tecnology Jamshedpur Jamshedpur India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8067-9727","authenticated-orcid":false,"given":"Vinay","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering National Institute of Tecnology Jamshedpur Jamshedpur India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2425-6003","authenticated-orcid":false,"given":"Pooja","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of applied mathematics VJTI Mumbai India"}]},{"given":"Subhash","family":"Chandra","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering National Institute of Tecnology Patna Patna India"}]}],"member":"311","published-online":{"date-parts":[[2021,12,29]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2248358"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/qre.2340"},{"key":"e_1_2_8_4_1","first-page":"559","article-title":"Proceedings of the eighth international conference on bio\u2010inspired computing: theories and applications (BIC\u2010TA), 2013","volume":"212","author":"Yin Z","year":"2013","journal-title":"Adv Intell Syst Comput"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-017-0593-x"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974883"},{"key":"e_1_2_8_7_1","article-title":"Petri net\u2010based methods for analyzing structural security in e\u2010commerce business processes","author":"Yu W","year":"2018","journal-title":"Futur Gener Comput Syst"},{"key":"e_1_2_8_8_1","doi-asserted-by":"crossref","unstructured":"YuW LiuL AnY ZhaiX.Analyzing the validation flaws of online shopping systems based on coloured petri nets.Proc. \u2010 2019 IEEE SmartWorld Ubiquitous Intell. Comput. Adv. Trust. Comput. Scalable Comput. Commun. Internet People Smart City Innov. SmartWorld\/UIC\/ATC\/SCALCOM\/IOP\/SCI 2019 pp.1706\u20101710;2019.","DOI":"10.1109\/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00304"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJEIS.2020010105"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.6.7.1181-1187"},{"key":"e_1_2_8_11_1","first-page":"5013","article-title":"Security analysis of mandatory access control model","volume":"6","author":"Jiang Y","year":"2004","journal-title":"Conf Proc \u2010 IEEE Int Conf Syst Man Cybern"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2007.896995"},{"key":"e_1_2_8_13_1","unstructured":"SheriefNadaH Abdel\u2010HamidAymanA MaharKhaledM :Threat\u2010driven modeling framework for secure software using aspect\u2010oriented Stochastic Petri nets.2010 The 7th International Conference on Informatics and Systems (INFOS) pp.1\u20108.2010; IEEE."},{"key":"e_1_2_8_14_1","unstructured":"C. Team: Common vulnerability scoring system v3. 0: Specification document. First. org;2015."},{"key":"e_1_2_8_15_1","unstructured":"MellPeter ScarfoneKaren RomanoskySasha :A complete guide to the common vulnerability scoring system version 2.0.Published by FIRST\u2010forum of incident response and security teams vol.1 pp.1\u201023;2007."},{"key":"e_1_2_8_16_1","doi-asserted-by":"crossref","unstructured":"WangJuAn WangHao GuoMinzhe XiaMin :Security metrics for software systems. In:Proceedings of the 47th Annual Southeast Regional Conference pp.1\u20106;2009.","DOI":"10.1145\/1566445.1566509"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.anucene.2020.107657"}],"container-title":["Quality and Reliability Engineering International"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/qre.3052","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/qre.3052","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/qre.3052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T15:13:07Z","timestamp":1692976387000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/qre.3052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,29]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,6]]}},"alternative-id":["10.1002\/qre.3052"],"URL":"http:\/\/dx.doi.org\/10.1002\/qre.3052","archive":["Portico"],"relation":{},"ISSN":["0748-8017","1099-1638"],"issn-type":[{"value":"0748-8017","type":"print"},{"value":"1099-1638","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,29]]},"assertion":[{"value":"2021-03-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-11-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}