Model-driven risk analysis: the CORAS approach
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Heidelberg ; Dordrecht ; London ; New York
Springer
[2011]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | xvi, 460 Seiten Illustrationen 24 cm |
ISBN: | 9783642123221 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044301104 | ||
003 | DE-604 | ||
005 | 20170523 | ||
007 | t | ||
008 | 170508s2011 a||| |||| 00||| eng d | ||
015 | |a 10N10 |2 dnb | ||
016 | 7 | |a 1000568989 |2 DE-101 | |
020 | |a 9783642123221 |c Pp. : ca. EUR 74.85 (freier Pr.), ca. sfr 116.50 (freier Pr.) |9 978-3-642-12322-1 | ||
035 | |a (OCoLC)694875670 | ||
035 | |a (DE-599)DNB1000568989 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91G | ||
050 | 0 | |a HD61 | |
082 | 0 | |a 004 | |
084 | |a DAT 780f |2 stub | ||
084 | |a 50.03 |2 bkl | ||
084 | |a WIR 547f |2 stub | ||
084 | |a 54.38 |2 bkl | ||
100 | 1 | |a Lund, Mass Soldal |e Verfasser |4 aut | |
245 | 1 | 0 | |a Model-driven risk analysis |b the CORAS approach |c Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen |
264 | 1 | |a Heidelberg ; Dordrecht ; London ; New York |b Springer |c [2011] | |
300 | |a xvi, 460 Seiten |b Illustrationen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 4 | |a Risk assessmentxComputer simulation | |
650 | 4 | |a Risk management | |
650 | 0 | 7 | |a Risikoanalyse |0 (DE-588)4137042-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersimulation |0 (DE-588)4148259-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Risikoanalyse |0 (DE-588)4137042-9 |D s |
689 | 0 | 1 | |a Computersimulation |0 (DE-588)4148259-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Solhaug, Bjørnar |e Verfasser |4 aut | |
700 | 1 | |a Stølen, Ketil |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-12323-8 |
856 | 4 | |q application/pdf |u http://d-nb.info/1000568989/04 |3 Inhaltsverzeichnis | |
856 | 4 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3435205&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029704983&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029704983 |
Datensatz im Suchindex
_version_ | 1806413574223953920 |
---|---|
adam_text |
IMAGE 1
CONTENTS
PART I INTRODUCTORY OVERVIEW 1 INTRODUCTION 3
1.1 THE IMPORTANCE OF RISK ANALYSIS 3
1.2 ASSET IDENTIFICATION 4
1.3 RISK MODELLING 5
1.4 THE CORAS APPROACH 5
1.4.1 THE CORAS LANGUAGE 6
1.4.2 THE CORAS TOOL 6
1.4.3 THE CORAS METHOD 6
1.5 THE GENERALITY OF CORAS 7
1.6 OVERALL AIM AND EMPHASIS 8
1.7 ORGANISATION 8
1.7.1 PART I: INTRODUCTORY OVERVIEW 9
1.7.2 PART II: CORE APPROACH 9
1.7.3 PART III: SELECTED ISSUES 11
1.7.4 APPENDICES 12
1.8 COLOURS IN CORAS AND IN THIS BOOK 13
2 BACKGROUND AND RELATED APPROACHES 15
2.1 BASIC TERMINOLOGY 15
2.2 RELATED APPROACHES 17
2.2.1 RISK ANALYSIS METHODS 17
2.2.2 TABLE-BASED RISK ANALYSIS TECHNIQUES 18
2.2.3 TREE-BASED RISK ANALYSIS TECHNIQUES 18
2.2.4 GRAPH-BASED RISK ANALYSIS TECHNIQUES 19
2.2.5 SITUATING CORAS WITHIN THIS PICTURE 20
3 A GUIDED TOUR OF THE CORAS METHOD 23
3.1 PREPARATIONS FOR THE ANALYSIS 23
3.2 CUSTOMER PRESENTATION OF THE TARGET 25
3.3 REFINING THE TARGET DESCRIPTION USING ASSET DIAGRAMS 26
IX
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1000568989
DIGITALISIERT DURCH
IMAGE 2
X CONTENTS
3.4 APPROVAL OF THE TARGET DESCRIPTION 31
3.5 RISK IDENTIFICATION USING THREAT DIAGRAMS 33
3.6 RISK ESTIMATION USING THREAT DIAGRAMS 37
3.7 RISK EVALUATION USING RISK DIAGRAMS 39
3.8 RISK TREATMENT USING TREATMENT DIAGRAMS 41
PART II CORE APPROACH
4 THE CORAS RISK MODELLING LANGUAGE 47
4.1 CENTRAL CONCEPTS 48
4.1.1 WHAT IS A THREAT? 48
4.1.2 WHAT IS A THREAT SCENARIO? 49
4.1.3 WHAT IS A VULNERABILITY? 51
4.1.4 WHAT IS AN UNWANTED INCIDENT? 53
4.1.5 WHAT IS AN ASSET? 55
4.2 THE DIAGRAMS OF THE CORAS LANGUAGE 56
4.2.1 ASSET DIAGRAMS 56
4.2.2 THREAT DIAGRAMS 58
4.2.3 RISK DIAGRAMS 60
4.2.4 TREATMENT DIAGRAMS 62
4.2.5 TREATMENT OVERVIEW DIAGRAMS 64
4.3 HOW TO SCHEMATICALLY TRANSLATE CORAS DIAGRAMS INTO ENGLISH PROSE 65
4.3.1 HOW TO TRANSLATE ASSET DIAGRAMS 65
4.3.2 HOW TO TRANSLATE THREAT DIAGRAMS 67
4.3.3 HOW TO TRANSLATE RISK DIAGRAMS 69
4.3.4 HOW TO TRANSLATE TREATMENT DIAGRAMS 69
4.3.5 HOW TO TRANSLATE TREATMENT OVERVIEW DIAGRAMS 70 4.4 SUMMARY 71
5 PREPARATIONS FOR THE ANALYSIS 73
5.1 OVERVIEW OF STEP 1 73
5.2 CONDUCTING THE TASKS OF STEP 1 76
5.3 SUMMARY OF STEP 1 78
6 CUSTOMER PRESENTATION OF THE TARGET 81
6.1 OVERVIEW OF STEP 2 81
6.2 CONDUCTING THE TASKS OF STEP 2 83
6.2.1 PRESENTATION OF THE CORAS TERMINOLOGY AND METHOD . . 83 6.2.2
PRESENTATION OF THE GOALS AND TARGET OF THE ANALYSIS . . . 86 6.2.3
SETTING THE FOCUS AND SCOPE OF THE ANALYSIS 89
6.2.4 DETERMINING THE MEETING PLAN 91
6.3 SUMMARY OF STEP 2 94
7 REFINING THE TARGET DESCRIPTION USING ASSET DIAGRAMS 95 7.1 OVERVIEW
OF STEP 3 95
IMAGE 3
CONTENTS XI
7.2 CONDUCTING THE TASKS OF STEP 3 97
7.2.1 PRESENTATION OF THE TARGET BY THE ANALYSIS TEAM 97 7.2.2 ASSET
IDENTIFICATION 101
7.2.3 HIGH-LEVEL ANALYSIS 106
7.3 SUMMARY OF STEP 3 109
8 APPROVAL OF THE TARGET DESCRIPTION I LL
8.1 OVERVIEW OF STEP 4 I LL
8.2 CONDUCTING THE TASKS OF STEP 4 113
8.2.1 APPROVAL OF THE TARGET DESCRIPTION 114
8.2.2 RANKING OF ASSETS 115
8.2.3 SETTING THE CONSEQUENCE SCALES 116
8.2.4 SETTING THE LIKELIHOOD SCALE 118
8.2.5 DEFINING THE RISK FUNCTION 120
8.2.6 DECIDING THE RISK EVALUATION CRITERIA 122
8.3 SUMMARY OF STEP 4 124
9 RISK IDENTIFICATION USING THREAT DIAGRAMS 125
9.1 OVERVIEW OF STEP 5 125
9.2 CONDUCTING THE TASKS OF STEP 5 128
9.2.1 CATEGORISING THREAT DIAGRAMS 128
9.2.2 IDENTIFICATION OF THREATS AND UNWANTED INCIDENTS 129 9.2.3
IDENTIFICATION OF THREAT SCENARIOS 133
9.2.4 IDENTIFICATION OF VULNERABILITIES 137
9.3 SUMMARY OF STEP 5 144
10 RISK ESTIMATION USING THREAT DIAGRAMS 147
10.1 OVERVIEW OF STEP 6 147
10.2 CONDUCTING THE TASKS OF STEP 6 149
10.2.1 LIKELIHOOD ESTIMATION 150
10.2.2 CONSEQUENCE ESTIMATION 154
10.2.3 RISK ESTIMATION 157
10.3 SUMMARY OF STEP 6 163
11 RISK EVALUATION USING RISK DIAGRAMS 165
11.1 OVERVIEW OF STEP 7 165
11.2 CONDUCTING THE TASKS OF STEP 7 167
11.2.1 CONFIRMING THE RISK ESTIMATES 167
11.2.2 CONFIRMING THE RISK EVALUATION CRITERIA 168
11.2.3 PROVIDING A RISK OVERVIEW 169
11.2.4 ACCUMULATING RISKS 170
11.2.5 ESTIMATING RISKS WITH RESPECT TO INDIRECT ASSETS 173 11.2.6
EVALUATING THE RISKS 182
11.3 SUMMARY OF STEP 7 185
IMAGE 4
XII CONTENTS
12 RISK TREATMENT USING TREATMENT DIAGRAMS 187
12.1 OVERVIEW OF STEP 8 187
12.2 CONDUCTING THE RISK TREATMENT 188
12.2.1 GROUPING OF RISKS 189
12.2.2 TREATMENT IDENTIFICATION 191
12.2.3 TREATMENT EVALUATION 196
12.3 SUMMARY OF STEP 8 203
PART III SELECTED ISSUES
13 ANALYSING LIKELIHOOD USING CORAS DIAGRAMS 207
13.1 USING CORAS DIAGRAMS TO CALCULATE LIKELIHOOD 208 13.1.1 SPECIFYING
LIKELIHOOD USING CORAS DIAGRAMS 208 13.1.2 RULES FOR CALCULATING
PROBABILITY IN CORAS DIAGRAMS . . 210 13.1.3 RULES FOR CALCULATING
FREQUENCY IN CORAS DIAGRAMS . . . 222 13.1.4 LIKELIHOOD AS PROBABILITY
OR FREQUENCY 226
13.1.5 GENERALISATION TO INTERVALS AND DISTRIBUTIONS 227 13.2 USING
CORAS DIAGRAMS TO CHECK CONSISTENCY 229
13.3 USING CORAS TO ANALYSE SCENARIOS WITH LOGICAL CONNECTIVES . . 233
13.3.1 USING CORAS TO ANALYSE SCENARIOS WITH LOGICAL CONJUNCTION 233
13.3.2 USING CORAS TO ANALYSE SCENARIOS WITH LOGICAL DISJUNCTION 236
13.4 HOW TO STRUCTURE A THREAT DIAGRAM TO EXPLOIT THE POTENTIAL FOR
LIKELIHOOD ANALYSIS 237
13.4.1 ENABLING APPLICATION OF RULES BY COMPOSITION 237 13.4.2 ENABLING
APPLICATION OF RULES BY DECOMPOSITION 239 13.5 SUMMARY 243
14 THE HIGH-LEVEL CORAS LANGUAGE 245
14.1 REFERRING ELEMENTS AND REFERENCED DIAGRAMS 246
14.1.1 THREAT SCENARIOS 247
14.1.2 UNWANTED INCIDENTS 250
14.1.3 RISKS 251
14.1.4 TREATMENT SCENARIOS 253
14.2 LIKELIHOODS IN HIGH-LEVEL CORAS 257
14.2.1 REASONING ABOUT THE LIKELIHOODS IN A HIGH-LEVEL DIAGRAM . 260
14.2.2 REASONING ABOUT THE LIKELIHOODS IN A REFERENCED DIAGRAM 261
14.2.3 ANALYSING THE RELATION BETWEEN THE LIKELIHOODS OF A REFERRING
ELEMENT AND THE LIKELIHOODS IN THE REFERENCED
DIAGRAMS 263
14.3 CONSEQUENCES IN HIGH-LEVEL CORAS 264
14.4 RISK LEVELS IN HIGH-LEVEL CORAS 266
14.5 HOW TO SCHEMATICALLY TRANSLATE HIGH-LEVEL CORAS DIAGRAMS INTO
ENGLISH PROSE 267
IMAGE 5
CONTENTS XIII
14.5.1 REFERRING ELEMENTS 267
14.5.2 REFERENCED DIAGRAMS 270
14.6 EXAMPLE CASE IN HIGH-LEVEL CORAS 271
14.6.1 THREAT DIAGRAM 272
14.6.2 RISK DIAGRAM 275
14.6.3 TREATMENT DIAGRAM 277
14.7 SUMMARY 279
15 USING CORAS TO SUPPORT CHANGE MANAGEMENT 283
15.1 CLASSIFICATION OF CHANGES 283
15.1.1 TARGET OF ANALYSIS 284
15.1.2 SCOPE AND FOCUS 285
15.1.3 ENVIRONMENT 285
15.1.4 ASSUMPTIONS 285
15.1.5 PARTIES AND ASSETS 286
15.1.6 CONTEXT 286
15.1.7 CHANGES IN OUR KNOWLEDGE 287
15.2 MANAGING CHANGE 287
15.2.1 MAINTENANCE PERSPECTIVE 288
15.2.2 BEFORE-AFTER PERSPECTIVE 290
15.2.3 CONTINUOUS EVOLUTION PERSPECTIVE 294
15.3 SUMMARY 296
16 THE DEPENDENT CORAS LANGUAGE 297
16.1 MODELLING DEPENDENCIES USING THE CORAS LANGUAGE 298 16.1.1
DEPENDENT CORAS DIAGRAMS 299
16.1.2 REPRESENTING ASSUMPTIONS USING DEPENDENT CORAS DIAGRAMS 300
16.1.3 HOW TO SCHEMATICALLY TRANSLATE DEPENDENT CORAS DIAGRAMS INTO
ENGLISH PROSE 303
16.2 REASONING AND ANALYSIS USING DEPENDENT CORAS DIAGRAMS . . . 305
16.2.1 ASSUMPTION INDEPENDENCE 307
16.2.2 ASSUMPTION SIMPLIFICATION 308
16.2.3 TARGET SIMPLIFICATION 309
16.2.4 ASSUMPTION CONSEQUENCE 310
16.3 EXAMPLE CASE IN DEPENDENT CORAS 311
16.3.1 CREATING DEPENDENT THREAT DIAGRAMS 311
16.3.2 COMBINING DEPENDENT THREAT DIAGRAMS 313
16.4 SUMMARY 316
17 USING CORAS TO ANALYSE LEGAL ASPECTS 319
17.1 LEGAL RISK 319
17.2 UNCERTAINTY OF LEGAL ASPECTS 321
17.2.1 LEGAL UNCERTAINTY 322
17.2.2 FACTUAL UNCERTAINTY 323
17.2.3 COMBINING LEGAL AND FACTUAL UNCERTAINTY 324
IMAGE 6
XIV CONTENTS
17.3 MODELLING LEGAL ASPECTS USING THE CORAS LANGUAGE 326
17.3.1 LEGAL CORAS DIAGRAMS 326
17.3.2 HOW TO SCHEMATICALLY TRANSLATE LEGAL CORAS DIAGRAMS INTO ENGLISH
PROSE 328
17.4 ANALYSING LEGAL ASPECTS THROUGH THE EIGHT STEPS OF CORAS . . 330
17.5 SUMMARY 337
18 THE CORAS TOOL 339
18.1 MAIN FUNCTIONALITY OF THE CORAS TOOL 339
18.2 HOW TO USE THE CORAS TOOL DURING RISK ANALYSIS 341 18.2.1 INITIAL
MODELLING BEFORE A MEETING 341
18.2.2 ON-THE-FLY MODELLING DURING A MEETING 342
18.2.3 REVISING AND ANALYSING DIAGRAMS AFTER A MEETING 344 18.3
INTEGRATION WITH OTHER TOOLS 344
18.4 SUMMARY 345
19 RELATING CORAS TO THE STATE OF THE ART 347
19.1 RISK MODELLING 347
19.2 RISK ANALYSIS METHODS 350
19.3 LIKELIHOOD ANALYSIS 351
19.4 HIGH-LEVEL RISK MODELLING 353
19.5 CHANGE MANAGEMENT 354
19.6 DEPENDENCY ANALYSIS 355
19.7 LEGAL RISK MANAGEMENT 356
APPENDIX A THE CORAS LANGUAGE GRAMMAR 359
A.I BASIC CORAS 359
A.1.1 META-MODEL 359
A.1.2 EBNF GRAMMAR 364
A. 1.3 EXAMPLES 366
A.2 HIGH-LEVEL CORAS 370
A.2.1 META-MODEL 370
A.2.2 EBNF GRAMMAR 374
A.2.3 EXAMPLES 377
A.3 DEPENDENT CORAS 383
A.3.1 META-MODEL 383
A.3.2 EBNF GRAMMAR 385
A.3.3 EXAMPLE 386
A.4 LEGAL CORAS 387
A.4.1 META-MODEL 387
A.4.2 EBNF GRAMMAR 388
A.4.3 EXAMPLE 389
APPENDIX B THE CORAS LANGUAGE SEMANTICS 391
B.I BASIC CORAS 391
B.I.I ELEMENTS 392
IMAGE 7
CONTENTS XV
B.1.2 RELATIONS 392
B.1.3 DIAGRAMS 393
B.1.4 EXAMPLES 394
B.2 HIGH-LEVEL CORAS 398
B.2.1 REFERRING ELEMENTS 398
B.2.2 RELATIONS 399
B.2.3 REFERENCED DIAGRAMS 402
B.2.4 EXAMPLES 403
B.3 DEPENDENT CORAS 410
B.3.1 BORDER 410
B.3.2 DEPENDENT DIAGRAMS 411
B.3.3 EXAMPLE 411
B.4 LEGAL CORAS 412
B.4.1 ELEMENTS 412
B.4.2 RELATIONS 412
B.4.3 EXAMPLE 415
APPENDIX C THE CORAS GUIDELINES 417
C.I STEP 1 : PREPARATIONS FOR THE ANALYSIS 418
C.2 STEP 2: CUSTOMER PRESENTATION OF THE TARGET 418
C.2.1 STEP 2A: PRESENTATION OF THE CORAS TERMINOLOGY AND METHOD 419
C.2.2 STEP 2B: PRESENTATION OF THE GOALS AND TARGET OF THE ANALYSIS 419
C.2.3 STEP 2C: SETTING THE FOCUS AND SCOPE OF THE ANALYSIS . . . 420
C.2.4 STEP 2D: DETERMINING THE MEETING PLAN 420
C.3 STEP 3: REFINING THE TARGET DESCRIPTION USING ASSET DIAGRAMS . . .
421 C.3.1 STEP 3A: PRESENTATION OF THE TARGET BY THE ANALYSIS TEAM . .
422 C.3.2 STEP 3B: ASSET IDENTIFICATION 422
C.3.3 STEP 3C: HIGH-LEVEL ANALYSIS 422
C.4 STEP 4: APPROVAL OF THE TARGET DESCRIPTION 423
C.4.1 STEP 4A: APPROVAL OF THE TARGET DESCRIPTION 423
C.4.2 STEP 4B: RANKING OF ASSETS 424
C.4.3 STEP 4C: SETTING THE CONSEQUENCE SCALES 424
C.4.4 STEP 4D: SETTING THE LIKELIHOOD SCALE 424
C.4.5 STEP 4E: DEFINING THE RISK FUNCTION 424
C.4.6 STEP 4F: DECIDING THE RISK EVALUATION CRITERIA 425 C.5 STEP 5:
RISK IDENTIFICATION USING THREAT DIAGRAMS 425 C.5.1 STEP 5A:
CATEGORISING THREAT DIAGRAMS 426
C.5.2 STEP 5B: IDENTIFICATION OF THREATS AND UNWANTED INCIDENTS . 427
C.5.3 STEP 5C: IDENTIFICATION OF THREAT SCENARIOS 427
C.5.4 STEP 5D: IDENTIFICATION OF VULNERABILITIES 428
C.6 STEP 6: RISK ESTIMATION USING THREAT DIAGRAMS 428
C.6.1 STEP 6A: LIKELIHOOD ESTIMATION 429
C.6.2 STEP 6B: CONSEQUENCE ESTIMATION 429
IMAGE 8
XVI CONTENTS
C.6.3 STEP 6C: RISK ESTIMATION 430
C.7 STEP 7: RISK EVALUATION USING RISK DIAGRAMS 430
C.7.1 STEP 7A: CONFIRMING THE RISK ESTIMATES 431
C.7.2 STEP 7B: CONFIRMING THE RISK EVALUATION CRITERIA 431 C.7.3 STEP
7C: PROVIDING A RISK OVERVIEW 432
C.7.4 STEP 7D: ACCUMULATING RISKS 432
C.7.5 STEP 7E: ESTIMATING RISKS WITH RESPECT TO INDIRECT ASSETS . 432
C.7.6 STEP 7F: EVALUATING THE RISKS 433
C.8 STEP 8: RISK TREATMENT USING TREATMENT DIAGRAMS 433 C.8.1 STEP 8A:
GROUPING OF RISKS 434
C.8.2 STEP 8B: TREATMENT IDENTIFICATION 434
C.8.3 STEP 8C: TREATMENT EVALUATION 435
APPENDIX D THE CORAS TERMINOLOGY 437
APPENDIX E GLOSSARY OF TERMS 445
E.I LOGIC 445
E.2 SETS 445
E.3 LIKELIHOODS 445
E.4 LIKELIHOOD INTERVALS 446
E.5 DEDUCTIONS 447
E.6 EXTENDED BACKUS-NAUR FORM 447
E.7 SEMANTICS 448
E.8 MISCELLANEOUS 448
ACRONYMS 449
REFERENCES 451
INDEX 455 |
any_adam_object | 1 |
author | Lund, Mass Soldal Solhaug, Bjørnar Stølen, Ketil |
author_facet | Lund, Mass Soldal Solhaug, Bjørnar Stølen, Ketil |
author_role | aut aut aut |
author_sort | Lund, Mass Soldal |
author_variant | m s l ms msl b s bs k s ks |
building | Verbundindex |
bvnumber | BV044301104 |
callnumber-first | H - Social Science |
callnumber-label | HD61 |
callnumber-raw | HD61 |
callnumber-search | HD61 |
callnumber-sort | HD 261 |
callnumber-subject | HD - Industries, Land Use, Labor |
classification_tum | DAT 780f WIR 547f |
ctrlnum | (OCoLC)694875670 (DE-599)DNB1000568989 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV044301104</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170523</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170508s2011 a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10N10</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1000568989</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642123221</subfield><subfield code="c">Pp. : ca. EUR 74.85 (freier Pr.), ca. sfr 116.50 (freier Pr.)</subfield><subfield code="9">978-3-642-12322-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)694875670</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1000568989</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HD61</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 780f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">50.03</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 547f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.38</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Lund, Mass Soldal</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Model-driven risk analysis</subfield><subfield code="b">the CORAS approach</subfield><subfield code="c">Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Heidelberg ; Dordrecht ; London ; New York</subfield><subfield code="b">Springer</subfield><subfield code="c">[2011]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvi, 460 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk assessmentxComputer simulation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersimulation</subfield><subfield code="0">(DE-588)4148259-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Risikoanalyse</subfield><subfield code="0">(DE-588)4137042-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersimulation</subfield><subfield code="0">(DE-588)4148259-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Solhaug, Bjørnar</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stølen, Ketil</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-12323-8</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="q">application/pdf</subfield><subfield code="u">http://d-nb.info/1000568989/04</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3435205&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029704983&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029704983</subfield></datafield></record></collection> |
id | DE-604.BV044301104 |
illustrated | Illustrated |
indexdate | 2024-08-04T00:10:29Z |
institution | BVB |
isbn | 9783642123221 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029704983 |
oclc_num | 694875670 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM |
owner_facet | DE-91G DE-BY-TUM |
physical | xvi, 460 Seiten Illustrationen 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
spelling | Lund, Mass Soldal Verfasser aut Model-driven risk analysis the CORAS approach Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen Heidelberg ; Dordrecht ; London ; New York Springer [2011] xvi, 460 Seiten Illustrationen 24 cm txt rdacontent n rdamedia nc rdacarrier Literaturangaben Risk assessmentxComputer simulation Risk management Risikoanalyse (DE-588)4137042-9 gnd rswk-swf Computersimulation (DE-588)4148259-1 gnd rswk-swf Risikoanalyse (DE-588)4137042-9 s Computersimulation (DE-588)4148259-1 s DE-604 Solhaug, Bjørnar Verfasser aut Stølen, Ketil Verfasser aut Erscheint auch als Online-Ausgabe 978-3-642-12323-8 application/pdf http://d-nb.info/1000568989/04 Inhaltsverzeichnis text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3435205&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029704983&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Lund, Mass Soldal Solhaug, Bjørnar Stølen, Ketil Model-driven risk analysis the CORAS approach Risk assessmentxComputer simulation Risk management Risikoanalyse (DE-588)4137042-9 gnd Computersimulation (DE-588)4148259-1 gnd |
subject_GND | (DE-588)4137042-9 (DE-588)4148259-1 |
title | Model-driven risk analysis the CORAS approach |
title_auth | Model-driven risk analysis the CORAS approach |
title_exact_search | Model-driven risk analysis the CORAS approach |
title_full | Model-driven risk analysis the CORAS approach Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen |
title_fullStr | Model-driven risk analysis the CORAS approach Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen |
title_full_unstemmed | Model-driven risk analysis the CORAS approach Mass Soldal Lund, Bjørnar Solhaug, Ketil Stølen |
title_short | Model-driven risk analysis |
title_sort | model driven risk analysis the coras approach |
title_sub | the CORAS approach |
topic | Risk assessmentxComputer simulation Risk management Risikoanalyse (DE-588)4137042-9 gnd Computersimulation (DE-588)4148259-1 gnd |
topic_facet | Risk assessmentxComputer simulation Risk management Risikoanalyse Computersimulation |
url | http://d-nb.info/1000568989/04 http://deposit.dnb.de/cgi-bin/dokserv?id=3435205&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029704983&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT lundmasssoldal modeldrivenriskanalysisthecorasapproach AT solhaugbjørnar modeldrivenriskanalysisthecorasapproach AT stølenketil modeldrivenriskanalysisthecorasapproach |
Es ist kein Print-Exemplar vorhanden.
Beschreibung