{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:07Z","timestamp":1740099187938,"version":"3.37.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030028510"},{"type":"electronic","value":"9783030028527"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02852-7_12","type":"book-chapter","created":{"date-parts":[[2018,10,17]],"date-time":"2018-10-17T13:41:45Z","timestamp":1539783705000},"page":"130-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Assessment of Emerging Standards for Safety and Security Co-Design on a Railway Case Study"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Ponsard","sequence":"first","affiliation":[]},{"given":"Jeremy","family":"Grandclaudon","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Massonet","sequence":"additional","affiliation":[]},{"given":"Mounir","family":"Touzani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,18]]},"reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis, A.: Basic concepts and taxonomy of dependable and secure computing. IEEE Trans. Dependable Secure Comput. 1(1), 11\u201333 (2004)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MS.2017.4541050","volume":"35","author":"M Biro","year":"2018","unstructured":"Biro, M., Mashkoor, A., Sametinger, J., Seker, R.: Software safety and security risk mitigation in cyber-physical systems. IEEE Softw. 35(1), 24\u201329 (2018)","journal-title":"IEEE Softw."},{"key":"12_CR3","unstructured":"Blanquart, J.P., et al.: Criticality categories across safety standards in different domains. In: ERTS-2012, Toulouse (2012)"},{"key":"12_CR4","unstructured":"CENELEC: EN 50128 - Railway applications - Communications, signalling and processing systems - Software for railway control and protection systems (2011)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-3-319-24249-1_24","volume-title":"Computer Safety, Reliability, and Security","author":"B Chen","year":"2015","unstructured":"Chen, B., et al.: Security analysis of urban railway systems: the need for a cyber-physical perspective. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9338, pp. 277\u2013290. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24249-1_24"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Y.R., et al.: Unified security and safety risk assessment - a case study on nuclear power plant. In: 2014 International Conference on Trustworthy Systems and Their Applications, June 2014","DOI":"10.1109\/TSA.2014.13"},{"key":"12_CR7","unstructured":"Greenberg, A.: Hackers remotely kill a jeep on the highway-with me in it (2015). https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway"},{"key":"12_CR8","unstructured":"Hazell, P.M.: Integrating iec 62443 cyber security with existing industrial process and functional safety management systems (2017). http:\/\/bit.do\/cyber-combined"},{"key":"12_CR9","volume-title":"Railway Research - Selected Topics on Development, Safety and Technology","author":"Ali G. Hessami","year":"2015","unstructured":"Hessami, A.: A systems view of railway safety and security. In: Zboinski, K. (ed.) Railway Research, chap. 2. InTech, Rijeka (2015)"},{"key":"12_CR10","unstructured":"Howe, N.: Cybersecurity in railway signalling systems. Institution of Railways Signal Engineers News (2017)"},{"key":"12_CR11","unstructured":"Hulsebosch, B., van Velzen, A.: Inventory and Classification of Cybersecurity Standards. Ministry of Security and Justice of the Kingdom of the Netherlands (2015)"},{"key":"12_CR12","unstructured":"IEC: Iec 61508 - functional safety of electrical\/electronic\/programmable electronic safety-related systems (2010). http:\/\/www.iec.ch\/functionalsafety"},{"key":"12_CR13","unstructured":"IEC: Iec 62443-4-1 security for industrial automation and control systems - part 4\u20131: Secure product development lifecycle requirements (2018)"},{"key":"12_CR14","unstructured":"ISO: Iso 31000:2018, risk management - guidelines, provides principles, framework (2018). https:\/\/www.iso.org\/iso-31000-risk-management.html"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Kanamaru, H.: Bridging functional safety and cyber security of SIS\/SCS. In: 56th Annual Conference of the Society of Instrument and Control Engineers of Japan (2017)","DOI":"10.23919\/SICE.2017.8105699"},{"key":"12_CR16","volume-title":"Requirements Engineering - From System Goals to UML Models to Software Specifications","author":"A Lamsweerde van","year":"2009","unstructured":"van Lamsweerde, A.: Requirements Engineering - From System Goals to UML Models to Software Specifications. Wiley, Hoboken (2009)"},{"issue":"10","key":"12_CR17","doi-asserted-by":"publisher","first-page":"978","DOI":"10.1109\/32.879820","volume":"26","author":"A Lamsweerde van","year":"2000","unstructured":"van Lamsweerde, A., Letier, E.: Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Softw. Eng. 26(10), 978\u20131005 (2000)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"12_CR18","unstructured":"Lamsweerde, A.V., Brohez, S., Landtsheer, R.D., Janssens, D.: From system goals to intruder anti-goals: attack generation and resolution for security requirements engineering. In: In Proceedings of RHAS 2003, pp. 49\u201356 (2003)"},{"key":"12_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-319-24249-1_21","volume-title":"Computer Safety, Reliability, and Security","author":"G Macher","year":"2015","unstructured":"Macher, G., H\u00f6ller, A., Sporer, H., Armengaud, E., Kreiner, C.: A combined safety-hazards and security-threat analysis method for automotive systems. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9338, pp. 237\u2013250. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24249-1_21"},{"key":"12_CR20","unstructured":"MERGE Project: Recommandations for Security and Safety Co-engineering. Delivrable (2016)"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.pnucene.2015.12.009","volume":"88","author":"J Park","year":"2016","unstructured":"Park, J., Suh, Y., Park, C.: Implementation of cyber security for safety systems of nuclear facilities. Prog. Nuclear Energy 88, 88\u201394 (2016). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S014919701530127X","journal-title":"Prog. Nuclear Energy"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Paul, S., Rioux, L.: Over 20 years of research in cybersecurity and safety engineering: a short bibliography. In: Conference: 6th International Conference on Safety and Security Engineering (SAFE), May 2015","DOI":"10.2495\/SAFE150291"},{"key":"12_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/978-3-319-45480-1_27","volume-title":"Computer Safety, Reliability, and Security","author":"C Ponsard","year":"2016","unstructured":"Ponsard, C., Dallons, G., Massonet, P.: Goal-oriented co-engineering of security and safety requirements in cyber-physical systems. In: Skavhaug, A., Guiochet, J., Schoitsch, E., Bitsch, F. (eds.) SAFECOMP 2016. LNCS, vol. 9923, pp. 334\u2013345. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45480-1_27"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Rajkumar, R., Lee, I., Sha, L., Stankovic, J.: Cyber-physical systems: the next computing revolution. In: 2010 47th ACM\/IEEE Design Automation Conference (DAC), pp. 731\u2013736, June 2010","DOI":"10.1145\/1837274.1837461"},{"key":"12_CR25","unstructured":"Respect-IT: Objectiver. http:\/\/www.objectiver.com"},{"key":"12_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-24249-1_12","volume-title":"Computer Safety, Reliability, and Security","author":"C Schmittner","year":"2015","unstructured":"Schmittner, C., Ma, Z.: Towards a framework for alignment between automotive safety and security standards. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9338, pp. 133\u2013143. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24249-1_12"},{"key":"12_CR27","series-title":"Lecture Notes in Mobility","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-319-20855-8_20","volume-title":"Advanced Microsystems for Automotive Applications 2015","author":"E Schoitsch","year":"2016","unstructured":"Schoitsch, E., Schmittner, C., Ma, Z., Gruber, T.: The need for safety and cyber-security co-engineering and standardization for highly automated automotive vehicles. In: Schulze, T., M\u00fcller, B., Meyer, G. (eds.) Advanced Microsystems for Automotive Applications 2015. LNM, pp. 251\u2013261. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-20855-8_20"},{"key":"12_CR28","unstructured":"Scott, G., et al.: ATO Over ETCS Operational Requirements - Version 1.7. ERTMS User Group (2016)"},{"key":"12_CR29","unstructured":"Steiner, M., Liggesmeyer, P.: Combination of safety and security analysis - finding security problems that threaten the safety of a system. In: Dependable Embedded and Cyber-physical Systems (SAFECOMP Workshop), France (2013)"},{"issue":"6","key":"12_CR30","doi-asserted-by":"publisher","first-page":"983","DOI":"10.1109\/JPROC.2017.2699401","volume":"105","author":"M Wolf","year":"2017","unstructured":"Wolf, M., Serpanos, D.: Safety and security of cyber-physical and internet of things systems [point of view]. Proc. IEEE 105(6), 983\u2013984 (2017)","journal-title":"Proc. IEEE"}],"container-title":["Communications in Computer and Information Science","New Trends in Model and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02852-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T21:19:56Z","timestamp":1572124796000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02852-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030028510","9783030028527"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02852-7_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"MEDI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Model and Data Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Marrakesh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"medi2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/medi2018.uca.ma\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}