{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T07:58:23Z","timestamp":1767772703624,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030591540"},{"type":"electronic","value":"9783030591557"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59155-7_33","type":"book-chapter","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T19:26:08Z","timestamp":1599765968000},"page":"463-476","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Access Control for Smart Manufacturing Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2488-5774","authenticated-orcid":false,"given":"Bj\u00f6rn","family":"Leander","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5293-3804","authenticated-orcid":false,"given":"Aida","family":"\u010cau\u0161evi\u0107","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7235-6888","authenticated-orcid":false,"given":"Hans","family":"Hansson","sequence":"additional","affiliation":[]},{"given":"Tomas","family":"Lindstr\u00f6m","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,7]]},"reference":[{"key":"33_CR1","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/978-3-319-54660-5_48","volume-title":"Product Lifecycle Management for Digital Transformation of Industries","author":"S Mittal","year":"2016","unstructured":"Mittal, S., Khan, M.A., Wuest, T.: Smart manufacturing: characteristics and technologies. In: Harik, R., Rivest, L., Bernard, A., Eynard, B., Bouras, A. (eds.) PLM 2016. IAICT, vol. 492, pp. 539\u2013548. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-54660-5_48"},{"key":"33_CR2","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.compchemeng.2012.06.037","volume":"47","author":"J Davis","year":"2012","unstructured":"Davis, J., Edgar, T., Porter, J., Bernaden, J., Sarli, M.: Smart manufacturing, manufacturing intelligence and demand-dynamic performance. Comput. Chem. Eng. 47, 145\u2013156 (2012)","journal-title":"Comput. Chem. Eng."},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"4","DOI":"10.20965\/ijat.2017.p0004","volume":"1","author":"K-D Thoben","year":"2017","unstructured":"Thoben, K.-D., Wiesner, S., Wuest, T.: \u201cIndustrie 4.0\u201d and smart manufacturing - a review of research issues and application examples. Int. J. Autom. Technol. 1, 4\u201316 (2017)","journal-title":"Int. J. Autom. Technol."},{"issue":"April","key":"33_CR4","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.jmsy.2018.04.007","volume":"47","author":"N Tuptuk","year":"2018","unstructured":"Tuptuk, N., Hailes, S.: Security of smart manufacturing systems. J. Manuf. Syst. 47(April), 93\u2013106 (2018)","journal-title":"J. Manuf. Syst."},{"key":"33_CR5","unstructured":"Slowik, J.: Evolution of ICS attacks and the prospects for future disruptive events. Technical report (2017)"},{"key":"33_CR6","unstructured":"Watson, V., Sassmannshausen, J., Waedt, K.: Secure granular interoperability with OPC UA In: INFORMATIK 2019: 50 Jahre Gesellschaft f\u00fcr Informatik - Informatik fr Gesellschaft (2019)"},{"issue":"1","key":"33_CR7","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCON$$_{ABC}$$ usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-658-10934-9_14","volume-title":"ISSE 2015","author":"U Lang","year":"2015","unstructured":"Lang, U., Schreiner, R.: Proximity-based access control (PBAC) using model-driven security. ISSE 2015, pp. 157\u2013170. Springer, Wiesbaden (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-658-10934-9_14"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Sadeghi, A.-R., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: The 52nd IEEE Annual Design Automation Conference (2015)","DOI":"10.1145\/2744769.2747942"},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"15883","DOI":"10.1016\/j.ifacol.2017.08.2349","volume":"50","author":"Y Lu","year":"2017","unstructured":"Lu, Y., Ju, F.: Smart manufacturing systems based on cyber-physical manufacturing services (CPMS). IFAC-PapersOnLine 50, 15883\u201315889 (2017)","journal-title":"IFAC-PapersOnLine"},{"key":"33_CR11","unstructured":"Whitman, M., Mattord, H.: Principles of information security. In: Cengage Learning, 4th edn. (2012)"},{"issue":"9","key":"33_CR12","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J Saltzer","year":"1975","unstructured":"Saltzer, J., Schroeder, M.: The protection of information in computer systems. IEEE 63(9), 1278\u20131308 (1975)","journal-title":"IEEE"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Ranganathan, K., Zhang, X.: Secure information sharing enabled by trusted computing and PEI models. In: Proceedings of ACM Symposium on Information, Computer and Communications Security (2006)","DOI":"10.1145\/1128817.1128820"},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu, R.S., Samarati, P.: Access control: principles and practice. IEEE Commun. Mag. 32, 40\u201348 (1994)","journal-title":"IEEE Commun. Mag."},{"key":"33_CR15","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.comnet.2018.01.037","volume":"134","author":"J Lopez","year":"2018","unstructured":"Lopez, J., Rubio, J.E.: Access control for cyber-physical systems interconnected to the cloud. Comput. Netw. 134, 46\u201354 (2018)","journal-title":"Comput. Netw."},{"key":"33_CR16","series-title":"Advanced Sciences and Technologies for Security Applications","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-030-12330-7_5","volume-title":"Security and Privacy Trends in the Industrial Internet of Things","author":"S Salonikias","year":"2019","unstructured":"Salonikias, S., Gouglidis, A., Mavridis, I., Gritzalis, D.: Access control in the industrial internet of things. In: Alcaraz, C. (ed.) Security and Privacy Trends in the Industrial Internet of Things. ASTSA, pp. 95\u2013114. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-12330-7_5"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J.: Attributed based access control for web services. In: Proceedings of IEEE International Conference on Web Services (2005)","DOI":"10.1109\/ICWS.2005.25"},{"key":"33_CR18","unstructured":"eXtensible Access Control Markup Language (XACML) version 3.0 plus errata 01, standard, OASIS (2017)"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations. Technical report, NIST (2014)","DOI":"10.6028\/NIST.SP.800-162"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Chandramouli, R., Kuhn, R., Hu, V.: Extensible access control markup language and next generation access control (2016)","DOI":"10.1145\/2875491.2875496"},{"key":"33_CR21","unstructured":"Kitchenham, B.A.: Procedures for undertaking systematic reviews. Technical report, Keele University (2004)"},{"key":"33_CR22","unstructured":"B. Leander, \"Towards an access control in a smart manufacturing context,\" tech. rep., M\u00e4lardalen Real-Time Research Centre, M\u00e4lardalen University (2020)"},{"key":"33_CR23","unstructured":"IEC 62443 security for industrial automation and control systems, standard, Internation Electrotechnical Commission, Geneva, CH, 2009\u20132018"},{"issue":"2","key":"33_CR24","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/0166-3615(94)90017-5","volume":"24","author":"TJ Williams","year":"1994","unstructured":"Williams, T.J.: The purdue enterprise reference architecture. Comput Ind. 24(2), 141\u2013158 (1994)","journal-title":"Comput Ind."},{"key":"33_CR25","doi-asserted-by":"publisher","first-page":"1870","DOI":"10.1109\/TIA.2017.2782679","volume":"54","author":"J Ladiges","year":"2018","unstructured":"Ladiges, J.: Integration of modular process units into process control systems. IEEE Transactions on Industry Applications 54, 1870\u20131880 (2018)","journal-title":"IEEE Transactions on Industry Applications"},{"key":"33_CR26","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.procir.2017.12.192","volume":"67","author":"C Faller","year":"2018","unstructured":"Faller, C., H\u00f6ftmann, M.: Service-oriented communication model for cyber-physical-production-systems. Procedia CIRP 67, 156\u2013161 (2018)","journal-title":"Procedia CIRP"},{"key":"33_CR27","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.procir.2017.12.193","volume":"67","author":"I Ayatollahi","year":"2018","unstructured":"Ayatollahi, I., Brier, J., M\u00f6rzinger, B., Heger, M., Bleicher, F.: SOA on smart manufacturing utilities for identification, data access and control. Procedia CIRP 67, 162\u2013166 (2018)","journal-title":"Procedia CIRP"},{"key":"33_CR28","unstructured":"IEC 61449 function blocks, standard, Internation Electrotechnical Commission, Geneva, CH (2012)"},{"key":"33_CR29","doi-asserted-by":"crossref","unstructured":"Turkmen, F., Crispo, B.: Performance evaluation of XACML PDP implementations. In: ACM Conference on Computer and Communications Security (2008)","DOI":"10.1145\/1456492.1456499"}],"container-title":["Communications in Computer and Information Science","Software Architecture"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59155-7_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T20:09:38Z","timestamp":1599768578000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-59155-7_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030591540","9783030591557"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59155-7_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Software Architecture","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"L'Aquila","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecsa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ecsa2020.disim.univaq.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"103","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the Corona pandemic ECSA 2020 was held as a virtual event. ECSA 2020 Tracks and Workshops information: single-blind review, submissions: 72, full papers accepted: 30, short papers accepted: 9.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}