{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:34:14Z","timestamp":1725888854180},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594149"},{"type":"electronic","value":"9783319594156"}],"license":[{"start":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:00:00Z","timestamp":1496188800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59415-6_3","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T08:42:30Z","timestamp":1496133750000},"page":"26-38","source":"Crossref","is-referenced-by-count":1,"title":["Software Support of the Common Criteria Vulnerability Assessment"],"prefix":"10.1007","author":[{"given":"Andrzej","family":"Bialas","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"3_CR1","unstructured":"Common Criteria for IT Security Evaluation, part 1\u20133, version 3.1 rev. 4 (2012). \nhttp:\/\/www.commoncriteriaportal.org\/\n\n. Accessed 10 Mar 2017"},{"key":"3_CR2","unstructured":"Common Criteria Portal Home page. \nhttp:\/\/www.commoncriteriaportal.org\/\n\n. Accessed 10 Mar 2017"},{"key":"3_CR3","volume-title":"Using the Common Criteria for IT Security Evaluation","author":"DS Hermann","year":"2003","unstructured":"Hermann, D.S.: Using the Common Criteria for IT Security Evaluation. CRC Press, Boca Raton (2003)"},{"key":"3_CR4","unstructured":"Higaki, W.H.: Successful Common Criteria Evaluation. A Practical Guide for Vendors. Copyright 2010 by Wesley Hisao Higaki, Lexington (2011)"},{"key":"3_CR5","doi-asserted-by":"crossref","first-page":"822","DOI":"10.3390\/s100100822","volume":"10","author":"A Bialas","year":"2010","unstructured":"Bialas, A.: Intelligent sensors security. Sensors 10, 822\u2013859 (2010)","journal-title":"Sensors"},{"key":"3_CR6","doi-asserted-by":"crossref","first-page":"4456","DOI":"10.3390\/s100504456","volume":"10","author":"A Bialas","year":"2010","unstructured":"Bialas, A.: Common criteria related security design patterns\u2014validation on the intelligent sensor example designed for mine environment. Sensors 10, 4456\u20134496 (2010)","journal-title":"Sensors"},{"key":"3_CR7","doi-asserted-by":"crossref","first-page":"8085","DOI":"10.3390\/s110808085","volume":"11","author":"A Bialas","year":"2011","unstructured":"Bialas, A.: Common criteria related security design patterns for intelligent sensors\u2014knowledge engineering-based implementation. Sensors 11, 8085\u20138114 (2011)","journal-title":"Sensors"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Bialas, A.: Computer-aided sensor development focused on security issues. Sensors 16, 759. \nhttp:\/\/www.mdpi.com\/1424-8220\/16\/6\/759\n\n. Accessed 10 Mar 2017","DOI":"10.3390\/s16060759"},{"key":"3_CR9","unstructured":"Common Methodology for Information Technology Security Evaluation, version 3.1 rev. 4 (2012). \nhttp:\/\/www.commoncriteriaportal.org\/\n\n. Accessed 10 Mar 2017"},{"key":"3_CR10","unstructured":"ISO\/IEC TR 15446: Information technology\u2014Security techniques\u2014Guide for the production of Protection Profiles and Security Targets (2009)"},{"key":"3_CR11","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. Guidelines for Developer Documentation according to Common Criteria, Version 3.1 (2007)"},{"key":"3_CR12","unstructured":"CC Toolbox. \nhttp:\/\/niatec.info\/ViewPage.aspx?id=44\n\n. Accessed 10 Mar 2017"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Horie, D., Yajima, K., Azimah, N., Goto, Y., Cheng, J.: GEST: a generator of ISO\/IEC 15408 security target templates. In: Lee, R., Hu, G., Miao, H. (eds.) Computer and Information Science 2009. SCI, vol. 208, pp. 149\u2013158. Springer, Heidelberg (2009). \nhttp:\/\/link.springer.com\/chapter\/10.1007%2F978-3-642-01209-9_14#page-1\n\n. Accessed 10 Mar 2017","DOI":"10.1007\/978-3-642-01209-9_14"},{"key":"3_CR14","unstructured":"TL SET. \nhttp:\/\/trusted-labs.com\/security-consulting\/tools-training\/tl-set\/\n\n. Accessed 10 Mar 2017"},{"key":"3_CR15","unstructured":"CCMODE: Common Criteria compliant, Modular, Open IT security Development Environment\u2019. \nhttp:\/\/www.commoncriteria.pl\/\n\n. Accessed 10 Mar 2017"},{"key":"3_CR16","unstructured":"Goertzel, K.M., Winograd, T.: (Contributor): Information Assurance Tools Report \u2013 Vulnerability Assessment. 6th edn. Information Assurance Technology Analysis Center (IATAC), USA (2011)"},{"key":"3_CR17","unstructured":"ISO 31000:2009, Risk management \u2013 Principles and guidelines"},{"key":"3_CR18","unstructured":"ISO\/IEC 31010:2009 \u2013 Risk Management\u2014Risk Assessment Techniques"},{"key":"3_CR19","unstructured":"Bagi\u0144ski, J., Rogowski, D.: Software support for enhanced risk management. In: Rosta\u0144ski, M., Pikiewicz, P., Buchwald, P., Maczka, K. (eds.): Proceedings of the XI International Scientific Conference Internet in the Information Society, Publishing University of D\u0105browa G\u00f3rnicza, Cieszyn, Poland, 22\u201323 September 2016, pp. 369\u2013388 (2016)"},{"key":"3_CR20","unstructured":"ISO\/IEC TS 30104 Information technology\u2014Security Techniques\u2014Physical Security Attacks, Mitigation Techniques and Security Requirements (2015)"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Dependability Engineering of Complex Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59415-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T08:43:16Z","timestamp":1496133796000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59415-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,31]]},"ISBN":["9783319594149","9783319594156"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59415-6_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,5,31]]}}}