{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:12:04Z","timestamp":1750824724305,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319651262"},{"type":"electronic","value":"9783319651279"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65127-9_4","type":"book-chapter","created":{"date-parts":[[2017,8,5]],"date-time":"2017-08-05T07:35:53Z","timestamp":1501918553000},"page":"37-49","source":"Crossref","is-referenced-by-count":2,"title":["Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems"],"prefix":"10.1007","author":[{"given":"Laurens","family":"Lemaire","sequence":"first","affiliation":[]},{"given":"Jan","family":"Vossaert","sequence":"additional","affiliation":[]},{"given":"Bart","family":"De Decker","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Naessens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,6]]},"reference":[{"key":"4_CR1","unstructured":"Becker, M.Y., Malkis, A., Bussard, L.: S4p: a generic language for specifying privacy preferences and policies. Microsoft Research (2010)"},{"key":"4_CR2","unstructured":"Bogaerts, B., De Cat, B., De Pooter, S., Denecker, M.: The IDP framework reference manual (2012)"},{"key":"4_CR3","volume-title":"Web privacy with P3P","author":"L Cranor","year":"2002","unstructured":"Cranor, L.: Web privacy with P3P. O\u2019Reilly Media, Inc., Sebastopol (2002)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Cranor, L., Langheinrich, M., Marchiori,M.: A P3P preference exchange language 1.0 (APPEL1. 0). W3C working draft (2002)","DOI":"10.1145\/644527.644528"},{"key":"4_CR5","unstructured":"Decroix, K.: Inspecting privacy in electronic services (2015)"},{"key":"4_CR6","unstructured":"ENISA. Protecting industrial control systems: recommendations for EUROPE and member states (2011)"},{"key":"4_CR7","unstructured":"Friedenthal, S., Moore, A., Steiner, R.: A practical guide to SysML: the systems modeling language. Morgan Kaufmann (2014)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Homeland Security, H.C.C.: Cset: cyber security evaluation tool (2014)","DOI":"10.1016\/S1353-4858(14)70003-0"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Lee, E.A.: Cyber physical systems: design challenges. In: 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363\u2013369. IEEE (2008)","DOI":"10.1109\/ISORC.2008.25"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Lemaire, L., Vossaert, J., Jansen, J., Naessens, V.: Extracting vulnerabilities in industrial control systems using a knowledge-based system. In: Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research, p. 1 (2015)","DOI":"10.14236\/ewic\/ICS2015.1"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"LeMay, E., Ford, M.D., Keefe, K., Sanders, W.H., Muehrcke, C.: Model-based security metrics using adversary view security evaluation (advise). In: 2011 Eighth International Conference on Quantitative Evaluation of Systems (QEST), pp. 191\u2013200 IEEE (2011)","DOI":"10.1109\/QEST.2011.34"},{"issue":"5","key":"4_CR12","first-page":"339","volume":"21","author":"N Li","year":"2006","unstructured":"Li, N., Yu, T., Anton, A.: A semantics based approach to privacy languages. Comput. Syst. Sci. Eng. 21(5), 339 (2006)","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"6","key":"4_CR13","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"4_CR14","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1109\/JSYST.2012.2221853","volume":"7","author":"T Sommestad","year":"2013","unstructured":"Sommestad, T., Ekstedt, M., Holm, H.: The cyber security modeling language: a tool for assessing the vulnerability of enterprise system architectures. IEEE Syst. J. 7(3), 363\u2013373 (2013)","journal-title":"IEEE Syst. J."},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-319-10696-0_29","volume-title":"Quantitative Evaluation of Systems","author":"AH Vu","year":"2014","unstructured":"Vu, A.H., Tippenhauer, N.O., Chen, B., Nicol, D.M., Kalbarczyk, Z.: CyberSAGE: a tool for automatic security assessment of cyber-physical systems. In: Norman, G., Sanders, W. (eds.) QEST 2014. LNCS, vol. 8657, pp. 384\u2013387. Springer, Cham (2014). doi: 10.1007\/978-3-319-10696-0_29"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/INFCOM.2010.5462173"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65127-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T20:43:00Z","timestamp":1750797780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65127-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319651262","9783319651279"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65127-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}