{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:18:36Z","timestamp":1725491916645},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540751007"},{"type":"electronic","value":"9783540751014"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-75101-4_4","type":"book-chapter","created":{"date-parts":[[2007,9,21]],"date-time":"2007-09-21T09:15:29Z","timestamp":1190366129000},"page":"40-53","source":"Crossref","is-referenced-by-count":15,"title":["Future Perspectives: The Car and Its IP-Address \u2013 A Potential Safety and Security Risk Assessment"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Lang","sequence":"first","affiliation":[]},{"given":"Jana","family":"Dittmann","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Kiltz","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Hoppe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Howard, J.D., Longstaff, T.A.: A Common Language for Computer Security Incidents (SAND98-8667); Sandia National Laboratories. 1998 (0-201-63346-9), Forschungsbericht (1998)"},{"key":"4_CR2","unstructured":"Dittmann, J.: Course: Fundamentals of IT-Security, Summer Term 2005 (2005)"},{"key":"4_CR3","unstructured":"Innovation Electronics (UK) Ltd., Health & Safety Laboratory: A methodology for the assignment of safety integrity levels (SILs) to safety-related control functions implemented by safety-related electrical, electronic and programmable electronic control systems of machines; Health and Safety Laboratory. Forschungsbericht (2004)"},{"key":"4_CR4","volume-title":"A Guide to Building Dependable Distributed Systems.: A Guide to Building Dependable Distributed System","author":"R. Anderson","year":"2001","unstructured":"Anderson, R.: Security Engineering. In: A Guide to Building Dependable Distributed Systems.: A Guide to Building Dependable Distributed System, Wiley, New York (2001)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Tulloch, M.: Microsoft Encyclopedia of Security. Microsoft Press (2003), ISBN 0-7356-1877-1","DOI":"10.1016\/S1353-4858(03)01002-X"},{"key":"4_CR6","unstructured":"Kiltz, S., Lang, A., Dittmann, J.: Klassifizierung der Eigenschaften von Trojanischen Pferden. In: Horster, P. (ed.) DACH Security 2006; Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven; Syssec, Duesseldorf, Germany, pp. S. 351\u2013361 (2006), ISBN: 3-00-018166-0"},{"key":"4_CR7","volume-title":"Network security: private communication in a public world","author":"C. Kaufman","year":"2002","unstructured":"Kaufman, C., Perlman, R., Speciner, M.: Network security: private communication in a public world. Prentice-Hall, Inc., Upper Saddle River, NJ, USA (2002)"},{"key":"4_CR8","unstructured":"Vector [CANoe und DENoe]: (June 2007), http:\/\/www.vector-informatik.com\/vi_canoe_de,,2816.html"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-75101-4_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:51:26Z","timestamp":1619520686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-75101-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540751007","9783540751014"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-75101-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}