{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:01:47Z","timestamp":1725897707379},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642336775"},{"type":"electronic","value":"9783642336782"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33678-2_12","type":"book-chapter","created":{"date-parts":[[2012,9,6]],"date-time":"2012-09-06T15:02:42Z","timestamp":1346943762000},"page":"137-148","source":"Crossref","is-referenced-by-count":5,"title":["Towards an IT Security Protection Profile for Safety-Related Communication in Railway Automation"],"prefix":"10.1007","author":[{"given":"Hans-Hermann","family":"Bock","sequence":"first","affiliation":[]},{"given":"Jens","family":"Braband","sequence":"additional","affiliation":[]},{"given":"Birgit","family":"Milius","sequence":"additional","affiliation":[]},{"given":"Hendrik","family":"Sch\u00e4be","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"http:\/\/www.nextgov.com\/nextgov\/ng_20120123_3491.php?oref=topstory (accessed on February 7, 2012)"},{"key":"12_CR2","unstructured":"Stumpf, F.: Daten\u00fcbertragung \u00fcber \u00f6ffentliche Netze im Bahnverkehr \u2013 Fluch oder Segen? In: Proc. Safetronic 2010, Hanser, M\u00fcnchen (2010)"},{"key":"12_CR3","unstructured":"Katzenbeisser, S.: Can trains be hacked? In: 28th Chaos Communication Congress, Hamburg (2011)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Thomas, M.: Accidental Systems, Hidden Assumptions and Safety Assurance. In: Dale, C., Anderson, T. (eds.) Achieving System Safety, Proc. 20th Safety-Critical Systems Symposium. Springer (2012)","DOI":"10.1007\/978-1-4471-2494-8_1"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Johnson, C.: CyberSafety: CyberSecurity and Safety-Critical Software Engineering. In: Dale, C., Anderson, T. (eds.) Achieving System Safety, Proc. 20th Safety-Critical Systems Symposium. Springer (2012)","DOI":"10.1007\/978-1-4471-2494-8_8"},{"key":"12_CR6","unstructured":"EN 50159 Railway applications, Communication, signaling and processing systems \u2013Safety related communication in transmission systems (September 2010)"},{"key":"12_CR7","unstructured":"EN 50129 Railway applications, Communication, signaling and processing systems \u2013 Safety-related electronic systems for signaling (February 2003)"},{"key":"12_CR8","unstructured":"ISO\/IEC 15408 Information technology \u2014 Security techniques \u2014 Evaluation criteria for IT security (2009)"},{"key":"12_CR9","unstructured":"ISA 99, Standards of the Industrial Automation and Control System Security Committee of the International Society for Automation (ISA) on information security, http:\/\/en.wikipedia.org\/wiki\/Cyber_security_standards"},{"key":"12_CR10","unstructured":"BITKOM \/ DIN Kompass der IT-Sicherheitsstandards Leitfaden und Nachschlagewerk 4. Auflage (2009)"},{"key":"12_CR11","unstructured":"Commission Regulation (EC) No. 352\/2009 of 24 April 2009 on the adoption of a common safety method on risk evaluation and assessment as referred to in Article 6(3)(a) of Directive 2004\/49\/EC of the European Parliament and of the Council"},{"key":"12_CR12","unstructured":"Common Criteria for Information Technology Security Evaluation, Version 3.1, revision 3, Part 1: Introduction and general model (July 2009)"},{"key":"12_CR13","unstructured":"Common Criteria for Information Technology Security Evaluation, Version 3.1, revision 3, Part 2: Functional security components (July 2009)"},{"key":"12_CR14","unstructured":"Common Criteria for Information Technology Security Evaluation, Version 3.1, revision 3, Part 3: Assurance security components (July 2009)"},{"key":"12_CR15","unstructured":"Wickinger, T.: Modern Security Management Systems. Signal & Draht, (4) (2001) (in German)"},{"key":"12_CR16","unstructured":"DB AG: European Patent Application EP2 088 052 A2 (2000)"},{"key":"12_CR17","unstructured":"DIN V VDE V 0831-102: Electric signaling systems for railways \u2013 Part 102: Protection profile for technical functions in railway signaling, Draft (2012) (in German)"}],"container-title":["Lecture Notes in Computer Science","Computer Safety, Reliability, and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33678-2_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:12:43Z","timestamp":1606187563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33678-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642336775","9783642336782"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33678-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}