{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T18:37:09Z","timestamp":1725993429509},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662580950"},{"type":"electronic","value":"9783662580967"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-662-58096-7_6","type":"book-chapter","created":{"date-parts":[[2018,9,27]],"date-time":"2018-09-27T05:03:07Z","timestamp":1538024587000},"page":"49-58","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Automatische Evaluierung von Anforderungen bez\u00fcglich der Informationssicherheit f\u00fcr das zuk\u00fcnftige industrielle Netzwerkmanagement"],"prefix":"10.1007","author":[{"given":"Marco","family":"Ehrlich","sequence":"first","affiliation":[]},{"given":"Henning","family":"Trsek","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Jasperneite","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,28]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"D. Kreutz, F. M. V. Ramos, P. Esteves Verissimo, C. Esteve Rothenberg, S. Azodolmolky und S. Uhlig: Software-Defined Networking: A Comprehensive Survey, Proceedings of the IEEE Volume: 103 Issue: 1, 2015","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"M. Wollschlaeger, T. Sauter und J. Jasperneite: The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0, IEEE Industrial Electronics Magazine, 2017","DOI":"10.1109\/MIE.2017.2649104"},{"issue":"3","key":"6_CR3","doi-asserted-by":"publisher","first-page":"1504","DOI":"10.1109\/COMST.2017.2691349","volume":"19","author":"Jian-Qiang Li","year":"2017","unstructured":"J.-Q. Li, F. R. Yu, G. Deng, C. Luo, Z. Ming und Q. Yan: Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges, IEEE Communications Surveys and Tutorials, Volume: PP, Issue: 99, 2017","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"6_CR4","unstructured":"Deutsches Institut f\u00fcr Normung e.V. (DIN) \/ Deutsche Kommission Elektrotechnik Elektronik Informationstechnik (DKE): German Standardization Roadmap for IT Security, Version 2.0, 2014"},{"key":"6_CR5","unstructured":"H. Trsek, D. Mahrenholz, S. Schemmer und R. Schumann: Industrial Security 4.0 - Future challenges and solutions to secure Cyber-Physical Production Systems, Markt & Technik Security Symposium, 2015"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"T. M\u00fcller, A. Walz, M. Kiefer, H. D. Doran, and A. Sikora: Challenges and Prospects of Communication Security in Real-Time Ethernet Automation Systems, 14th IEEE International Workshop on Factory Communication Systems (WFCS), Imperia, Italien, 2018","DOI":"10.1109\/WFCS.2018.8402338"},{"key":"6_CR7","unstructured":"M. Waidner, M. Backes und J. M\u00fcller-Quade: Cybersicherheit in Deutschland, Fraunhofer-Gesellschaft Positionspapier, 2017"},{"key":"6_CR8","unstructured":"I. Rolle und P. Kobes: Funktionale Sicherheit: Industrial Security - Stand der Normung und Risikominimierung, Elektronik Magazin, 2013"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"M. Ehrlich, L. Wisniewski, H. Trsek, D. Mahrenholz und J. Jasperneite: Automatic Mapping of Cyber Security Requirements to support Network Slicing in Software- Defined Networks, 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Zypern, 2017","DOI":"10.1109\/ETFA.2017.8247728"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"M. Ehrlich, H. Trsek, L. Wisniewski und J. Jasperneite: Modelling and Automatic Mapping of Cyber Security Requirements for Industrial Applications: Survey, Problem Exposition, and Research Focus, 14th IEEE International Workshop on Factory Communication Systems (WFCS), Imperia, Italien, 2018","DOI":"10.1109\/WFCS.2018.8402337"},{"key":"6_CR11","unstructured":"Deutsches Institut f\u00fcr Normung e.V. (DIN): DIN SPEC 91345: Referenzarchitekturmodell Industrie 4.0 (RAMI4.0), Beuth Verlag GmbH, 2016"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"A. Ramos, M. Lazar, R. H. Filho und J. J. P. C. Rodrigues, Model- Based Quantitative Network Security Metrics: A Survey, Fourth Quarter 2017 IEEE Communications Surveys and Tutorials, 2017","DOI":"10.1109\/COMST.2017.2745505"},{"key":"6_CR13","unstructured":"Plattform Industrie 4.0, Working Paper: Security inside the Asset Administration Shell, Deutsches Bundesministerium f\u00fcr Wirtschaft und Energie, 2017"},{"key":"6_CR14","unstructured":"OPC Foundation, Unified Architecture Profile Reporting Visualization Tool, https:\/\/opcfoundation-onlineapplications.org\/profilereporting (abgerufen am 15.07.2018)"}],"container-title":["Informatik aktuell","Echtzeit und Sicherheit"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-58096-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T23:35:27Z","timestamp":1571960127000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-58096-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783662580950","9783662580967"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-58096-7_6","relation":{},"ISSN":["1431-472X"],"issn-type":[{"type":"print","value":"1431-472X"}],"subject":[],"published":{"date-parts":[[2018]]}}}