{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:18:30Z","timestamp":1760710710416,"version":"3.37.3"},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/deed.de"},{"start":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T00:00:00Z","timestamp":1631664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/deed.de"}],"funder":[{"name":"technology network it's owl with support from the ministry of economic affairs, innovation, digitalization, and energy of the state of north rhine-westphalia, germany"},{"name":"Technische Hochschule Ostwestfalen-Lippe"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Elektrotech. Inftech."],"published-print":{"date-parts":[[2021,11]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In order to ensure the safety and security of industrial systems with regard to all life cycle phases from development through operation to disposal, specific regulatory and normative requirements are imposed. Due to the digitalization, interconnection, and constantly increasing complexity of manufacturing systems in the context of Industrie\u00a04.0, the manual effort necessary to achieve the required safety and security is becoming ever greater and almost impossible to manage, especially for small and medium-sized enterprises. Therefore, this paper examines the existing challenges in this area in more detail and gives an outlook on the possible solutions to ensure safety and security much quicker and with less manual effort. The overall vision is a (partially) automated risk assessment of modular systems with respect to safety and security, including the alignment of the corresponding processes from both domains and the formalization of the information models needed.<\/jats:p>","DOI":"10.1007\/s00502-021-00927-9","type":"journal-article","created":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T07:02:41Z","timestamp":1631689361000},"page":"454-461","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Alignment of safety and security risk assessments for modular production systems","Abgleich von Safety- und Security-Risikobeurteilungen f\u00fcr modulare Produktionssysteme"],"prefix":"10.1007","volume":"138","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1538-0547","authenticated-orcid":false,"given":"Marco","family":"Ehrlich","sequence":"first","affiliation":[]},{"given":"Andre","family":"Br\u00f6ring","sequence":"additional","affiliation":[]},{"given":"Dimitri","family":"Harder","sequence":"additional","affiliation":[]},{"given":"Torben","family":"Auhagen-Meyer","sequence":"additional","affiliation":[]},{"given":"Philip","family":"Kleen","sequence":"additional","affiliation":[]},{"given":"Lukasz","family":"Wisniewski","sequence":"additional","affiliation":[]},{"given":"Henning","family":"Trsek","sequence":"additional","affiliation":[]},{"given":"J\u00fcrgen","family":"Jasperneite","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,15]]},"reference":[{"key":"927_CR1","doi-asserted-by":"crossref","unstructured":"Ehrlich, M., et\u00a0al. (2019): Survey of Security Standards for an automated Industrie 4.0 compatible Manufacturing. IECON, Lisbon, Portugal.","DOI":"10.1109\/IECON.2019.8927559"},{"key":"927_CR2","volume-title":"Jahreskolloquium Kommunikation in der Automation","author":"M. Ehrlich","year":"2020","unstructured":"Ehrlich, M., et al. (2020): Automatische Bewertung und \u00dcberwachung von Safety Security Eigenschaften \u2013 Strukturierung und Ausblick. In Jahreskolloquium Kommunikation in der Automation."},{"key":"927_CR3","unstructured":"Fluchs, S. (2021): On Modelling of Security Engineering a as a submodel of a Digital Twin. Blog Post."},{"key":"927_CR4","volume-title":"The ICS CyberSec \u2013 what next? Conference","author":"S. Fluchs","year":"2021","unstructured":"Fluchs, S. (2021): OT security and safety: two perspectives, shared objective. In The ICS CyberSec \u2013 what next? Conference."},{"key":"927_CR5","first-page":"183","volume":"34","author":"I. Friedberg","year":"2017","unstructured":"Friedberg, I., et al. (2017): STPA-SafeSec: safety and security analysis for cyber-physical systems. J. Inf. Secur. Appl., 34, 183\u2013196.","journal-title":"J. Inf. Secur. Appl."},{"key":"927_CR6","volume-title":"Automation \u2013 Leitkongress der Mess- und Automatisierungstechnik","author":"P. Kleen","year":"2017","unstructured":"Kleen, P., Flatt, H., Jasperneite, J. (2017): Erweiterung des \u201cSecure Plug & Work\u201d f\u00fcr Safety-kritische Systeme. In Automation \u2013 Leitkongress der Mess- und Automatisierungstechnik, Baden-Baden, Germany."},{"key":"927_CR7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cps.2018.5068","author":"X. Lyu","year":"2019","unstructured":"Lyu, X., Ding, Y., Yang, S. H. (2019): Safety and security risk assessment in cyber-physical systems. IET Cyber-Phys. Syst. Theory Appl.. https:\/\/doi.org\/10.1049\/iet-cps.2018.5068.","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"key":"927_CR8","volume-title":"IEEE international conference on industrial Internet","author":"A. Pattanayak","year":"2018","unstructured":"Pattanayak, A., Kirkland, M. (2018): Current cyber security challenges in ICS. In IEEE international conference on industrial Internet, Seattle, USA."},{"key":"927_CR9","volume-title":"IEEE international conference on systems, man and cybernetics","author":"L. Pi\u00e8tre-Cambac\u00e9d\u00e8s","year":"2010","unstructured":"Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Bouissou, M. (2010): Modeling safety and security interdependencies with BDMP (Boolean Logic Driven Markov Processes). In IEEE international conference on systems, man and cybernetics, Istanbul, Turkey."},{"key":"927_CR10","unstructured":"Plattform Industrie 4.0 (2020): Details of the Asset Administration Shell: Part 1 \u2013 The exchange of Information between Partners in the Value Chain of Industrie 4.0. Federal Ministry for Economic Affairs and Energy."},{"key":"927_CR11","unstructured":"Plattform Industrie 4.0 (2021): Asset Administration Shell Reading Guide. Federal Ministry for Economic Affairs and Energy."},{"key":"927_CR12","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.ress.2015.02.008","volume":"139","author":"S. Kriaa","year":"2015","unstructured":"Kriaa, S., et al. (2015): A survey of approaches combining safety and security for industrial control systems. Reliab. Eng. Syst. Saf., 139, 156\u2013178.","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"927_CR13","volume-title":"Computer safety, reliability, and security","author":"C. Schmittner","year":"2014","unstructured":"Schmittner, C. et al. (2014): Security application of failure mode and effect analysis (FMEA). In Computer safety, reliability, and security."},{"key":"927_CR14","volume-title":"The coupling of safety and security","author":"P. R. Schulman","year":"2020","unstructured":"Schulman, P. R. (2020): Safety and security: managerial tensions and synergies. In The coupling of safety and security."}],"container-title":["e &amp; i Elektrotechnik und Informationstechnik"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-021-00927-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00502-021-00927-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00502-021-00927-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T10:14:58Z","timestamp":1636539298000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00502-021-00927-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,15]]},"references-count":14,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["927"],"URL":"https:\/\/doi.org\/10.1007\/s00502-021-00927-9","relation":{},"ISSN":["0932-383X","1613-7620"],"issn-type":[{"type":"print","value":"0932-383X"},{"type":"electronic","value":"1613-7620"}],"subject":[],"published":{"date-parts":[[2021,9,15]]},"assertion":[{"value":"11 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}