{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T19:23:15Z","timestamp":1775848995718,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:00:00Z","timestamp":1552608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J  Syst  Assur  Eng  Manag"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s13198-019-00778-w","type":"journal-article","created":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T15:04:07Z","timestamp":1552662247000},"page":"149-159","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Cybersecurity for eMaintenance in railway infrastructure: risks and consequences"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1938-0985","authenticated-orcid":false,"given":"Adithya","family":"Thaduri","sequence":"first","affiliation":[]},{"given":"Mustafa","family":"Aljumaili","sequence":"additional","affiliation":[]},{"given":"Ravdeep","family":"Kour","sequence":"additional","affiliation":[]},{"given":"Ramin","family":"Karim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,15]]},"reference":[{"issue":"6","key":"778_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCSE.2011.77","volume":"13","author":"J Ahrens","year":"2011","unstructured":"Ahrens J, Hendrickson B, Long G, Miller S, Ross R, Williams D (2011) Data-intensive science in the US DOE: case studies and future challenges. Comput Sci Eng 13(6):14\u201324","journal-title":"Comput Sci Eng"},{"key":"778_CR2","unstructured":"\u00c1lvarez A, Ioannidis S, Schlehuber C, Rodr\u00edguez F, Vallero V (2017) CIPSEC Project [Online]. \n                    https:\/\/upcommons.upc.edu\/handle\/2117\/106378"},{"key":"778_CR3","doi-asserted-by":"crossref","unstructured":"Bastow MD (2014) Cyber security of the railway signalling & control system. IRSE ASPECT","DOI":"10.1049\/cp.2014.0986"},{"key":"778_CR5","doi-asserted-by":"crossref","unstructured":"Bloomfield R, Bendele M, Bishop P, Stroud R, Tonks S (2016) The risk assessment of ERTMS-based railway systems from a cyber security perspective: methodology and lessons learned. In: International conference on reliability, safety and security of railway systems. Springer, pp 3\u201319","DOI":"10.1007\/978-3-319-33951-1_1"},{"key":"778_CR6","unstructured":"Bullock A (1999) Space: spatial access control for collaborative virtual environments. Doctoral dissertation, University of Nottingham"},{"issue":"1","key":"778_CR7","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N Cao","year":"2014","unstructured":"Cao N, Wang C, Li M, Ren K, Lou W (2014) Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parallel Distrib Syst 25(1):222\u2013233","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"778_CR8","volume-title":"The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud)","author":"DM Cappelli","year":"2012","unstructured":"Cappelli DM, Moore AP, Trzeciak RF (2012) The CERT guide to insider threats: how to prevent, detect, and respond to information technology crimes (Theft, Sabotage, Fraud). Addison-Wesley, Boston"},{"key":"778_CR9","unstructured":"CARONTE project: creating an agenda for research on transportation security. In: CIT2016\u2014XII Congreso de Ingenier\u00eda del Transporte, Val\u00e8ncia, Universitat Polit\u00e8cnica de Val\u00e8ncia (2016)"},{"key":"778_CR10","doi-asserted-by":"crossref","unstructured":"Chernov AV, Butakova MA, Karpenko EV (2015) Security incident detection technique for multilevel intelligent control systems on railway transport in Russia. In: 23rd Telecommunications forum telfor (TELFOR), 2015. IEEE, pp 1\u20134","DOI":"10.1109\/TELFOR.2015.7377381"},{"key":"778_CR39","doi-asserted-by":"crossref","unstructured":"Covington MJ, Long W, Srinivasan S, DEV AK, Ahamad M, Abowd GD (2001) Securing context-aware applications using environment roles. In: Proceedings of the sixth ACM symposium on access control models and technologies 2001. ACM, pp 10\u201320","DOI":"10.1145\/373256.373258"},{"key":"778_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6083-7","volume-title":"Enterprise cybersecurity: how to build a successful cyberdefense program against advanced threats","author":"S Donaldson","year":"2015","unstructured":"Donaldson S, Siegel S, Williams CK, Aslam A (2015) Enterprise cybersecurity: how to build a successful cyberdefense program against advanced threats. Apress, New York"},{"key":"778_CR12","doi-asserted-by":"crossref","unstructured":"Edwards WK (1996) Policies and roles in collaborative applications. In: Proceedings of the 1996 ACM conference on computer supported cooperative work 1996. ACM, pp 11\u201320","DOI":"10.1145\/240080.240175"},{"key":"778_CR13","unstructured":"ENISA (2015) Cyber security and resilience of intelligent public transport. Good practices and recommendations, European Union Agency for Network and Information Security. \n                    https:\/\/www.enisa.europa.eu\/publications\/good-practices-recommendations\n                    \n                  . Accessed 25 Feb 2018"},{"key":"778_CR14","unstructured":"Fischer EA (2016) Cybersecurity issues and challenges: in brief. Congressional research service"},{"key":"778_CR15","unstructured":"CSA Top Threats Working Group (2016) The treacherous 12: cloud computing top threats in 2016. Cloud Security Alliance (CSA), Feb"},{"key":"778_CR16","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"IAT Hashem","year":"2015","unstructured":"Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Khan SU (2015) The rise of \u201cbig data\u201d on cloud computing: review and open research issues. Inf Syst 47:98\u2013115","journal-title":"Inf Syst"},{"key":"778_CR17","unstructured":"ISO\/IEC (2007) 27001:2005, Information technology\u2014security techniques\u2014information security management systems\u2014requirements"},{"key":"778_CR18","doi-asserted-by":"crossref","unstructured":"Itani W, Kayssi A, Chehab A (2009) Privacy as a service: privacy-aware data storage and processing in cloud computing architectures. In: Eighth IEEE international conference on dependable, autonomic and secure computing, 2009, DASC\u201909. IEEE, pp 711\u2013716","DOI":"10.1109\/DASC.2009.139"},{"key":"778_CR19","unstructured":"Karim R (2008) A service-oriented approach to e-maintenance of complex technical systems (Doctoral dissertation, Lule\u00e5 tekniska universitet)"},{"key":"778_CR20","doi-asserted-by":"crossref","unstructured":"Katal A, Wazid M, Goudar RH (2013) Big data: issues, challenges, tools and good practices. In: Sixth international conference on contemporary computing (IC3), 2013. IEEE, pp 404\u2013409","DOI":"10.1109\/IC3.2013.6612229"},{"key":"778_CR21","doi-asserted-by":"crossref","unstructured":"Kissel R (2013) Glossary of key information security terms. NIST Interagency Reports NIST IR, 7298(3)","DOI":"10.6028\/NIST.IR.7298r2"},{"key":"778_CR22","volume-title":"Cyberspace and cybersecurity","author":"G Kostopoulos","year":"2017","unstructured":"Kostopoulos G (2017) Cyberspace and cybersecurity. CRC Press, Boca Raton"},{"key":"778_CR23","first-page":"7","volume":"30","author":"IVE Kotenko","year":"2013","unstructured":"Kotenko IVE, Saenko IB, Chernov AV, Butakova MA (2013) The construction of a multi-level intelligent information security system for automated systems of railway transport. Trudy SPIIRAN 30:7\u201325","journal-title":"Trudy SPIIRAN"},{"key":"778_CR24","volume-title":"Managing cyber threats: issues, approaches, and challenges","year":"2006","unstructured":"Kumar V, Srivastava J, Lazarevic A (eds) (2006) Managing cyber threats: issues, approaches, and challenges, vol 5. Springer, Berlin"},{"key":"778_CR25","unstructured":"Levy-Bencheton C, Darra E (2015) Cyber security and resilience of intelligent public transport: good practices and recommendations. ENISA, Heraklion"},{"issue":"6","key":"778_CR26","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1109\/TPDS.2011.252","volume":"23","author":"HY Lin","year":"2012","unstructured":"Lin HY, Tzeng WG (2012) A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans Parallel Distrib Syst 23(6):995\u20131003","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"1","key":"778_CR27","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.dss.2010.12.006","volume":"51","author":"S Marston","year":"2011","unstructured":"Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011) Cloud computing\u2014The business perspective. Decis Support Syst 51(1):176\u2013189","journal-title":"Decis Support Syst"},{"key":"778_CR28","doi-asserted-by":"crossref","unstructured":"Masson \u00c9, Gransart C (2017) Cyber security for railways\u2013a huge challenge\u2013Shift2Rail perspective. In: International workshop on communication technologies for vehicles. Springer, Cham, pp 97\u2013104","DOI":"10.1007\/978-3-319-56880-5_10"},{"key":"778_CR4","unstructured":"Matt B (2006) Introduction to computer security. Pearson Education India"},{"issue":"1\u20132","key":"778_CR29","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10479-016-2209-1","volume":"248","author":"A Nagurney","year":"2017","unstructured":"Nagurney A, Daniele P, Shukla S (2017) A supply chain network game theory model of cybersecurity investments with nonlinear budget constraints. Ann Oper Res 248(1\u20132):405\u2013427","journal-title":"Ann Oper Res"},{"key":"778_CR30","doi-asserted-by":"crossref","unstructured":"Nowakowski W, Bojarczak P, \u0141ukasik Z (2017) Performance analysis of data security algorithms used in the railway traffic control systems. In: International conference on information and digital technologies (IDT), 2017. IEEE, pp 281\u2013287","DOI":"10.1109\/DT.2017.8024309"},{"issue":"2","key":"778_CR31","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1504\/IJCCBS.2017.084928","volume":"7","author":"FD Priscoli","year":"2017","unstructured":"Priscoli FD, Giorgio AD, Esposito M, Fiaschetti A, Flammini F, Mignanti S, Pragliola C (2017) Ensuring cyber-security in smart railway surveillance with SHIELD. Int J Crit Comput Based Syst 7(2):138\u2013170","journal-title":"Int J Crit Comput Based Syst"},{"key":"778_CR32","unstructured":"PROTECTRAIL (2014) Key Lessons for the Railway Sector on PROTECTRAIL Security Architecture, White Paper"},{"issue":"9","key":"778_CR33","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"RS Sandhu","year":"1994","unstructured":"Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE Commun Mag 32(9):40\u201348","journal-title":"IEEE Commun Mag"},{"key":"778_CR34","unstructured":"SECRET (2015) Security of railways against electromagnetic attacks, White Paper"},{"key":"778_CR35","unstructured":"SECUR-ED (2014) SECured URban transportation\u2013European Demonstration, White Paper"},{"key":"778_CR36","doi-asserted-by":"crossref","unstructured":"Shi H (2014) Railway information sharing platform security requirements analysis. In: ICLEM 2014: system planning, supply chain management, and safety. pp 1116\u20131121","DOI":"10.1061\/9780784413753.169"},{"key":"778_CR37","doi-asserted-by":"crossref","unstructured":"Smith M, Szongott C, Henne B, Von Voigt G (2012) Big data privacy issues in public social media. In: 6th IEEE international conference on digital ecosystems technologies (DEST), 2012. IEEE, pp 1\u20136","DOI":"10.1109\/DEST.2012.6227909"},{"issue":"3","key":"778_CR38","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s13198-011-0046-9","volume":"1","author":"P S\u00f6derholm","year":"2010","unstructured":"S\u00f6derholm P, Karim R (2010) An enterprise risk management framework for evaluation of eMaintenance. Int J Syst Assur Eng Manag 1(3):219","journal-title":"Int J Syst Assur Eng Manag"},{"key":"778_CR40","unstructured":"Thales (2016) Cybersecurity for rail: not a single-shot approach, applying the NIST approach to rail transportation, White Paper"},{"key":"778_CR41","unstructured":"The Local (2017) \n                    https:\/\/www.thelocal.se\/20171012\/swedish-transport-agencies-targeted-in-cyber-attack\n                    \n                  . Accessed 11 Jan 2018"},{"key":"778_CR42","doi-asserted-by":"crossref","unstructured":"Thomas RK (1997) Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of the second ACM workshop on role-based access control 1997. ACM, pp 13\u201319","DOI":"10.1145\/266741.266748"},{"key":"778_CR43","first-page":"166","volume-title":"Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. Database security XI","author":"RK Thomas","year":"1998","unstructured":"Thomas RK, Sandhu RS (1998) Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. Database security XI. Springer, Berlin, pp 166\u2013181"},{"issue":"1","key":"778_CR44","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1057977.1057979","volume":"37","author":"W Tolone","year":"2005","unstructured":"Tolone W, Ahn G, Pai T, Hong S (2005) Access control in collaborative systems. ACM Comput Surv (CSUR) 37(1):29\u201341","journal-title":"ACM Comput Surv (CSUR)"},{"key":"778_CR45","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-319-50660-9_3","volume-title":"Cybersecurity for industry 4.0","author":"A Wegner","year":"2017","unstructured":"Wegner A, Graham J, Ribble E (2017) A new approach to cyberphysical security in industry 4.0. In: Thames L, Schaefer D (eds) Cybersecurity for industry 4.0. Springer, Berlin, pp 59\u201372"},{"issue":"2","key":"778_CR46","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1145\/762476.762481","volume":"6","author":"D Wijesekera","year":"2003","unstructured":"Wijesekera D, Jajodia S (2003) A propositional policy algebra for access control. ACM Trans Inf Syst Secur (TISSEC) 6(2):286\u2013325","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"778_CR47","doi-asserted-by":"publisher","DOI":"10.1201\/9780849380686","volume-title":"Information assurance architecture","author":"KD Willett","year":"2008","unstructured":"Willett KD (2008) Information assurance architecture. CRC Press, Boca Raton"},{"key":"778_CR48","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: proceedings IEEE Infocom, 2010. IEEE, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462174"},{"issue":"6","key":"778_CR49","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1109\/TPDS.2012.238","volume":"24","author":"X Zhang","year":"2013","unstructured":"Zhang X, Liu C, Nepal S, Pandey S, Chen J (2013) A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans Parallel Distrib Syst 24(6):1192\u20131202","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"778_CR50","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Future Gener Comput Syst 28(3):583\u2013592","journal-title":"Future Gener Comput Syst"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-019-00778-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13198-019-00778-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-019-00778-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,14]],"date-time":"2020-03-14T00:29:41Z","timestamp":1584145781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13198-019-00778-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,15]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["778"],"URL":"https:\/\/doi.org\/10.1007\/s13198-019-00778-w","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,15]]},"assertion":[{"value":"15 June 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}