{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:55:18Z","timestamp":1761648918498,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100011688","name":"EU Commission and Vinnova","doi-asserted-by":"publisher","award":["876038"],"award-info":[{"award-number":["876038"]}],"id":[{"id":"10.13039\/501100011688","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002670","name":"ABB AB","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002670","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100003077","name":"industrial postgraduate school Automation Region Research Academy (ARRAY) through The Knowledge Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100003077","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Horizon 2020 project InSecTT"},{"DOI":"10.13039\/501100011688","name":"ECSEL Joint Undertaking","doi-asserted-by":"publisher","award":["876038"],"award-info":[{"award-number":["876038"]}],"id":[{"id":"10.13039\/501100011688","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Union\u2019s Horizon 2020 research and innovation program and Austria, Sweden, Spain, Italy, France, Portugal, Ireland, Finland, Slovenia, Poland, The Netherlands, and Turkey.]"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3104649","type":"journal-article","created":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T20:04:15Z","timestamp":1628885055000},"page":"114037-114050","source":"Crossref","is-referenced-by-count":18,"title":["Toward an Ideal Access Control Strategy for Industry 4.0 Manufacturing Systems"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2488-5774","authenticated-orcid":false,"given":"Bjorn","family":"Leander","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5293-3804","authenticated-orcid":false,"given":"Aida","family":"Causevic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7235-6888","authenticated-orcid":false,"given":"Hans","family":"Hansson","sequence":"additional","affiliation":[]},{"given":"Tomas","family":"Lindstrom","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1236471"},{"article-title":"A recipe-based algorithm for access control in modular automation systems","year":"2020","author":"leander","key":"ref38"},{"journal-title":"Introduction to the Manufacturing Message Specification (MMS ISO\/IEC 9506)","year":"2000","author":"schwarz","key":"ref33"},{"year":"2009","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300837"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59155-7_33"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.compchemeng.2012.06.037"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54660-5_48"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2008.08.003"},{"journal-title":"Module-based production in the process industry-effects on automation in the &#x2018;industrie 4 0&#x2019; environment","year":"2015","key":"ref10"},{"year":"2013","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/375735.376120"},{"key":"ref12","first-page":"309","article-title":"Secure granular interoperability with OPC UA","author":"watson","year":"2019","journal-title":"P295 INFORMATIK Jahre Gesellschaft F&#x00FC;r Informatik&#x2014;Informatik F&#x00FC;r Gesellschaft (Workshop-Beitr&#x00E4;ge)"},{"journal-title":"OPC Unified Architecture","year":"2016","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-162"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICRMS.2018.00049"},{"year":"2017","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407077"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395600"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3850\/9783981537079_1005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.12.004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2017.04.005"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2016.2618724"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.04.007"},{"journal-title":"Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid SCADA and Other Industrial Control Systems","year":"2014","author":"knapp","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2019.07.002"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/0263-2373(88)90033-3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2017.2782679"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.20965\/ijat.2017.p0004"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35285-5_10"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.7987r1"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2017.08.2349"},{"key":"ref24","first-page":"148","article-title":"Convergent access control to enable secure smart communities","author":"bhatt","year":"2020","journal-title":"Proc 2nd IEEE Int Conf Trust Privacy Secur Intell Syst Appl (TPS-ISA)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875496"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947377"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA46521.2020.9211947"},{"article-title":"Secure computer systems: Mathematical foundations","year":"1973","author":"bell","key":"ref43"},{"key":"ref25","first-page":"1e","article-title":"The ASCAA principles for next-generation role-based access control","author":"sandhu","year":"2008","journal-title":"Proc ARES 3rd Int Conf Availability Secur Rel"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09513277.pdf?arnumber=9513277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:57:29Z","timestamp":1639771049000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9513277\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3104649","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}