{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:27:45Z","timestamp":1725665265700},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T00:00:00Z","timestamp":1627257600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,26]]},"DOI":"10.1109\/csr51186.2021.9527905","type":"proceedings-article","created":{"date-parts":[[2021,9,6]],"date-time":"2021-09-06T21:35:06Z","timestamp":1630964106000},"page":"234-240","source":"Crossref","is-referenced-by-count":2,"title":["Enabling Efficient Common Criteria Security Evaluation for Connected Vehicles"],"prefix":"10.1109","author":[{"given":"Angelos","family":"Stamou","sequence":"first","affiliation":[{"name":"Institute of Communication and Computer Systems (ICCS),Athens,Greece,GR-15773"}]},{"given":"Panagiotis","family":"Pantazopoulos","sequence":"additional","affiliation":[{"name":"Institute of Communication and Computer Systems (ICCS),Athens,Greece,GR-15773"}]},{"given":"Sammy","family":"Haddad","sequence":"additional","affiliation":[{"name":"Oppida,Montigny-le-Bretonneux,France,78180"}]},{"given":"Angelos","family":"Amditis","sequence":"additional","affiliation":[{"name":"Institute of Communication and Computer Systems (ICCS),Athens,Greece,GR-15773"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-319-20855-8_20","article-title":"The need for safety and cyber-security co-engineering and standardization for highly automated automotive vehicles","author":"schoitsch","year":"2016","journal-title":"Advanced Microsystems for Automotive Applications 2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9129136"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2669348"},{"year":"0","key":"ref13"},{"key":"ref14","article-title":"CARSEM: A Cooperative Autonomous Road-vehicles Security Evaluation","author":"haddad","year":"2018","journal-title":"25th ITS World Congress"},{"year":"0","key":"ref15"},{"journal-title":"Lightship Security Common Criteria accredited laboratory e-book","year":"0","key":"ref16"},{"key":"ref17","first-page":"1147","article-title":"Software Implementation of Common Criteria Related Design Patterns","author":"rogowski","year":"2013","journal-title":"2013 Federated Conference on Computer Science and Information Systems"},{"key":"ref18","first-page":"149","article-title":"GEST: A generator of ISO\/IEC15408 Security Target templates","author":"horie","year":"2009","journal-title":"Computer and Information Science"},{"year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2327587"},{"journal-title":"Tech Rep","article-title":"ISO\/IEC 15408 part 1\/2\/3:2005-Information technology, Security techniques, Evaluation criteria for IT security","year":"0","key":"ref3"},{"journal-title":"FIPS PUB 140 Series Requirements and standards for cryptographic modules","year":"2001","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508844"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1991.130656"},{"journal-title":"Tech Rep","article-title":"Trusted Computer System Evaluation Criteria (Orange Book)","year":"1985","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2019.8931344"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2018.8449811"},{"year":"0","key":"ref9"},{"year":"0","key":"ref20"},{"journal-title":"W3C Cascading Style Sheets","year":"0","key":"ref22"},{"journal-title":"ECMAScript language specification","year":"0","key":"ref21"},{"journal-title":"Intelligent Transport Systems Security Threat Vulnerability & Risk Analysis (TVRA) V1 2 1","year":"2017","key":"ref24"},{"year":"2017","key":"ref23"}],"event":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2021,7,26]]},"location":"Rhodes, Greece","end":{"date-parts":[[2021,7,28]]}},"container-title":["2021 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9527731\/9527900\/09527905.pdf?arnumber=9527905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:29:36Z","timestamp":1659482976000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9527905\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,26]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/csr51186.2021.9527905","relation":{},"subject":[],"published":{"date-parts":[[2021,7,26]]}}}