{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T17:44:10Z","timestamp":1773683050130,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/efta.2007.4416910","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T20:59:03Z","timestamp":1199480343000},"page":"1141-1148","source":"Crossref","is-referenced-by-count":34,"title":["Common approach to functional safety and system security in building automation and control systems"],"prefix":"10.1109","author":[{"given":"Thomas","family":"Novak","sequence":"first","affiliation":[]},{"given":"Albert","family":"Treytl","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Palensky","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Managing the Development in Large Software Systems","author":"royce","year":"1970","journal-title":"Proceedings of IEEE WESCOM"},{"key":"ref11","author":"m\u00fcller-ettrich","year":"1999","journal-title":"Objektorientierte Prozessmodelle UML einsehen mit OOTC V-Modell Objectory"},{"key":"ref12","author":"leveson","year":"1995","journal-title":"Safeware System Safety and Computers"},{"key":"ref13","article-title":"EN 50159-1: Railway Applications &#x2013; Safety-Related Communication in Closed Transmission Systems","year":"2001"},{"key":"ref14","author":"reinert","year":"2001","journal-title":"Sichere Bussysteme in der Automation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.283"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2007.4384739"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2005.1612666"},{"key":"ref18","author":"stallings","year":"2003","journal-title":"Cryptography and Network Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2006.1704168"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/IWSSD.1998.667915"},{"key":"ref3","first-page":"182","article-title":"From Security to Safety and Back","author":"stavridou","year":"1998","journal-title":"Proceedings of Computer Security Dependability and Assurance From Needs to Solutions"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39878-3_9"},{"key":"ref5","article-title":"Fundamental Concepts of Dependability","author":"avizienis","year":"2001"},{"key":"ref8","article-title":"EN 50126 &#x2013; Railway applications. The specification and demonstration of reliability, maintainability and safety (RAMS)","year":"1999"},{"key":"ref7","article-title":"IEC 61508 &#x2013; Functional safety of electric\/electronic\/programmable electronic safety-related systems","year":"1999"},{"key":"ref2","first-page":"468","article-title":"The Integration of Safety and Security Requirements","author":"eames","year":"1999","journal-title":"SAFECOMP'99"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2003.1247734"},{"key":"ref9","article-title":"IEC 15408 &#x2013; Information technology &#x2013; Security technique &#x2013; Evaluation criteria for IT security","year":"1999"},{"key":"ref20","article-title":"Relationship between security and safety in a security-safety critical system: Safety consequences of security threats","author":"sorby","year":"2003"}],"event":{"name":"2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007)","location":"Patras, Greece","start":{"date-parts":[[2007,9,25]]},"end":{"date-parts":[[2007,9,28]]}},"container-title":["2007 IEEE Conference on Emerging Technologies &amp; Factory Automation (EFTA 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4416742\/4416743\/04416910.pdf?arnumber=4416910","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T19:54:20Z","timestamp":1489694060000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4416910\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/efta.2007.4416910","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}