{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:12:23Z","timestamp":1774678343593,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/etfa.2019.8869524","type":"proceedings-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T19:18:52Z","timestamp":1571339932000},"page":"325-332","source":"Crossref","is-referenced-by-count":11,"title":["A Unified Architecture for Industrial IoT Security Requirements in Open Platform Communications"],"prefix":"10.1109","author":[{"given":"Gerhard","family":"Hansch","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Garching, Germany"}]},{"given":"Peter","family":"Schneider","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching, Germany"}]},{"given":"Kai","family":"Fischer","sequence":"additional","affiliation":[{"name":"Siemens AG, Corporate Technology, Munich, Germany"}]},{"given":"Konstantin","family":"Bottinger","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching, Germany"}]}],"member":"263","reference":[{"key":"ref10","article-title":"D 2.2 Threat and Risk Assessment Methodology: SPARKS (Smart Grid Protection Against Cyber Attacks) Deliverable","author":"hutle","year":"2015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2004.3.1.c6"},{"key":"ref12","article-title":"Process Control Domain - Security Requirements for Vendors: WIB working group: Plant security","year":"2010","journal-title":"Standard"},{"key":"ref13","article-title":"IEC TR 62541-1:2016 - OPC unified architecture - Part 1: Overview and concepts","year":"2016","journal-title":"Technical Report"},{"key":"ref14","first-page":"500","article-title":"Scalability of OPC-UA down to the chip level enables","author":"imtiaz","year":"0","journal-title":"Internet of Things"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2017.8247691"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2017.8247571"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296773"},{"key":"ref18","article-title":"ReqIF&#x2013;the new requirements standard and its open source implementation Eclipse RMF","author":"jastram","year":"2012","journal-title":"Intl Commercial Vehicle Technology Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.121"},{"key":"ref4","year":"2018","journal-title":"ISO\/IEC 27000 2018 - Information technology &#x2013; Security techniques &#x2013; Information security management systems &#x2013; Overview and vocabulary"},{"key":"ref3","author":"lin","year":"2017","journal-title":"Tech Rep IIC WHT IN3 V1 0 PB 20171205"},{"key":"ref6","year":"2012","journal-title":"NIST SP 800-30 Rev 1 Guide for Conducting Risk Assessments"},{"key":"ref5","year":"2018","journal-title":"ISO\/IEC 27005 2018 Information technology &#x2013; Security techniques &#x2013; Information security risk management"},{"key":"ref8","article-title":"Systematic Identification of Security Goals and Threats in Risk Assessment","volume":"36","author":"angermeier","year":"2016","journal-title":"Softwaretechnik-Trends"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0092-x"},{"key":"ref2","year":"2016","journal-title":"DIN SPEC 91345 - Reference Architecture Model Industrie 4 0 (RAMI4 0)"},{"key":"ref1","article-title":"The Industrial Internet of Things Volume G1: Reference Architecture","year":"2017","journal-title":"IIC Standard"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3327961.3329528"},{"key":"ref20","article-title":"Common Methodology for Information Technology Security Evaluation: Evaluation Methodology","year":"2017","journal-title":"Common Criteria Standard"},{"key":"ref22","year":"2019","journal-title":"IEC 62443-4-2 2019 Security for industrial automation and control systems - Part 4-2 Technical security requirements for IACS components"},{"key":"ref21","year":"2013","journal-title":"IEC 62443-3-3 2013 Industrial communication networks - Network and system security - Part 3-3 System security requirements and security levels"},{"key":"ref23","year":"2019","journal-title":"FreeOpcUa Open Source C++ and Python OPC-UA Server and Client Libraries and Tools"}],"event":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","location":"Zaragoza, Spain","start":{"date-parts":[[2019,9,10]]},"end":{"date-parts":[[2019,9,13]]}},"container-title":["2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8851311\/8868236\/08869524.pdf?arnumber=8869524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:48:38Z","timestamp":1658141318000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8869524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/etfa.2019.8869524","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}