{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T16:45:40Z","timestamp":1730220340004,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,7]]},"DOI":"10.1109\/etfa45728.2021.9613151","type":"proceedings-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:13:36Z","timestamp":1638317616000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["A Questionnaire Study on the Use of Access Control in Industrial Systems"],"prefix":"10.1109","author":[{"given":"Bjorn","family":"Leander","sequence":"first","affiliation":[]},{"given":"Aida","family":"Causevic","sequence":"additional","affiliation":[]},{"given":"Tomas","family":"Lindstrom","sequence":"additional","affiliation":[]},{"given":"Hans","family":"Hansson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2020.120102"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA49311.2020.9139673"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12330-7_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407077"},{"key":"ref15","article-title":"Secure granular interoperability with opc ua","author":"watson","year":"0","journal-title":"INFORMATIK 2019 50 Jahre Gesellschaft f&#x00FC;r Informatik - Informatik fr Gesellschaft (Workshop-Beitr&#x00E4;ge)"},{"journal-title":"Internation Electrotechnical Commission Geneva CH","article-title":"IEC 62541 OPC unified architecture","year":"2016","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59155-7_33"},{"key":"ref18","first-page":"148","author":"bhatt","year":"2020","journal-title":"Convergent Access Control to Enable Secure Smart Communities"},{"journal-title":"Industrial Network Security Securing Critical Infrastructure Networks for Smart Grid SCADA and Other Industrial Control Systems","year":"2014","author":"knapp","key":"ref19"},{"journal-title":"NERC","article-title":"NERC CIP Standards","year":"2019","key":"ref4"},{"journal-title":"SAE International","article-title":"SAE j3061, cybersecurity guidebook for cyber-physical vehicle systems","year":"2016","key":"ref3"},{"journal-title":"Geneva International Electrotechnical Commission","article-title":"IEC 62351 - power systems management and associated information exchange","year":"2021","key":"ref6"},{"journal-title":"Security and privacy controls for information systems and organizations","year":"2020","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/JSIT-02-2018-0028"},{"key":"ref7","article-title":"Cybersecurity awareness in an industrial control systems company","volume":"2020 june","author":"prins","year":"0","journal-title":"13th European conference on information warfare and security ECCWS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3341481"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.trpro.2020.03.058"},{"key":"ref1","first-page":"2009","article-title":"IEC 62443 security for industrial automation and control systems","year":"0","journal-title":"Internation Electrotechnical Commission Geneva CH"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.849714"},{"journal-title":"SOC2 - SOC for Service Organizations Trust Services Criteria","year":"2021","key":"ref22"},{"journal-title":"Guidelines for Conducting Surveys in software engineering","year":"2015","author":"lin\u00e5ker","key":"ref21"},{"journal-title":"Cybersecurity Framework-NIST","year":"2020","key":"ref24"},{"journal-title":"CIS AWS Benchmark","year":"2019","key":"ref23"},{"journal-title":"IEC 62443-4-2 - Component Security Assurance (CSA)","year":"2021","key":"ref25"}],"event":{"name":"2021 IEEE 26th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2021,9,7]]},"location":"Vasteras, Sweden","end":{"date-parts":[[2021,9,10]]}},"container-title":["2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA )"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9613137\/9613141\/09613151.pdf?arnumber=9613151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:52:36Z","timestamp":1652201556000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9613151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,7]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/etfa45728.2021.9613151","relation":{},"subject":[],"published":{"date-parts":[[2021,9,7]]}}}