{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:12:51Z","timestamp":1754485971233,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,12]],"date-time":"2023-09-12T00:00:00Z","timestamp":1694476800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,12]]},"DOI":"10.1109\/etfa54631.2023.10275445","type":"proceedings-article","created":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T17:38:14Z","timestamp":1697132294000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["A NETCONF-Based Solution for Credential Management in Time-Sensitive Networks"],"prefix":"10.1109","author":[{"given":"Adian","family":"Shubbar","sequence":"first","affiliation":[{"name":"Offenburg University of Applied Sciences,Institute of Reliable Embedded Systems and Communication Electronics (ivESK),Offenburg,Germany,77652"}]},{"given":"Andreas","family":"Walz","sequence":"additional","affiliation":[{"name":"Offenburg University of Applied Sciences,Institute of Reliable Embedded Systems and Communication Electronics (ivESK),Offenburg,Germany,77652"}]},{"given":"Julian","family":"G\u00f6ppert","sequence":"additional","affiliation":[{"name":"Offenburg University of Applied Sciences,Institute of Reliable Embedded Systems and Communication Electronics (ivESK),Offenburg,Germany,77652"}]},{"given":"Axel","family":"Sikora","sequence":"additional","affiliation":[{"name":"Offenburg University of Applied Sciences,Institute of Reliable Embedded Systems and Communication Electronics (ivESK),Offenburg,Germany,77652"}]}],"member":"263","reference":[{"key":"ref13","article-title":"Technical Overview, Secure cross-company communication","author":"feger","year":"2016","journal-title":"Federal Ministry for Economic Affairs and Energy"},{"journal-title":"IEC\/IEEE TSN Profile for Industrial Automation","year":"0","key":"ref12"},{"year":"0","key":"ref23","article-title":"cisco\/libest"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2012.53"},{"key":"ref14","first-page":"1","article-title":"ISO\/IEC\/IEEE International Standard for Telecommunications and exchange between information technology systems&#x2013;Requirements for local and metropolitan area networks&#x2013;Part 1AR:Secure device identity","year":"2020","journal-title":"ISO\/IEC\/IEEE 8802-1AR 2020(E)"},{"key":"ref20","article-title":"NETCONF Client and Server Models","author":"watsen","year":"0","journal-title":"Internet Engineering Task Force Internet-Draft draft-ietf-netconfnetconf-client-server-28 work in Progress"},{"article-title":"Towards a generic credential management model in industrial automation systems","year":"2023","author":"walz","key":"ref11"},{"year":"0","key":"ref22","article-title":"Netopeer2 &#x2013; NETCONF server"},{"journal-title":"Prozesse und Kommunikationsprotokolle f&#x00FC;r ein Security Lifecycle Managemgent in industriellen Feldbusger&#x00E4;ten und &#x2013;systemen","year":"0","key":"ref10"},{"key":"ref21","article-title":"Managing home routers with netconf over tls and netconf call home","volume":"abs 2112 14612","author":"bajpai","year":"2021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2901314"},{"key":"ref1","first-page":"149","article-title":"The convergence of IT and OT in critical infrastructure","author":"murray","year":"2017","journal-title":"The Proceedings of 15th Australian Information Security Management Conference"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6241"},{"key":"ref16","article-title":"Time-Sensitive Networking: From Theory to Implementation in Industrial Automation","author":"brooks","year":"0","journal-title":"Intel White Paper WP-01279-1 0 Tech Rep"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ColComCon.2017.8088217"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7950"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2012.6489750"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME55909.2022.9988000"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/NetSys.2019.8854499"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3017016"},{"journal-title":"Time-Sensitive Networking Task Group IEEE 802 1","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7589"},{"journal-title":"Tech Rep","article-title":"Integration of 5G with Time-Sensitive Networking for Industrial Communications","year":"2021","key":"ref5"}],"event":{"name":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2023,9,12]]},"location":"Sinaia, Romania","end":{"date-parts":[[2023,9,15]]}},"container-title":["2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10275065\/10275329\/10275445.pdf?arnumber=10275445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T18:44:58Z","timestamp":1698691498000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10275445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/etfa54631.2023.10275445","relation":{},"subject":[],"published":{"date-parts":[[2023,9,12]]}}}