{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:57:27Z","timestamp":1764997047589,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/icit.2015.7125539","type":"proceedings-article","created":{"date-parts":[[2015,6,18]],"date-time":"2015-06-18T16:05:48Z","timestamp":1434643548000},"page":"2988-2993","source":"Crossref","is-referenced-by-count":30,"title":["Standardization in cyber-physical systems: The ARUM case"],"prefix":"10.1109","author":[{"given":"Paulo","family":"Leitao","sequence":"first","affiliation":[]},{"given":"Jose","family":"Barbosa","sequence":"additional","affiliation":[]},{"given":"Maria-Eleftheria Ch.","family":"Papadopoulou","sequence":"additional","affiliation":[]},{"given":"Iakovos S.","family":"Venieris","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"W3C Recommendation 2004","article-title":"OWL Web Ontology Language Reference","year":"2013","key":"ref10"},{"journal-title":"W3C Recommendation 2002","article-title":"XML Encryption Syntax and Processing","year":"2014","key":"ref11"},{"journal-title":"W3C Recommendation 2008","article-title":"XML Signature Syntax and Processing (2nd Edition)","year":"2014","key":"ref12"},{"year":"2014","key":"ref13","article-title":"OASIS Security Services (SAML) TC"},{"year":"2014","key":"ref14","article-title":"The NIST Model for Role-Based Access Control: Towards A Unified Standard"},{"year":"2014","key":"ref15","article-title":"OASIS eXtensible Access Control Markup Language (XACML) TC"},{"journal-title":"Standard","article-title":"IEC 61131: Programmable Controllers - Part 3: Programming Languages","year":"2012","key":"ref16"},{"journal-title":"International Electrotechnical Commission (IEC)","article-title":"IEC 61499: Function blocks - Part 1-4","year":"2012","key":"ref17"},{"year":"2014","key":"ref18","article-title":"Industrial automation systems and integration - JT file format specification for 3D visualization"},{"year":"0","key":"ref19","article-title":"ISA101, Human-Machine Interfaces"},{"journal-title":"FIPA The Foundation for Intelligent Physical Agents","year":"2014","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2013.6700372"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2004.11.016"},{"key":"ref5","first-page":"89","article-title":"FIPA Standards and Holonic Manufacturing","author":"marik","year":"2003"},{"journal-title":"SOA Reference Architecture The Open Group","year":"0","key":"ref8"},{"journal-title":"OASIS Service Oriented Architecture Reference Model Technical Committee","article-title":"Reference Architecture Foundation for Service Oriented Architecture Version 1.0","year":"2012","key":"ref7"},{"key":"ref2","article-title":"Industry 4.0, What's in a Name?","author":"sands","year":"2014","journal-title":"Industrial Technology"},{"year":"2013","key":"ref9","article-title":"Resource Description Framework"},{"key":"ref1","article-title":"Industrie 4.0 - Smarte Produkte und Fabriken revolutionieren die Industrie","author":"b\u00f6hler","year":"2012","journal-title":"Produktion Magazin"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/978-3-642-40090-2_19","article-title":"Adaptive Multi-agent System for a Washing Machine Production Line","volume":"8062","author":"rodrigues","year":"2013","journal-title":"Industrial Applications of Holonic and Multi-Agent Systems"},{"year":"2010","key":"ref22","article-title":"Multi-agent systems in industrial automation"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/9780470058411"},{"journal-title":"Book Review Handbook on Securing Cyber-Physical Critical Infrastructure Foundations and Challenges (written by Sajal K Das Krishna Kant Nan Zhang)","year":"2012","author":"michael","key":"ref24"},{"key":"ref23","article-title":"Challenges for Securing Cyber Physical Systems","author":"cardenas","year":"2009","journal-title":"Workshop on Future Directions in Cyber-physical Systems Security DHS"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.808"},{"journal-title":"ARUM - Adaptive Production Management","year":"2014","key":"ref25"}],"event":{"name":"2015 IEEE International Conference on Industrial Technology (ICIT)","start":{"date-parts":[[2015,3,17]]},"location":"Seville","end":{"date-parts":[[2015,3,19]]}},"container-title":["2015 IEEE International Conference on Industrial Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7108493\/7125066\/07125539.pdf?arnumber=7125539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T10:03:34Z","timestamp":1498212214000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7125539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/icit.2015.7125539","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}