{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T23:03:17Z","timestamp":1725577397283},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,13]]},"DOI":"10.1109\/iecon48115.2021.9589691","type":"proceedings-article","created":{"date-parts":[[2021,11,10]],"date-time":"2021-11-10T23:47:51Z","timestamp":1636588071000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Security Certification of Cyber Physical Systems for Critical Infrastructure based on the Compositional MILS Architecture"],"prefix":"10.1109","author":[{"given":"Andreas","family":"Hohenegger","sequence":"first","affiliation":[]},{"given":"Gerald","family":"Krummeck","sequence":"additional","affiliation":[]},{"given":"Janie","family":"Banos","sequence":"additional","affiliation":[]},{"given":"Alvaro","family":"Ortega","sequence":"additional","affiliation":[]},{"given":"Michal","family":"Hager","sequence":"additional","affiliation":[]},{"given":"Jiri","family":"Sterba","sequence":"additional","affiliation":[]},{"given":"Tomas","family":"Kertis","sequence":"additional","affiliation":[]},{"given":"Petr","family":"Novobilsky","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Prochazka","sequence":"additional","affiliation":[]},{"given":"Benito","family":"Caracuel","sequence":"additional","affiliation":[]},{"given":"Ana Lourdes","family":"Sanz","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Ramos","sequence":"additional","affiliation":[]},{"given":"Holger","family":"Blasum","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Brotz","sequence":"additional","affiliation":[]},{"given":"Rudolf","family":"Fuchsen","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Fumaroli","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Neskudla","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Rollo","sequence":"additional","affiliation":[]},{"given":"Lisa","family":"Burgstaller","sequence":"additional","affiliation":[]},{"given":"Martina","family":"Truskaller","sequence":"additional","affiliation":[]},{"given":"Klaus-Michael","family":"Koch","sequence":"additional","affiliation":[]},{"given":"Reinhard","family":"Hametner","sequence":"additional","affiliation":[]},{"given":"Sandro","family":"Rauscher","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Tummeltshammer","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Golatowski","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Schulz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref39","article-title":"PikeOS Separation Kernal CC Certification Report"},{"article-title":"Security testing framework (certMILS D4.4); post-acceptance archival planned at zenodo.org","year":"2020","author":"schulz","key":"ref38"},{"article-title":"Guidelines to use and apply PP for all involved stakeholders","year":"2018","author":"rollo","key":"ref33"},{"article-title":"MILS Platform PP Modules","year":"2018","author":"ortega","key":"ref32"},{"article-title":"Base MILS Platform Protection Profile","year":"2018","author":"rico","key":"ref31"},{"key":"ref30","first-page":"26","article-title":"D4.2 Compositional assurance cases and arguments for distributed MILS","author":"cimatti","year":"2015"},{"key":"ref37","article-title":"Evaluation paradigm selection according to Common Criteria for an incremental product development","author":"sinnhofer","year":"2015","journal-title":"International workshop on MILS architecture and assurance for secure systems MILS HiPEAC 2015"},{"year":"2015","key":"ref36","article-title":"Elektronische Bahn-Signalanlagen - Teil 104: Leitfaden f&#x00FC;r die IT-Sicherheit auf Grundlage IEC 62443"},{"year":"2020","key":"ref35","article-title":"SDLA-312 Security Development Lifecycle Assessment Version 5.7"},{"year":"2014","key":"ref34","article-title":"SDLA-312 Security Development Lifecycle Assessment Version 3.0"},{"year":"2017","key":"ref10","article-title":"Common Criteria for Information Technology Security Evaluation. Version 3.1, revision 5"},{"key":"ref11","first-page":"85","article-title":"Die Common Criteria und IEC-62443","author":"hohenegger","year":"2019","journal-title":"Deutscher IT-Sicherheitskongress"},{"year":"2018","key":"ref40","article-title":"Security Target PikeOS Separation Kernel v4.2.2"},{"year":"2021","key":"ref12","article-title":"CENELEC, prTS 50701: Railway applications &#x2013; Cybersecurity, CLC\/FprTS 50701, 67491, vote for ts\/tr, CLC\/TC 9X"},{"first-page":"21","article-title":"Rules of Procedure &#x2013;CB Scheme of the IECEE for Mutual Recognition of Test Certificates for Electrotechnical Equipment and Components (CB Scheme) and its related services:Statement of Test Results - Energy Efficiency Testing Service (E3)Global Motor Energy Efficiency (GMEE) Program Industrial Cyber Security Program","year":"2019","key":"ref13"},{"year":"2020","key":"ref14","article-title":"ISASecure - IEC 62443 Conformance Certification - Official Site"},{"year":"2020","key":"ref15","article-title":"exida - IEC 62443 Cybersecurity Certification"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3850\/978-981-14-8593-0_3728-cd"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1994.296590"},{"article-title":"Compositional Certification","year":"2009","author":"rushby","key":"ref18"},{"article-title":"Compositional Certification Lecture Notes","year":"2009","author":"delong","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852692"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IWIA.2004.1288043"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3850\/978-981-11-2724-3_0220-cd"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64144-3"},{"article-title":"Community Feedback on the Separation Kernel Protection Profile Draft","year":"2019","author":"schulz","key":"ref6"},{"article-title":"Security Architecture Template","year":"2018","author":"tverdyshev","key":"ref5"},{"key":"ref29","article-title":"Why Composite Evaluations Fail (A13a)","author":"kurth","year":"2018","journal-title":"International Common Criteria Conference (ICCC) 2018"},{"year":"2018","key":"ref8","article-title":"IEC 62443-4-1: Security for industrial automation and control systems - Part 4-1: Secure product development life-cycle requirements"},{"journal-title":"The Sciences of the Artificial","year":"1996","author":"simon","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPS49255.2021.9468241"},{"year":"2019","key":"ref9","article-title":"IEC 62443-4-2: Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components"},{"article-title":"MILS Architecture","year":"2013","author":"tverdyshev","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/03081077608934734"},{"article-title":"Trustworthy MILS: CC composite evaluation approach","year":"2015","author":"schwarz","key":"ref22"},{"article-title":"Regulative Baseline: Compositional Security Evaluation","year":"2017","author":"hohenegger","key":"ref21"},{"year":"2018","key":"ref24","article-title":"Composite product evaluation for Smart Cards and similar devices"},{"year":"2014","key":"ref23","article-title":"Security IC Platform Protection Profile with Augmentation Packages"},{"article-title":"Detailed requirements the OPENCOSS compositional certification approach D5.2","year":"2012","author":"jacobs","key":"ref26"},{"year":"2012","key":"ref25","article-title":"GPC_SPE_31: GlobalPlatform card composition model version 1.1"}],"event":{"name":"IECON 2021 - 47th Annual Conference of the IEEE Industrial Electronics Society","start":{"date-parts":[[2021,10,13]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2021,10,16]]}},"container-title":["IECON 2021 \u2013 47th Annual Conference of the IEEE Industrial Electronics Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9588332\/9589036\/09589691.pdf?arnumber=9589691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:50:06Z","timestamp":1652201406000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9589691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/iecon48115.2021.9589691","relation":{},"subject":[],"published":{"date-parts":[[2021,10,13]]}}}