{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:59:19Z","timestamp":1730267959158,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/indin.2018.8472068","type":"proceedings-article","created":{"date-parts":[[2018,10,9]],"date-time":"2018-10-09T02:00:15Z","timestamp":1539050415000},"page":"882-889","source":"Crossref","is-referenced-by-count":3,"title":["Overview of Authentication and Access Controls for I&amp;C systems"],"prefix":"10.1109","author":[{"given":"Asmaa","family":"Tellabi","sequence":"first","affiliation":[]},{"given":"Jochen","family":"Sassmanhausen","sequence":"additional","affiliation":[]},{"given":"Edita","family":"Bajramovic","sequence":"additional","affiliation":[]},{"given":"Karl Christoph","family":"Ruland","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-162"},{"journal-title":"Extensible Access Control Markup Language (XACML) Version 1 0 OASIS Standard","year":"2013","key":"ref11"},{"key":"ref12","first-page":"554","article-title":"Role-based access controls","author":"ferraiolo","year":"1992","journal-title":"Proceedings of the 15th NISTNCSC National Computer Security Conference"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MITP.2013.37","article-title":"ABAC and RBAC: Scalable, Flexible, and Auditable Access Management","volume":"15","author":"weil","year":"2013","journal-title":"IT Professional"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.155"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.1955.0005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2875491.2875496"},{"journal-title":"Security for Industrial Automation and Control Systems","year":"0","key":"ref17"},{"key":"ref4","article-title":"Recommendation for Key Management - Part 1: General","volume":"800","author":"barker","year":"2012","journal-title":"NIST Special Publication"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref6","article-title":"Safety, cybersecurity and interoperability of modern power plants","author":"tellabi","year":"2018","journal-title":"IARIA PESARO"},{"journal-title":"top 10 differences between ICS and IT systems","year":"5","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"journal-title":"Managing cybersecurity for Industrial control systems","year":"2012","key":"ref2"},{"journal-title":"Digital Instrumentation and Control Systems in Nuclear Power Plants Safety and Reliability Issues","year":"1997","key":"ref1"},{"journal-title":"Security for Industrial Automation and Control Systems Research Triangle Park","year":"2015","key":"ref9"}],"event":{"name":"2018 IEEE 16th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2018,7,18]]},"location":"Porto","end":{"date-parts":[[2018,7,20]]}},"container-title":["2018 IEEE 16th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8453042\/8471919\/08472068.pdf?arnumber=8472068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T11:45:48Z","timestamp":1640259948000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8472068\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/indin.2018.8472068","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}