{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T08:40:28Z","timestamp":1774773628081,"version":"3.50.1"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T00:00:00Z","timestamp":1654041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"European Commission through the European H2020 research and innovation program"},{"DOI":"10.13039\/501100011688","name":"Electronic Components and Systems for European Leadership","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011688","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Funding Authorities"},{"name":"Arrowhead Tools","award":["826452"],"award-info":[{"award-number":["826452"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Systems Journal"],"published-print":{"date-parts":[[2022,6]]},"DOI":"10.1109\/jsyst.2021.3064196","type":"journal-article","created":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T22:04:38Z","timestamp":1618437878000},"page":"2195-2205","source":"Crossref","is-referenced-by-count":25,"title":["Security Standard Compliance Verification in System of Systems"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2477-3692","authenticated-orcid":false,"given":"Ani","family":"Bicaku","sequence":"first","affiliation":[{"name":"University of Applied Sciences Burgenland, Eisenstadt, Austria"}]},{"given":"Mario","family":"Zsilak","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Burgenland, Eisenstadt, Austria"}]},{"given":"Peter","family":"Theiler","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Burgenland, Eisenstadt, Austria"}]},{"given":"Markus","family":"Tauber","sequence":"additional","affiliation":[{"name":"University of Applied Sciences Burgenland, Eisenstadt, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4133-3317","authenticated-orcid":false,"given":"Jerker","family":"Delsing","sequence":"additional","affiliation":[{"name":"Embedded Intelligent Systems Lab., Lule&#x00E5; University of Technology, Lule&#x00E5;, Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-82e2008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1520-6858(1998)1:4<267::AID-SYS3>3.0.CO;2-D"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/0951192X.2017.1392615"},{"key":"ref4","volume-title":"Understanding SOA With Web Services","author":"Newcomer","year":"2005"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2009.2027013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1201\/9781315367897"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.02.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390801"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.36244\/ICJ.2019.1.1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720922731"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2018.8390800"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13094-6_21"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2013.11"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2017.8016285"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2018.02.022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2904475"},{"key":"ref17","article-title":"IoT security compliance framework","volume-title":"IoT Security Foundation","author":"Atoui","year":"2016"},{"key":"ref18","volume-title":"Practical Internet of Things Security: Design a Security Framework for an Internet Connected Ecosystem","author":"Russell","year":"2018"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SYSTEMS.2010.5482464"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.49"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/jcaf.20035"},{"key":"ref22","article-title":"SOA meets compliance: Compliance oriented architecture","volume-title":"White Paper, RedMonk","author":"grady","year":"2004"},{"key":"ref23","article-title":"Final versions of the UOCAVA security best practices documents, NISTIR 7711 and NISTIR 7682","author":"Bass","year":"2011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.08.028"},{"key":"ref25","article-title":"Service interaction through gateways for inter-cloud collaboration within the arrowhead framework","volume-title":"Proc. 5th IEEE Wireless Vitae","author":"Varga","year":"2015"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2016.7819255"},{"issue":"2","key":"ref27","first-page":"13","article-title":"An approach to map COBIT processes to ISO\/IEC 27001 information security management controls","volume":"6","author":"Sheikhpour","year":"2012","journal-title":"Int. J. Secur. Its Appl."},{"key":"ref28","volume-title":"Information TechnologySecurity TechniquesGuidelines for Cybersecurity","author":"I","year":"2012"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/ICS2015.2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-82e2008"},{"key":"ref31","article-title":"Industrial communication networksNetwork and system securityPart 3-3: System security requirements and security levels","volume-title":"Nat. Inst. Standards Technol.","year":"2013"}],"container-title":["IEEE Systems Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4267003\/9794630\/09404224.pdf?arnumber=9404224","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:34:21Z","timestamp":1704843261000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9404224\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6]]},"references-count":31,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jsyst.2021.3064196","relation":{},"ISSN":["1932-8184","1937-9234","2373-7816"],"issn-type":[{"value":"1932-8184","type":"print"},{"value":"1937-9234","type":"electronic"},{"value":"2373-7816","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6]]}}}