{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:54:05Z","timestamp":1762325645220,"version":"3.37.3"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,4,26]],"date-time":"2023-04-26T00:00:00Z","timestamp":1682467200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007223","name":"TU Wien","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007223","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,4,26]]},"DOI":"10.1109\/wfcs57264.2023.10144245","type":"proceedings-article","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T17:24:28Z","timestamp":1686158668000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Safety and Security Requirements in AAS Integration: Use Case Demonstration"],"prefix":"10.1109","author":[{"given":"Ali M.","family":"Hosseini","sequence":"first","affiliation":[{"name":"Institute of Computer Technology, TU Wien,Vienna,Austria"}]},{"given":"Thilo","family":"Sauter","sequence":"additional","affiliation":[{"name":"Institute of Computer Technology, TU Wien,Vienna,Austria"}]},{"given":"Wolfgang","family":"Kastner","sequence":"additional","affiliation":[{"name":"Institute of Computer Engineering, TU Wien,Vienna,Austria"}]}],"member":"263","reference":[{"journal-title":"IEC tr 63074 2019- safety of machinery - security aspects related to functional safety of safety-related control systems","year":"0","key":"ref13"},{"journal-title":"IEC tr 63069 2019-industrial-process measurement control and automation - framework for functional safety and security","year":"0","key":"ref12"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS53837.2022.9779188"},{"key":"ref14","first-page":"16","article-title":"Guide to industrial control systems (ics) security","volume":"800","author":"stouffer","year":"2011","journal-title":"NIST Special Publication"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.23919\/SICE.2017.8105699"},{"journal-title":"Der standard f&#x00FC;r den digitalen zwilling","year":"0","key":"ref10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirpj.2020.02.002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.06.017"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2020.3010492"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/s20216028"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869059"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/computers10070084"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19762-8_2"},{"journal-title":"OWASP API Security Project","year":"0","key":"ref23"},{"journal-title":"Next-gen plc training","year":"0","key":"ref26"},{"key":"ref25","article-title":"Requirements engineering","author":"macaulay","year":"2012","journal-title":"Springer Science & Business Media"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/pr10102155"},{"journal-title":"API Security in Action","year":"2020","author":"madden","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-19762-8_11"},{"journal-title":"Power plant instrumentation and control handbook A guide to thermal power plants","year":"2014","author":"basu","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA45728.2021.9613152"},{"journal-title":"Software Requirements","year":"2013","author":"wiegers","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2873186"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00262-6_2"},{"journal-title":"Secure usage of asset administration shells an overview and analysis of best practises","year":"2021","author":"br\u00f6ring","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3171465"},{"journal-title":"Details of the Asset Administration Shell Part 1","year":"0","key":"ref3"},{"journal-title":"TRITON The first ICS cyber attack on safety instrument systems","year":"0","author":"di pinto","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.02.008"}],"event":{"name":"2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)","start":{"date-parts":[[2023,4,26]]},"location":"Pavia, Italy","end":{"date-parts":[[2023,4,28]]}},"container-title":["2023 IEEE 19th International Conference on Factory Communication Systems (WFCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10144222\/10144112\/10144245.pdf?arnumber=10144245","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,26]],"date-time":"2023-06-26T18:01:29Z","timestamp":1687802489000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10144245\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,26]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/wfcs57264.2023.10144245","relation":{},"subject":[],"published":{"date-parts":[[2023,4,26]]}}}