{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:02:33Z","timestamp":1768582953662,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,8,17]],"date-time":"2012-08-17T00:00:00Z","timestamp":1345161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,8,17]]},"DOI":"10.1145\/2490428.2490449","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"150-159","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Automotive functional safety = safety + security"],"prefix":"10.1145","author":[{"given":"Simon","family":"Burton","sequence":"first","affiliation":[{"name":"ETAS GmbH, Atlas House, United Kingdom"}]},{"given":"J\u00fcrgen","family":"Likkei","sequence":"additional","affiliation":[{"name":"Robert Bosch GmbH, Stuttgart, Germany"}]},{"given":"Priyamvadha","family":"Vembar","sequence":"additional","affiliation":[{"name":"Robert Bosch GmbH, Stuttgart, Germany"}]},{"given":"Marko","family":"Wolf","sequence":"additional","affiliation":[{"name":"ESCRYPT GmbH, M\u00fcnchen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,8,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Charette R. 2009 This Car Runs on Code http:\/\/spectrum.ieee.org\/_green-tech\/advanced-cars\/this-car-runs-on-code.  Charette R. 2009 This Car Runs on Code http:\/\/spectrum.ieee.org\/_green-tech\/advanced-cars\/this-car-runs-on-code."},{"key":"e_1_3_2_1_2_1","unstructured":"International Organization for Standardization 2011 ISO 26262 \"Road Vehicles -- Functional Safety\" International Standard.  International Organization for Standardization 2011 ISO 26262 \"Road Vehicles -- Functional Safety\" International Standard."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_4_1","volume-title":"Version 3.1, Revision","author":"Common Criteria","year":"2006","unstructured":"Common Criteria for Information Technology Security Evaluation , continually maintained as ISO 15408. Part 1: Introduction and general model , Version 3.1, Revision 1, September 2006 , Part 2: Security functional components, Version 3.1, Revision 2, September 2007, Part 3: Security assurance components, Version 3.1, Revision 2, September 2007. Common Criteria for Information Technology Security Evaluation, continually maintained as ISO 15408. Part 1: Introduction and general model, Version 3.1, Revision 1, September 2006, Part 2: Security functional components, Version 3.1, Revision 2, September 2007, Part 3: Security assurance components, Version 3.1, Revision 2, September 2007."},{"key":"e_1_3_2_1_5_1","unstructured":"Common Criteria Recognition Agreement Available at www.commoncriteriaportal.org\/theccra.html 2006\n  . \n  Forman G.\n   2003. Common Criteria Recognition Agreement Available at www.commoncriteriaportal.org\/theccra.html 2006. Forman G. 2003."},{"key":"e_1_3_2_1_6_1","unstructured":"Common Methodology for Information Technology Security Evaluation Version 3.1 Revision 2 September 2007 Continually maintained as ISO 18045. Common Methodology for Information Technology Security Evaluation Version 3.1 Revision 2 September 2007 Continually maintained as ISO 18045."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"e_1_3_2_1_9_1","volume-title":"Dr. Dobb's journal,","author":"Schneier B.","year":"1999","unstructured":"Schneier , B. 1999 , Attack Trees -- Modelling Security Threats , in Dr. Dobb's journal, available at http:\/\/www.schneier.com\/paper-attacktrees-ddj-ft.html, December 1999 . Schneier, B. 1999, Attack Trees -- Modelling Security Threats, in Dr. Dobb's journal, available at http:\/\/www.schneier.com\/paper-attacktrees-ddj-ft.html, December 1999."},{"key":"e_1_3_2_1_10_1","volume-title":"7th Embedded Security in Cars Workshop (escar","author":"Scheibel M.","year":"2009","unstructured":"Scheibel , M. , Wolf , M. , 2009 , Security Risk Analysis for Vehicular IT Systems --- A Business Model for IT Security Measures , In 7th Embedded Security in Cars Workshop (escar 2009). Scheibel, M., Wolf, M., 2009, Security Risk Analysis for Vehicular IT Systems --- A Business Model for IT Security Measures, In 7th Embedded Security in Cars Workshop (escar 2009)."},{"key":"e_1_3_2_1_11_1","volume-title":"ERTS2012","author":"Burton S.","year":"2012","unstructured":"Burton , S. , Habermann , A. , 2012 , Automotive Systems Engineering and Functional Safety: The Way Forwards , ERTS2012 . Burton, S., Habermann, A., 2012, Automotive Systems Engineering and Functional Safety: The Way Forwards, ERTS2012."},{"key":"e_1_3_2_1_12_1","unstructured":"Automotive Industry Action Group (AIAG) \"Potential Failure Mode and Effects Analysis (FMEA)\" 2008.  Automotive Industry Action Group (AIAG) \"Potential Failure Mode and Effects Analysis (FMEA)\" 2008."},{"key":"e_1_3_2_1_13_1","volume-title":"Sicherung der Qualit\u00e4t vor Serieneinsatz -- System-FMEA","author":"VDA","year":"1996","unstructured":"VDA : Sicherung der Qualit\u00e4t vor Serieneinsatz -- System-FMEA , 1 . Aufl. 1996 , ISSN 0943--9412 VDA: Sicherung der Qualit\u00e4t vor Serieneinsatz -- System-FMEA, 1. Aufl. 1996, ISSN 0943--9412","edition":"1"},{"key":"e_1_3_2_1_14_1","volume-title":"Future Prospects in Proceedings of 1st ENCRESS\/12th CSR Workshop","author":"Wilson S. P.","year":"1995","unstructured":"Wilson , S. P. , Kelly , T. P. , McDermid , J. A. , 1995 . Safety Case Development: Current Practice , Future Prospects in Proceedings of 1st ENCRESS\/12th CSR Workshop , September 1995, Springer. Wilson, S. P., Kelly, T. P., McDermid, J. A., 1995. Safety Case Development: Current Practice, Future Prospects in Proceedings of 1st ENCRESS\/12th CSR Workshop, September 1995, Springer."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the Dependable Systems and Networks 2004 Workshop on Assurance Cases.","author":"Kelly T. P.","year":"2004","unstructured":"Kelly , T. P. , Weaver , R. A. , 2004 , The Goal Structuring Notation - A Safety Argument Notation , in Proceedings of the Dependable Systems and Networks 2004 Workshop on Assurance Cases. Kelly, T. P., Weaver, R. A., 2004, The Goal Structuring Notation - A Safety Argument Notation, in Proceedings of the Dependable Systems and Networks 2004 Workshop on Assurance Cases."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1886301.1886310"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:19980543"}],"event":{"name":"SECURIT '12: First International Conference on Security of Internet of Things","location":"Kollam India","acronym":"SECURIT '12","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","TCG Trusted Computing Group","Amrita Amrita Vishwa Vidyapeetham","CSA Computer Science Association"]},"container-title":["Proceedings of the First International Conference on Security of Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490449","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2490428.2490449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:35Z","timestamp":1750232075000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2490428.2490449"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,17]]},"references-count":17,"alternative-id":["10.1145\/2490428.2490449","10.1145\/2490428"],"URL":"https:\/\/doi.org\/10.1145\/2490428.2490449","relation":{},"subject":[],"published":{"date-parts":[[2012,8,17]]},"assertion":[{"value":"2012-08-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}