{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:34:04Z","timestamp":1756384444493,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,14]],"date-time":"2018-12-14T00:00:00Z","timestamp":1544745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,14]]},"DOI":"10.1145\/3301326.3301330","type":"proceedings-article","created":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T17:16:26Z","timestamp":1552583786000},"page":"157-164","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Proposal and Application of Security\/Safety Evaluation Method for Medical Device System that Includes IoT"],"prefix":"10.1145","author":[{"given":"Takuo","family":"Hayakawa","sequence":"first","affiliation":[{"name":"Tokyo Denki University, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ryoichi","family":"Sasaki","sequence":"additional","affiliation":[{"name":"Tokyo Denki University, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hiroshi","family":"Hayashi","sequence":"additional","affiliation":[{"name":"Tokyo Denki University, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuji","family":"Takahashi","sequence":"additional","affiliation":[{"name":"Tokyo Denki University, Tokyo, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tomoko","family":"Kaneko","sequence":"additional","affiliation":[{"name":"Institute of Information Security, Kanagawa, Yokohama, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takao","family":"Okubo","sequence":"additional","affiliation":[{"name":"Institute of Information Security, Kanagawa, Yokohama, Japan"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,12,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NIST. 2016. CVE-2016-5084 Detail. Retrieved August 1 2018 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-5084  NIST. 2016. CVE-2016-5084 Detail. Retrieved August 1 2018 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-5084"},{"key":"e_1_3_2_1_2_1","volume-title":"Yasuhiro Kawashima and Hiroshi Yoshiura","author":"Sasaki Ryoichi","year":"2008","unstructured":"Ryoichi Sasaki , Yuu Hidaka , Takashi Moriya , Katsuhiro Taniyama , Hiroshi Yajima , Kiyomi Yaegashi , Yasuhiro Kawashima and Hiroshi Yoshiura . 2008 . Development and Applications of Multiple Risk Communicator. IPSJ 49, 9(Sep. 2018), 3180--3190. URL =http:\/\/id.nii.ac.jp\/1001\/00009450\/ Ryoichi Sasaki, Yuu Hidaka, Takashi Moriya, Katsuhiro Taniyama, Hiroshi Yajima, Kiyomi Yaegashi, Yasuhiro Kawashima and Hiroshi Yoshiura. 2008. Development and Applications of Multiple Risk Communicator. IPSJ 49, 9(Sep. 2018), 3180--3190. URL=http:\/\/id.nii.ac.jp\/1001\/00009450\/"},{"volume-title":"Engineering a Safer World: Systems Thinking Applied to Safety","author":"Leveson Nancy G","key":"e_1_3_2_1_3_1","unstructured":"Nancy G Leveson . 2012. Engineering a Safer World: Systems Thinking Applied to Safety . MIT Press Nancy G Leveson. 2012. Engineering a Safer World: Systems Thinking Applied to Safety. MIT Press"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2530277"},{"key":"e_1_3_2_1_5_1","volume-title":"DPS 2018-DPS-174","author":"Tomoko Kaneko","year":"2018","unstructured":"Kaneko Tomoko , Takuo Hayakawa , Takahashi Yuji , Takao Okubo and Ryoichi Sasaki . 2018 . Proposing enhancement of a threat analysis from the security perspective for STAMP\/STPA as a safety analysis . DPS 2018-DPS-174 , 6(Feb. 2018), 1--8. URL= http:\/\/id.nii.ac.jp\/1001\/00186222\/ Kaneko Tomoko, Takuo Hayakawa, Takahashi Yuji, Takao Okubo and Ryoichi Sasaki. 2018. Proposing enhancement of a threat analysis from the security perspective for STAMP\/STPA as a safety analysis. DPS 2018-DPS-174, 6(Feb. 2018), 1--8. URL= http:\/\/id.nii.ac.jp\/1001\/00186222\/"},{"key":"e_1_3_2_1_6_1","volume-title":"D Laverty and S Sezer","author":"Friedberg I","year":"2017","unstructured":"I Friedberg , K McLaughlin , P Smith , D Laverty and S Sezer . 2017 . STPA-SafeSec: Safety and security analysis for cyber-physical systems, Journal of Information Security and Applications 34(Jun. 2017), 183--196. I Friedberg, K McLaughlin, P Smith, D Laverty and S Sezer. 2017. STPA-SafeSec: Safety and security analysis for cyber-physical systems, Journal of Information Security and Applications 34(Jun. 2017), 183--196."},{"key":"e_1_3_2_1_7_1","unstructured":"Bruce Schneier.1999. ATTACK TREES. Retrieved August 1 2018 from http:\/\/tnlandforms.us\/cs594-cns96\/attacktrees.pdf  Bruce Schneier.1999. ATTACK TREES. Retrieved August 1 2018 from http:\/\/tnlandforms.us\/cs594-cns96\/attacktrees.pdf"},{"key":"e_1_3_2_1_8_1","volume-title":"M Masra and A Cian","author":"Fovino I N","year":"2009","unstructured":"I N Fovino , M Masra and A Cian . 2009 . Integrating cyber attacks within fault trees. Reliability Engineering and System Safety 94(Sep. 2009), 1394--1402. I N Fovino, M Masra and A Cian. 2009. Integrating cyber attacks within fault trees. Reliability Engineering and System Safety 94(Sep. 2009), 1394--1402."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11875567_2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.46"},{"key":"e_1_3_2_1_11_1","volume-title":"Ryohei Ishii and Ryoichi Sasaki","author":"Aihara Ryo","year":"2018","unstructured":"Ryo Aihara , Ryohei Ishii and Ryoichi Sasaki . 2018 . Proposal and Application of Event Tree and Defense Tree Combined Method for Risk Analysis against Targeted Attacks. IPSJ 59, 3(Mar. 2018), 1082--1094. URL =http:\/\/id.nii.ac.jp\/1001\/00186756\/ Ryo Aihara, Ryohei Ishii and Ryoichi Sasaki. 2018. Proposal and Application of Event Tree and Defense Tree Combined Method for Risk Analysis against Targeted Attacks. IPSJ 59, 3(Mar. 2018), 1082--1094. URL=http:\/\/id.nii.ac.jp\/1001\/00186756\/"},{"volume-title":"The STRIDE Threat Model. Retrieved","year":"2018","key":"e_1_3_2_1_12_1","unstructured":"Microsoft. 2009. The STRIDE Threat Model. Retrieved August 1, 2018 from https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20) Microsoft. 2009. The STRIDE Threat Model. Retrieved August 1, 2018 from https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)"},{"key":"e_1_3_2_1_13_1","unstructured":"IPA. 2018. STAMP Workbench. Retrieved August 1 from https:\/\/www.ipa.go.jp\/sec\/tools\/stamp_workbench.html  IPA. 2018. STAMP Workbench. Retrieved August 1 from https:\/\/www.ipa.go.jp\/sec\/tools\/stamp_workbench.html"}],"event":{"name":"ICNCC 2018: 2018 VII International Conference on Network, Communication and Computing","acronym":"ICNCC 2018","location":"Taipei City Taiwan"},"container-title":["Proceedings of the 2018 VII International Conference on Network, Communication and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301326.3301330","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3301326.3301330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:05Z","timestamp":1750208525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3301326.3301330"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,14]]},"references-count":13,"alternative-id":["10.1145\/3301326.3301330","10.1145\/3301326"],"URL":"https:\/\/doi.org\/10.1145\/3301326.3301330","relation":{},"subject":[],"published":{"date-parts":[[2018,12,14]]},"assertion":[{"value":"2018-12-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}