{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:29:09Z","timestamp":1776443349255,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"European Commission","doi-asserted-by":"publisher","award":["101056765"],"award-info":[{"award-number":["101056765"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3669917","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Open V2X Management Platform Cyber-Resilience and Data Privacy Mechanisms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8243-7075","authenticated-orcid":false,"given":"Alexios","family":"Lekidis","sequence":"first","affiliation":[{"name":"University of Thessaly, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5906-4744","authenticated-orcid":false,"given":"Hugo","family":"Morais","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Cristina et. al","author":"Alcaraz","year":"2023","unstructured":"Alcaraz, Cristina et. al. 2023. OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0. International Journal of Information Security (2023), 1\u201327."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-017-0342-y"},{"key":"e_1_3_2_1_3_1","volume-title":"Mastering OpenLDAP: Configuring, Securing, and Integrating Directory Services","author":"Butcher Matt","unstructured":"Matt Butcher. 2007. Mastering OpenLDAP: Configuring, Securing, and Integrating Directory Services. Packt Publishing Ltd."},{"key":"e_1_3_2_1_4_1","volume-title":"Ayan et. al","author":"Chatterjee","year":"2022","unstructured":"Chatterjee, Ayan et. al. 2022. Applying spring security framework with keycloak-based oauth2 to protect microservice architecture apis: A case study. Sensors (2022)."},{"key":"e_1_3_2_1_5_1","volume-title":"IPSec: the new security standard for the Internet, intranets, and virtual private networks","author":"Doraswamy Naganand","unstructured":"Naganand Doraswamy and Dan Harkins. 2003. IPSec: the new security standard for the Internet, intranets, and virtual private networks. Prentice Hall Professional."},{"key":"e_1_3_2_1_6_1","volume-title":"2018 IEEE ICC Workshops. IEEE.","author":"Marwan","year":"2018","unstructured":"Ghalib, Marwan et. al. 2018. Implementation of a smart grid communication system compliant with IEEE 2030.5. In 2018 IEEE ICC Workshops. IEEE."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Dick Hardt. 2012. The OAuth 2.0 authorization framework. Technical Report.","DOI":"10.17487\/rfc6749"},{"key":"e_1_3_2_1_8_1","volume-title":"Ulrich et. al","author":"Herberg","year":"2014","unstructured":"Herberg, Ulrich et. al. 2014. OpenADR 2.0 deployment architectures: Options and implications. In 2014 IEEE SmartGridComm. IEEE, 782\u2013787."},{"key":"e_1_3_2_1_9_1","volume-title":"Naheel Faisal et. al","author":"Kamal","year":"2023","unstructured":"Kamal, Naheel Faisal et. al. 2023. Light-weight Communication Fault Tolerant OCPP-based EV Supply Equipment. In 2023 IEEE CPE-POWERENG. IEEE, 1\u20136."},{"key":"e_1_3_2_1_10_1","volume-title":"Roberto et. al","author":"Metere","year":"2021","unstructured":"Metere, Roberto et. al. 2021. Securing the electric vehicle charging infrastructure. arXiv preprint arXiv:2105.02905 (2021)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2022.12.339"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enpol.2012.05.042"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.23919\/EETA.2018.8493213"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 1999. Diffie-hellman key agreement method. Technical Report.","DOI":"10.17487\/rfc2631"},{"key":"e_1_3_2_1_15_1","volume-title":"Karen et. al","author":"Scarfone","year":"2007","unstructured":"Scarfone, Karen et. al. 2007. Guide to intrusion detection and prevention systems (idps). NIST special publication 800 (2007), 94."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/wevj6040863"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"J Sermersheim. 2006. Rfc 4511: Lightweight directory access protocol (ldap): The protocol.","DOI":"10.17487\/rfc4511"},{"key":"e_1_3_2_1_18_1","volume-title":"Neel et. al","author":"Shah","year":"2022","unstructured":"Shah, Neel et. al. 2022. A framework for social media data analytics using Elasticsearch and Kibana. Wireless networks (2022), 1\u20139."},{"key":"e_1_3_2_1_19_1","volume-title":"Cyber Security of Electric Vehicle Charging Infrastructure: Open Issues and Recommendations. In 2022 IEEE Big Data","author":"Skarga-Bandurova","unstructured":"Skarga-Bandurova et. al. 2022. Cyber Security of Electric Vehicle Charging Infrastructure: Open Issues and Recommendations. In 2022 IEEE Big Data. IEEE."},{"key":"e_1_3_2_1_20_1","volume-title":"VPNs Illustrated: Tunnels, VPNs, and IPsec: Tunnels, VPNs, and IPsec","author":"Snader C","unstructured":"Jon\u00a0C Snader. 2015. VPNs Illustrated: Tunnels, VPNs, and IPsec: Tunnels, VPNs, and IPsec. Addison-Wesley Professional."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Darlene\u00a0M Steward. 2017. Critical elements of vehicle-to-grid (v2g) economics. Technical Report. National Renewable Energy Lab.(NREL) Golden CO.","DOI":"10.2172\/1390043"},{"key":"e_1_3_2_1_22_1","volume-title":"Jos\u00e9 Mar\u00eda Jorquera et. al","author":"Valero","year":"2022","unstructured":"Valero, Jos\u00e9 Mar\u00eda Jorquera et. al. 2022. Trusted Execution Environment-enabled platform for 5G security and privacy enhancement. Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (2022)."},{"key":"e_1_3_2_1_23_1","unstructured":"Peter Van Den\u00a0Bossche. 2010. IEC 61851-1: Electric vehicle conductive charging system-Part 1: General requirements. In 2. Iec 1\u201399."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/en13010039"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3669917","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3669917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:51:37Z","timestamp":1755881497000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3669917"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":24,"alternative-id":["10.1145\/3664476.3669917","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3669917","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}