{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T21:51:50Z","timestamp":1769982710977,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3670938","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An IEC 62443-security oriented domain specific modelling language"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-3770-0107","authenticated-orcid":false,"given":"Jolahn","family":"Vaudey","sequence":"first","affiliation":[{"name":"Inria, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3074-2430","authenticated-orcid":false,"given":"St\u00e9phane","family":"Mocanu","sequence":"additional","affiliation":[{"name":"Grenoble INP, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3029-7384","authenticated-orcid":false,"given":"Gwena\u00ebl","family":"Delaval","sequence":"additional","affiliation":[{"name":"Universit\u00e9 Grenoble alpes, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8696-8212","authenticated-orcid":false,"given":"Eric","family":"Rutten","sequence":"additional","affiliation":[{"name":"Inria, France"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Antoine Amirault. 2021. Cisco Blog IEC 62443 Post. https:\/\/blogs.cisco.com\/security\/securing-industrial-networks-what-is-isa-iec-62443. Accessed: 2024-04-11."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04209-7_4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605068"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3033150"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8868978"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869542.1869625"},{"key":"e_1_3_2_1_7_1","volume-title":"Systems, Software and Services Process Improvement, Alastair Walker, Rory\u00a0V. O\u2019Connor","author":"Fockel Markus","unstructured":"Markus Fockel, Sven Merschjohann, Masud Fazal-Baqaie, Torsten F\u00f6rder, Stefan Hausmann, and Boris Waldeck. 2019. Designing and Integrating IEC 62443 Compliant Threat Analysis. In Systems, Software and Services Process Improvement, Alastair Walker, Rory\u00a0V. O\u2019Connor, and Richard Messnarz (Eds.). Springer International Publishing, Cham, 57\u201369."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA54631.2023.10275637"},{"key":"e_1_3_2_1_9_1","unstructured":"International Electrotechnical\u00a0Commission IEC. 2009. IEC 62443 Part 1-1: Terminology concepts and models. Technical Report. International electronical commission. https:\/\/webstore.iec.ch\/preview\/info_iec62443-1-1%7Bed1.0%7Den.pdf"},{"key":"e_1_3_2_1_10_1","unstructured":"International Electrotechnical\u00a0Commission IEC. 2013. IEC 62443 Part 3-3: System security requirements and security levels. Technical Report. International electronical commission. https:\/\/webstore.iec.ch\/preview\/info_iec62443-3-3%7Bed1.0%7Db.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"International Electrotechnical\u00a0Commission IEC. 2019. IEC 62443 Part 4-2: Technical security requirements for IACS components. Technical Report. International electronical commission. https:\/\/webstore.iec.ch\/preview\/info_iec62443-4-2%7Bed1.0%7Db.pdf"},{"key":"e_1_3_2_1_12_1","unstructured":"International Electrotechnical\u00a0Commission IEC. 2020. IEC 62443 Part 3-2: Security risk assessment for system design. Technical Report. International electronical commission. https:\/\/webstore.iec.ch\/preview\/info_iec62443-1-1%7Bed1.0%7Den.pdf"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"Tomas Kulik Peter W.\u00a0V. Tran-J\u00f8rgensen and Jalil Boudjadar. 2019. Compliance verification of a cyber security standard for Cloud-connected SCADA. In 2019 Global IoT Summit (GIoTS). 1\u20136. https:\/\/doi.org\/10.1109\/GIOTS.2019.8766363","DOI":"10.1109\/GIOTS.2019.8766363"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2512235"},{"key":"e_1_3_2_1_15_1","volume-title":"When and how to develop domain-specific languages. ACM computing surveys (CSUR) 37, 4","author":"Mernik Marjan","year":"2005","unstructured":"Marjan Mernik, Jan Heering, and Anthony\u00a0M Sloane. 2005. When and how to develop domain-specific languages. ACM computing surveys (CSUR) 37, 4 (2005), 316\u2013344."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2020.2977815"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.58"},{"key":"e_1_3_2_1_18_1","volume-title":"Merks, and Marcelo Paternostro","author":"Steinberg Dave","year":"2008","unstructured":"Dave Steinberg, Frank Budinsky, Ed Merks, and Marcelo Paternostro. 2008. EMF: eclipse modeling framework. Pearson Education."},{"key":"e_1_3_2_1_19_1","unstructured":"Jolahn Vaudey. 2024. DSL for modeling IEC 62443 compliant ICS instances in a zone\/conduit model.https:\/\/hal.science\/hal-04573409"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","location":"Vienna Austria","acronym":"ARES 2024"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670938","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3670938","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:48:55Z","timestamp":1755881335000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3670938"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":19,"alternative-id":["10.1145\/3664476.3670938","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3670938","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}