{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T16:28:31Z","timestamp":1725812911974},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319133256"},{"type":"electronic","value":"9783319133263"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13326-3_33","type":"book-chapter","created":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T14:20:19Z","timestamp":1417443619000},"page":"351-359","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Researches Based on Subject-Oriented Security in the Cyber-Physical System"],"prefix":"10.1007","author":[{"given":"Caixia","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuanjia","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xiaoyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiangdong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,26]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"CPS Steering Group. Cyber-physical systems executive summary (July 2011). http:\/\/precise.seas.upenn.edu\/events\/iccps11\/doc\/CPS-Executive-Summary.pdf, Smith, T.F., Waterman, M.S.: Identification of Common Molecular Subsequences. J. Mol. Biol. 147, 195\u2013197 (1981)","DOI":"10.1016\/0022-2836(81)90087-5"},{"issue":"10","key":"33_CR2","first-page":"1157","volume":"37","author":"Z Wang","year":"2011","unstructured":"Wang, Z., Xie, L.: Cyber-physical Systems: A Survey. ACTA AUTOMATICA SINICA 37(10), 1157\u20131165 (2011)","journal-title":"ACTA AUTOMATICA SINICA"},{"issue":"1","key":"33_CR3","first-page":"25","volume":"6","author":"J He","year":"2010","unstructured":"He, J.: Cyber-physical Systems. Communications of China Computer Federation 6(1), 25\u201329 (2010)","journal-title":"Communications of China Computer Federation"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Tan, Y., Vuran, M.C., Goddard, S.: Spatio-Temporal Event Model for Cyber-Physical systems. In: Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Work shops, pp. 44\u201345 (2009)","DOI":"10.1109\/ICDCSW.2009.82"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, F.M., Szwaykowska, K., Wolf, W.: Task. scheduling for control oriented requirements for cyber-physical systems. In: IEEE Proceedings of the Real Time Systems Symposium, Barcelona, Spain, pp. 47\u201356 (2008)","DOI":"10.1109\/RTSS.2008.52"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Dillon, T., Potdar, V., Singh, J., Talevski, A.: Cyber-physical systems: Providing Quality of Service (QoS) in a hetero-generous systems-of-systems environment. In: Proceedings of 5th IEEE International Digital Ecosystems and Technologies Conference (DEST), Daejeon, USA, pp. 330\u2013335. IEEE (2011)","DOI":"10.1109\/DEST.2011.5936595"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Cardenas, A.A., Amin, S., Sastry, S.: Secure Control Towards Survivable Cyber-Physical Systems, In: The 28th International Conference on Distributed Computing Systems Workshops, pp. 495\u2013500 (2008)","DOI":"10.1109\/ICDCS.Workshops.2008.40"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Akella, R., Tang, H., McMillin, B.M.: Analysis of information flow security in cyber\u2013physical systems. International Journal of Critical Infrastructure Protection, 157\u2013173 (2010)","DOI":"10.1016\/j.ijcip.2010.09.001"},{"key":"33_CR9","unstructured":"Tang, H., Tan, F., Song, B., Li, N.: Cyber-Physical System Security Studies and Research, Multimedia Technology (ICMT), Beijing, 4883\u20134886 (2011)"},{"key":"33_CR10","unstructured":"Codella, C., Hampapur, A., et al.: Continuous Assurance for Cyber Physical System Security (2011). http:\/\/cimic.rutgers.edu\/positionPapers\/CPSSW09%20_IBM.pdf"},{"key":"33_CR11","unstructured":"Tan, Y., Goddard, P., Rezl, C.: A prototype architecture for cyber-physical systems. SIGBED Review, pp. 51\u201352 (2008)"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Kang, W., Son, S.H.: The design of an open data service architecture for cyber-physical systems. ACM SIGBED Review 5(1) (2008)","DOI":"10.1145\/1366283.1366286"},{"key":"33_CR13","unstructured":"Tan, P., Shu, J., Wu, Z.: An Architecture for Cyber-Physical Systems. Journal of Computer Research and Development, 47 (2010)"},{"key":"33_CR14","unstructured":"Wu, M., Ding, C., Yang, L.: Research on Security Architecture and Key Technologies in Cyber-Physical Systems. Journal of Nanjing University of Posts and Telecommunications (natural science) 30(4), 52\u201356 (2010)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Testbeds and Research Infrastructure: Development of Networks and Communities"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13326-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T16:43:56Z","timestamp":1676911436000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13326-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319133256","9783319133263"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13326-3_33","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"26 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}