{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:36Z","timestamp":1742913636434,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819902712"},{"type":"electronic","value":"9789819902729"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-0272-9_13","type":"book-chapter","created":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T14:16:09Z","timestamp":1676470569000},"page":"193-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Prototyping the\u00a0IDS Security Components in\u00a0the\u00a0Context of\u00a0Industry 4.0 - A Textile and\u00a0Clothing Industry Case Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7598-3687","authenticated-orcid":false,"given":"Nuno","family":"Torres","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7960-6459","authenticated-orcid":false,"given":"Ana","family":"Chaves","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6056-6917","authenticated-orcid":false,"given":"C\u00e9sar","family":"Toscano","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1856-6101","authenticated-orcid":false,"given":"Pedro","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,16]]},"reference":[{"key":"13_CR1","unstructured":"STVgoDigital. http:\/\/www.stvgodigital.pt\/. Accessed 30 Jan 2021"},{"key":"13_CR2","doi-asserted-by":"publisher","unstructured":"Shaabany, G., Anderl, R.: Security by design as an approach to design a secure industry 4.0-capable machine enabling online-trading of technology data. In: 2018 International Conference on System Science and Engineering (ICSSE), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/ICSSE.2018.8520195","DOI":"10.1109\/ICSSE.2018.8520195"},{"key":"13_CR3","unstructured":"The Internet of Things and Services Graphics Bosch Rexroth AG. https:\/\/ec.europa.eu\/futurium\/en\/system\/files\/ged\/a2-schweichhart-reference_architectural_model_industrie_4.0_rami_4.0.pdf. Accessed 29 Jan 2021"},{"key":"13_CR4","doi-asserted-by":"publisher","unstructured":"Elkhawas, A.I., Azer, M.A.: Security perspective in RAMI 4.0. In: 2018 13th International Conference on Computer Engineering and Systems (ICCES), pp. 151\u2013156 (2018). https:\/\/doi.org\/10.1109\/ICCES.2018.8639235","DOI":"10.1109\/ICCES.2018.8639235"},{"key":"13_CR5","doi-asserted-by":"publisher","unstructured":"Flatt, H., et al.: Analysis of the cyber-security of industry 4.0 technologies based on RAMI 4.0 and identification of requirements. In: 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), pp. 1\u20134 (2016). https:\/\/doi.org\/10.1109\/ETFA.2016.7733634","DOI":"10.1109\/ETFA.2016.7733634"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"Maksuti, S., et al.: Towards flexible and secure end-to-end communication in industry 4.0. In: 2017 IEEE 15th International Conference on Industrial Informatics (INDIN), pp. 883\u2013888 (2017). https:\/\/doi.org\/10.1109\/INDIN.2017.8104888","DOI":"10.1109\/INDIN.2017.8104888"},{"key":"13_CR7","unstructured":"GAIA-X: Technical Architecture. https:\/\/www.data-infrastructure.eu\/GAIAX\/Redaktion\/EN\/Publications\/gaia-x-technical-architecture.pdf?__blob=publicationFile &v=5. Accessed 03 Mar 2021"},{"key":"13_CR8","unstructured":"International Data Spaces (IDS) makes it safe and easy to exchange data \u2013 TNO. https:\/\/www.tno.nl\/en\/focus-areas\/information-communication-technology\/roadmaps\/data-sharing\/international-data-spaces-ids\/. Accessed 29 Jan 2021"},{"key":"13_CR9","unstructured":"Industrial Data Space - the secure data exchange model for industrial IoT. https:\/\/www.i-scoop.eu\/industry-4-0\/industrial-data-space\/. Accessed 29 Jan 2021"},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Nast, M., et al.: Work-in-progress: towards an international data spaces connector for the Internet of Things. In: 2020 16th IEEE International Conference on Factory Communication Systems (WFCS), pp. 1\u20134 (2020). https:\/\/doi.org\/10.1109\/WFCS47810.2020.9114503","DOI":"10.1109\/WFCS47810.2020.9114503"},{"key":"13_CR11","doi-asserted-by":"publisher","unstructured":"Qarawlus, H., et al.: Sovereign data exchange in cloud-connected IoT using international data spaces. In: 2021 IEEE Cloud Summit (Cloud Summit), pp. 13\u201318 (2021). https:\/\/doi.org\/10.1109\/IEEECloudSummit52029.2021.00010","DOI":"10.1109\/IEEECloudSummit52029.2021.00010"},{"key":"13_CR12","doi-asserted-by":"publisher","unstructured":"Nast, M., et al.: Work-in-progress: towards an international data spaces connector for the Internet of Things. In: 2020 16th IEEE International Conference on Factory Communication Systems (WFCS), pp. 1\u20134 (2020b). https:\/\/doi.org\/10.1109\/WFCS47810.2020.9114503","DOI":"10.1109\/WFCS47810.2020.9114503"},{"key":"13_CR13","doi-asserted-by":"publisher","unstructured":"Igo, M.A., et al.: Towards standardized manufacturing as a service through asset administration shell and international data spaces connectors. In: IECON 2022\u201348th Annual Conference of the IEEE Industrial Electronics Society, pp. 1\u20136 (2022). https:\/\/doi.org\/10.1109\/IECON49645.2022.9968592","DOI":"10.1109\/IECON49645.2022.9968592"},{"key":"13_CR14","doi-asserted-by":"publisher","unstructured":"Volz, F., Stojanovic, L., Lamberti, R.: An industrial marketplace - the smart factory web approach and integration of the international data space. In: 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), vol. 1, pp. 714\u2013720 (2019). https:\/\/doi.org\/10.1109\/INDIN41052.2019.8972061","DOI":"10.1109\/INDIN41052.2019.8972061"},{"key":"13_CR15","doi-asserted-by":"publisher","unstructured":"Firdausy, D.R., et al.: Towards a reference enterprise architecture to enforce digital sovereignty in international data spaces. In: 2022 IEEE 24th Conference on Business Informatics (CBI), vol. 01, pp. 117\u2013125 (2022). https:\/\/doi.org\/10.1109\/CBI54897.2022.00020","DOI":"10.1109\/CBI54897.2022.00020"},{"key":"13_CR16","unstructured":"Reference Architecture Model. https:\/\/www.internationaldataspaces.org\/wp-content\/uploads\/2019\/03\/IDS-Reference-Architecture-Model-3.0.pdf. Accessed 30 Jan 2021"},{"key":"13_CR17","unstructured":"Usage Control in the International Data Spaces (Position Paper), b. https:\/\/internationaldataspaces.org\/\/wp-content\/uploads\/dlm_uploads\/IDSA-Position-Paper-Usage-Control-in-the-IDS-V3..pdf. Accessed 18 Aug 2022"},{"key":"13_CR18","unstructured":"Home - dataspace connector. https:\/\/international-data-spaces-association.github.io\/DataspaceConnector\/. Accessed 02 Dec 2021"},{"key":"13_CR19","unstructured":"Fraunhofer-aisec\/omejdn-server. https:\/\/github.com\/Fraunhofer-AISEC\/omejdn-server. Accessed 10 Dec 2021"}],"container-title":["Communications in Computer and Information Science","Ubiquitous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-0272-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T17:03:57Z","timestamp":1686675837000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-0272-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819902712","9789819902729"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-0272-9_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"16 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UbiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhangjiajie","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ubisec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ubisecurity.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}