{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:20:09Z","timestamp":1730211609429,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T00:00:00Z","timestamp":1658880000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,27]]},"DOI":"10.1109\/csr54599.2022.9850323","type":"proceedings-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T19:35:46Z","timestamp":1660678546000},"page":"382-387","source":"Crossref","is-referenced-by-count":2,"title":["A Supply Chain Service Cybersecurity Certification Scheme based on the Cybersecurity Act"],"prefix":"10.1109","author":[{"given":"Alexandra","family":"Michota","sequence":"first","affiliation":[{"name":"FOCAL POINT SPRL,Waterloo,Belgium"}]},{"given":"Nineta","family":"Polemi","sequence":"additional","affiliation":[{"name":"University of Piraeus,Department of Informatics,Piraeus,Greece"}]}],"member":"263","reference":[{"year":"2021","key":"ref10","article-title":"D2.2 - A Cybersecurity Certification proposed Scheme for Supply Chain Services (EUSCS)"},{"year":"2020","key":"ref11","article-title":"Cybersecurity Certification EUCC, a candidate cybersecurity certification scheme to serve as a successor to the existing SOG-IS"},{"year":"2021","key":"ref12","article-title":"D2.1 - Supply Chain Analysis and Requirements"},{"year":"0","key":"ref13","article-title":"EUCS – Cloud Service Scheme: a candidate cybersecurity certification scheme for cloud services"},{"year":"2021","key":"ref14","article-title":"D3.1 - Conformity Evaluation Process & Multi Level Evidence Driven Supply Chain Risk Assessment"},{"year":"0","key":"ref15","article-title":"NIST Special Publication 800 - 53, Security and Privacy Controls for Information Systems and Organizations"},{"year":"0","key":"ref16","article-title":"Information technology-Security techniques-Evaluation criteria for IT security"},{"year":"0","key":"ref17","article-title":"Methodology for a Sectoral Cybersecurity Assessment"},{"year":"0","key":"ref18","article-title":"ISO\/IEC 27000-series on Information Security"},{"year":"0","key":"ref19","article-title":"Information technology-Security techniques- Methodology for IT security evaluation"},{"year":"0","key":"ref4","article-title":"Threat Landscape for Supply Chain Attacks"},{"year":"2020","key":"ref3","article-title":"An official website of the European Union"},{"year":"0","key":"ref6","article-title":"BSI Supply Chain Risk Insights Report 2021"},{"year":"0","key":"ref5","article-title":"Internet Organised Crime Threat Assessment (IOCTA) 2021"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC53001.2021.9631467"},{"year":"0","key":"ref7","article-title":"Blocks and Files, Kaseya VSA vulnerability opens a thousand-plus business doors to ransomware"},{"year":"2019","key":"ref2","article-title":"European Parliament and Council, Regulation (EU)2019\/881 on ENISA and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526\/2013 (Cybersecurity Act)"},{"year":"0","key":"ref1","article-title":"CYRENE EU H2020 project"},{"key":"ref9","article-title":"A Proposed Cybersecurity Certification Scheme for Supply Chain Services","author":"polemi","year":"0","journal-title":"5th NMIOTC (NATO Maritime Interdiction Operational Training Centre) Conference on Cyber Security in Maritime Domain"},{"year":"2007","key":"ref20","article-title":"Specification for security management systems for the supply chain"},{"year":"0","key":"ref22","article-title":"Conformity assessment — Requirements for bodies certifying products, processes and services"},{"year":"0","key":"ref21","article-title":"Conformity Assessment Considerations for Federal Agencies"},{"key":"ref24","first-page":"217","article-title":"International Standard on Assurance Engagements (ISAE) 3402 Assurance reports on controls at a service organization","volume":"2","year":"0"},{"year":"0","key":"ref23","article-title":"Conformity assessment — Requirements for bodies providing audit and certification of management systems — Part 1: Requirements"}],"event":{"name":"2022 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2022,7,27]]},"location":"Rhodes, Greece","end":{"date-parts":[[2022,7,29]]}},"container-title":["2022 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9850275\/9850277\/09850323.pdf?arnumber=9850323","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T20:23:24Z","timestamp":1662409404000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9850323\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,27]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/csr54599.2022.9850323","relation":{},"subject":[],"published":{"date-parts":[[2022,7,27]]}}}