{"id":"https://openalex.org/W3197360798","doi":"https://doi.org/10.1109/csr51186.2021.9527905","title":"Enabling Efficient Common Criteria Security Evaluation for Connected Vehicles","display_name":"Enabling Efficient Common Criteria Security Evaluation for Connected Vehicles","publication_year":2021,"publication_date":"2021-07-26","ids":{"openalex":"https://openalex.org/W3197360798","doi":"https://doi.org/10.1109/csr51186.2021.9527905","mag":"3197360798"},"language":"en","primary_location":{"id":"doi:10.1109/csr51186.2021.9527905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr51186.2021.9527905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033658777","display_name":"Angelos Stamou","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144519","display_name":"Institute of Communication and Computer Systems","ror":"https://ror.org/0483fn738","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210144519"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Angelos Stamou","raw_affiliation_strings":["Institute of Communication and Computer Systems (ICCS),Athens,Greece,GR-15773"],"affiliations":[{"raw_affiliation_string":"Institute of Communication and Computer Systems (ICCS),Athens,Greece,GR-15773","institution_ids":["https://openalex.org/I4210144519"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086400648","display_name":"Panagiotis Pantazopoulos","orcid":"https://orcid.org/0000-0003-1041-7750"},"institutions":[{"id":"https://openalex.org/I4210144519","display_name":"Institute of Communication and Computer Systems","ror":"https://ror.org/0483fn738","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210144519"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Panagiotis Pantazopoulos","raw_affiliation_strings":["Institute of Communication and Computer Systems (ICCS),Athens,Greece,GR-15773"],"affiliations":[{"raw_affiliation_string":"Institute of Communication and Computer Systems (ICCS),Athens,Greece,GR-15773","institution_ids":["https://openalex.org/I4210144519"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018791759","display_name":"Sammy Haddad","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sammy Haddad","raw_affiliation_strings":["Oppida,Montigny-le-Bretonneux,France,78180"],"affiliations":[{"raw_affiliation_string":"Oppida,Montigny-le-Bretonneux,France,78180","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088400616","display_name":"Angelos Amditis","orcid":"https://orcid.org/0000-0002-4089-1990"},"institutions":[{"id":"https://openalex.org/I4210144519","display_name":"Institute of Communication and Computer Systems","ror":"https://ror.org/0483fn738","country_code":"GR","type":"nonprofit","lineage":["https://openalex.org/I4210144519"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Angelos Amditis","raw_affiliation_strings":["Institute of Communication and Computer Systems (ICCS),Athens,Greece,GR-15773"],"affiliations":[{"raw_affiliation_string":"Institute of Communication and Computer Systems (ICCS),Athens,Greece,GR-15773","institution_ids":["https://openalex.org/I4210144519"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033658777"],"corresponding_institution_ids":["https://openalex.org/I4210144519"],"apc_list":null,"apc_paid":null,"fwci":0.3008,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.56312663,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"234","last_page":"240"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9772999882698059,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7388694882392883},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.7018623352050781},{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.6487378478050232},{"id":"https://openalex.org/keywords/automotive-industry","display_name":"Automotive industry","score":0.5263468027114868},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5045353174209595},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.49118682742118835},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46174460649490356},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4263465404510498},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3549925684928894},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2682076096534729},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.2211792767047882},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14066919684410095},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09737765789031982}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7388694882392883},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.7018623352050781},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.6487378478050232},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.5263468027114868},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5045353174209595},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.49118682742118835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46174460649490356},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4263465404510498},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3549925684928894},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2682076096534729},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.2211792767047882},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14066919684410095},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09737765789031982},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr51186.2021.9527905","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr51186.2021.9527905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1445294979","https://openalex.org/W1498130200","https://openalex.org/W1522865796","https://openalex.org/W2048294994","https://openalex.org/W2055028557","https://openalex.org/W2096555306","https://openalex.org/W2597561986","https://openalex.org/W2889294745","https://openalex.org/W2994988108","https://openalex.org/W3040410331","https://openalex.org/W4239666550","https://openalex.org/W6629954789","https://openalex.org/W6631212395"],"related_works":["https://openalex.org/W3922552","https://openalex.org/W13749934","https://openalex.org/W4532951","https://openalex.org/W7831465","https://openalex.org/W10994480","https://openalex.org/W9362771","https://openalex.org/W647008","https://openalex.org/W5444950","https://openalex.org/W12374141","https://openalex.org/W7984350"],"abstract_inverted_index":{"Cyber-security":[0],"assurance":[1,51,129],"evaluation":[2,21,42,60,164],"seeks":[3],"to":[4,44,161],"gain":[5],"evidence":[6],"that":[7,18,110,136],"the":[8,24,34,48,53,59,62,79,98,119,134,137,147,150,163,175,194],"relevant":[9,88,126],"requirements":[10],"of":[11,23,55,70,118,125,149,165,196],"an":[12,171,201],"IT":[13],"system":[14],"are":[15,27,94,131,168],"met.":[16],"Towards":[17],"end,":[19],"carefully-designed":[20],"processes":[22],"considered":[25],"systems":[26],"needed.":[28],"The":[29,184],"only":[30],"so-far":[31],"validated":[32],"approach,":[33],"Common":[35],"Criteria":[36],"(CC)":[37],"standard,":[38],"relies":[39],"on":[40,116],"exhaustive":[41],"tasks":[43],"provide":[45],"(up":[46],"to)":[47],"highest":[49],"possible":[50],"at":[52],"expense":[54],"increased":[56],"costs.":[57],"When":[58],"involves":[61],"connected":[63,207],"vehicles":[64],"paradigm":[65],"which":[66,103],"integrates":[67],"a":[68,105],"mosaic":[69],"third-party":[71],"modules":[72],"and":[73,83,133,140],"interfaces,":[74],"applying":[75],"CC":[76,181],"becomes":[77],"problematic;":[78],"cost":[80],"in":[81],"resources":[82],"time":[84],"further":[85],"increases":[86],"while":[87],"automated":[89],"tools":[90],"or":[91],"document":[92],"templates,":[93],"scarce.This":[95],"paper":[96],"introduces":[97],"AFT":[99,138,177],"(Assurance":[100],"Framework":[101],"Toolkit)":[102],"is":[104,144],"platform-independent":[106],"online":[107],"software":[108],"toolkit":[109,151,186],"enables":[111],"efficient":[112],"CC-based":[113],"cyber-security":[114],"evaluations":[115,199],"products":[117],"automotive":[120,166],"cyber-physical":[121],"ecosystem.":[122],"A":[123],"set":[124],"CC-specific":[127],"security":[128,198],"needs":[130],"explained":[132],"way":[135],"software-design":[139],"functionality":[141],"covers":[142],"them,":[143],"presented.":[145],"Subsequently,":[146],"development":[148],"(with":[152],"publicly":[153],"available":[154],"source-code)":[155],"as":[156,158],"well":[157],"its":[159,189],"capability":[160],"meet":[162],"needs,":[167],"detailed.":[169],"Finally,":[170],"empirical":[172],"study":[173],"estimates":[174],"expected":[176],"gains":[178],"against":[179],"typical":[180],"unassisted":[182],"evaluations.":[183],"proposed":[185],"(along":[187],"with":[188],"extendibility":[190],"feature)":[191],"practically":[192],"tackles":[193],"cost-limitations":[195],"standardized":[197],"filling":[200],"important":[202],"technology":[203],"gap":[204],"towards":[205],"safer":[206],"driving.":[208]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
