{"id":"https://openalex.org/W4415256936","doi":"https://doi.org/10.1109/les.2025.3598202","title":"Formal Modeling and Verification of Generic Credential Management Processes for Industrial Cyber\u2013Physical Systems","display_name":"Formal Modeling and Verification of Generic Credential Management Processes for Industrial Cyber\u2013Physical Systems","publication_year":2025,"publication_date":"2025-10-01","ids":{"openalex":"https://openalex.org/W4415256936","doi":"https://doi.org/10.1109/les.2025.3598202"},"language":"en","primary_location":{"id":"doi:10.1109/les.2025.3598202","is_oa":false,"landing_page_url":"https://doi.org/10.1109/les.2025.3598202","pdf_url":null,"source":{"id":"https://openalex.org/S22443479","display_name":"IEEE Embedded Systems Letters","issn_l":"1943-0663","issn":["1943-0663","1943-0671"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Embedded Systems Letters","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092675573","display_name":"Julian G\u00f6ppert","orcid":"https://orcid.org/0000-0003-0679-3841"},"institutions":[{"id":"https://openalex.org/I913140155","display_name":"Offenburg University of Applied Sciences","ror":"https://ror.org/03zh5eq96","country_code":"DE","type":"education","lineage":["https://openalex.org/I913140155"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Julian G\u00f6ppert","raw_affiliation_strings":["Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Offenburg University, Offenburg, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Offenburg University, Offenburg, Germany","institution_ids":["https://openalex.org/I913140155"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019197766","display_name":"Axel Sikora","orcid":"https://orcid.org/0000-0003-0878-2919"},"institutions":[{"id":"https://openalex.org/I913140155","display_name":"Offenburg University of Applied Sciences","ror":"https://ror.org/03zh5eq96","country_code":"DE","type":"education","lineage":["https://openalex.org/I913140155"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Axel Sikora","raw_affiliation_strings":["Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Offenburg University, Offenburg, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Reliable Embedded Systems and Communication Electronics (ivESK), Offenburg University, Offenburg, Germany","institution_ids":["https://openalex.org/I913140155"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092675573"],"corresponding_institution_ids":["https://openalex.org/I913140155"],"apc_list":null,"apc_paid":null,"fwci":1.403,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.87263004,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"17","issue":"5","first_page":"349","last_page":"352"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11741","display_name":"Flexible and Reconfigurable Manufacturing Systems","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11741","display_name":"Flexible and Reconfigurable Manufacturing Systems","score":0.9865000247955322,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10703","display_name":"Business Process Modeling and Analysis","score":0.9855999946594238,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10763","display_name":"Digital Transformation in Industry","score":0.9660000205039978,"subfield":{"id":"https://openalex.org/subfields/2209","display_name":"Industrial and Manufacturing Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.8889999985694885},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5277000069618225},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.4900999963283539},{"id":"https://openalex.org/keywords/key-management","display_name":"Key management","score":0.4586000144481659},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43950000405311584},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.4323999881744385},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.4178999960422516},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.39430001378059387},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.384799987077713}],"concepts":[{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.8889999985694885},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8464999794960022},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6176000237464905},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5277000069618225},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.4900999963283539},{"id":"https://openalex.org/C17886624","wikidata":"https://www.wikidata.org/wiki/Q1320561","display_name":"Key management","level":3,"score":0.4586000144481659},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43950000405311584},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.4323999881744385},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.4178999960422516},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.39430001378059387},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.384799987077713},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3822000026702881},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.3686999976634979},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.34459999203681946},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.3271999955177307},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.319599986076355},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.31220000982284546},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3098999857902527},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.28999999165534973},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.2849999964237213},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2754000127315521},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.26809999346733093},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.26510000228881836},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.25850000977516174},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.25519999861717224}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/les.2025.3598202","is_oa":false,"landing_page_url":"https://doi.org/10.1109/les.2025.3598202","pdf_url":null,"source":{"id":"https://openalex.org/S22443479","display_name":"IEEE Embedded Systems Letters","issn_l":"1943-0663","issn":["1943-0663","1943-0671"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Embedded Systems Letters","raw_type":"journal-article"},{"id":"pmh:oai:opus.hs-offenburg.de:11563","is_oa":false,"landing_page_url":"https://opus.hs-offenburg.de/frontdoor/index/index/docId/11563","pdf_url":null,"source":{"id":"https://openalex.org/S4377196587","display_name":"Opus-HSO (Offenburg University of Applied Sciences)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I913140155","host_organization_name":"Offenburg University of Applied Sciences","host_organization_lineage":["https://openalex.org/I913140155"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"doc-type:article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W4281488947","https://openalex.org/W4302223379","https://openalex.org/W4394691948"],"related_works":[],"abstract_inverted_index":{"Industrial":[0],"cyber-physical":[1],"systems":[2],"(ICPS)":[3],"face":[4],"rising":[5],"cyberattacks,":[6],"requiring":[7],"secure":[8,109],"credential":[9,30,49,110],"management":[10,31,111],"also":[11],"in":[12,112],"resource-constrained":[13],"embedded":[14],"systems.":[15],"Standards":[16],"specifying":[17],"field":[18],"level":[19],"communication":[20],"of":[21,90],"ICPS":[22],"(e.g.,":[23],"PROFINET":[24],"or":[25],"OPC":[26],"UA)":[27],"define":[28],"protocol-specific":[29],"processes,":[32],"yet":[33],"lack":[34],"formal":[35,106],"security":[36,45],"verification.":[37],"We":[38],"propose":[39],"a":[40,63],"generic":[41],"model":[42,102],"capturing":[43],"initial":[44],"onboarding":[46],"and":[47,72,86],"automated":[48],"provisioning.":[50],"Using":[51],"ProVerif,":[52],"an":[53],"automatic":[54],"symbolic":[55],"protocol":[56],"verifier,":[57],"we":[58],"formalize":[59],"certificate-based":[60],"authentication":[61,74],"under":[62],"Dolev-Yao":[64],"adversary,":[65],"verifying":[66],"private":[67],"key":[68,84],"secrecy,":[69],"component":[70],"authentication,":[71],"mutual":[73],"with":[75],"the":[76,88,91,99,104],"operator":[77],"domain.":[78],"Robustness":[79],"checks":[80],"confirm":[81],"resilience":[82],"against":[83],"leakage":[85],"highlight":[87],"vulnerabilities":[89],"trust":[92],"on":[93],"first":[94,105],"use":[95],"concept":[96],"proposed":[97],"by":[98],"standards.":[100],"Our":[101],"offers":[103],"guarantees":[107],"for":[108],"ICPS.":[113]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-17T00:00:00"}
