[{"publication_status":"published","publication_identifier":{"isbn":["979-8-3503-3992-5"],"eisbn":["979-8-3503-3991-8 "]},"title":"Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments","department":[{"_id":"DEP5023"}],"doi":"10.1109/etfa54631.2023.10275455","publication":"2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)","conference":{"end_date":"2023-09-15","start_date":"2023-09-12","location":" Sinaia, Romania ","name":"28th International Conference on Emerging Technologies and Factory Automation (ETFA)"},"citation":{"ufg":"<b>Ehrlich, Marco u. a.</b>: Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments, Piscataway, NJ 2023.","havard":"M. Ehrlich, A. Bröring, H. Trsek, J. Jasperneite, C. Diedrich, Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments, IEEE, Piscataway, NJ, 2023.","apa":"Ehrlich, M., Bröring, A., Trsek, H., Jasperneite, J., &#38; Diedrich, C. (2023). Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments. In <i>2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)</i>. 28th International Conference on Emerging Technologies and Factory Automation (ETFA),  Sinaia, Romania . IEEE. <a href=\"https://doi.org/10.1109/etfa54631.2023.10275455\">https://doi.org/10.1109/etfa54631.2023.10275455</a>","din1505-2-1":"<span style=\"font-variant:small-caps;\">Ehrlich, Marco</span> ; <span style=\"font-variant:small-caps;\">Bröring, Andre</span> ; <span style=\"font-variant:small-caps;\">Trsek, Henning</span> ; <span style=\"font-variant:small-caps;\">Jasperneite, Jürgen</span> ; <span style=\"font-variant:small-caps;\">Diedrich, Christian</span>: <i>Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments</i>. Piscataway, NJ : IEEE, 2023","short":"M. Ehrlich, A. Bröring, H. Trsek, J. Jasperneite, C. Diedrich, Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments, IEEE, Piscataway, NJ, 2023.","chicago":"Ehrlich, Marco, Andre Bröring, Henning Trsek, Jürgen Jasperneite, and Christian Diedrich. <i>Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments</i>. <i>2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)</i>. Piscataway, NJ: IEEE, 2023. <a href=\"https://doi.org/10.1109/etfa54631.2023.10275455\">https://doi.org/10.1109/etfa54631.2023.10275455</a>.","ama":"Ehrlich M, Bröring A, Trsek H, Jasperneite J, Diedrich C. <i>Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments</i>. IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/etfa54631.2023.10275455\">10.1109/etfa54631.2023.10275455</a>","mla":"Ehrlich, Marco, et al. “Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments.” <i>2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)</i>, IEEE, 2023, <a href=\"https://doi.org/10.1109/etfa54631.2023.10275455\">https://doi.org/10.1109/etfa54631.2023.10275455</a>.","van":"Ehrlich M, Bröring A, Trsek H, Jasperneite J, Diedrich C. Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments. 2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA). Piscataway, NJ: IEEE; 2023.","ieee":"M. Ehrlich, A. Bröring, H. Trsek, J. Jasperneite, and C. Diedrich, <i>Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments</i>. Piscataway, NJ: IEEE, 2023. doi: <a href=\"https://doi.org/10.1109/etfa54631.2023.10275455\">10.1109/etfa54631.2023.10275455</a>.","bjps":"<b>Ehrlich M <i>et al.</i></b> (2023) <i>Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments</i>. Piscataway, NJ: IEEE.","chicago-de":"Ehrlich, Marco, Andre Bröring, Henning Trsek, Jürgen Jasperneite und Christian Diedrich. 2023. <i>Evaluation Concept for Prototypical Implementation towards Automated Security Risk Assessments</i>. <i>2023 IEEE 28th International Conference on Emerging Technologies and Factory Automation (ETFA)</i>. Piscataway, NJ: IEEE. doi:<a href=\"https://doi.org/10.1109/etfa54631.2023.10275455\">10.1109/etfa54631.2023.10275455</a>, ."},"publisher":"IEEE","user_id":"83781","year":"2023","date_updated":"2024-03-05T14:53:15Z","language":[{"iso":"eng"}],"date_created":"2024-03-01T14:32:43Z","author":[{"last_name":"Ehrlich","full_name":"Ehrlich, Marco","id":"61562","first_name":"Marco"},{"first_name":"Andre","last_name":"Bröring","id":"65130","full_name":"Bröring, Andre"},{"id":"1486","full_name":"Trsek, Henning","last_name":"Trsek","first_name":"Henning","orcid":"0000-0002-0133-0656"},{"first_name":"Jürgen","full_name":"Jasperneite, Jürgen","id":"1899","last_name":"Jasperneite"},{"last_name":"Diedrich","full_name":"Diedrich, Christian","first_name":"Christian"}],"status":"public","place":"Piscataway, NJ","abstract":[{"text":"Due to Industry 4.0 developments, the demanded modularity of manufacturing systems generates additional manual efforts for security experts to guarantee a secure operation. The rising utilization of information and the frequent changes of systems necessitate continuous security engineering. Therefore, this work in progress presents the specification and prototypical implementation for automated security risk assessments. In addition, an outlook towards the associated validation, verification, evaluation, and hypothesis testing is given.","lang":"eng"}],"_id":"11158","type":"conference_editor_article"},{"intvolume":"        71","citation":{"short":"M. Ehrlich, A. Bröring, C. Diedrich, J. Jasperneite, Automatisierungstechnik : AT  71 (2023) 453–466.","chicago":"Ehrlich, Marco, Andre Bröring, Christian Diedrich, and Jürgen Jasperneite. “Towards Automated Risk Assessments for Modular Manufacturing Systems.” <i>Automatisierungstechnik : AT </i> 71, no. 6 (2023): 453–66. <a href=\"https://doi.org/10.1515/auto-2022-0098\">https://doi.org/10.1515/auto-2022-0098</a>.","mla":"Ehrlich, Marco, et al. “Towards Automated Risk Assessments for Modular Manufacturing Systems.” <i>Automatisierungstechnik : AT </i>, vol. 71, no. 6, 2023, pp. 453–66, <a href=\"https://doi.org/10.1515/auto-2022-0098\">https://doi.org/10.1515/auto-2022-0098</a>.","din1505-2-1":"<span style=\"font-variant:small-caps;\">Ehrlich, Marco</span> ; <span style=\"font-variant:small-caps;\">Bröring, Andre</span> ; <span style=\"font-variant:small-caps;\">Diedrich, Christian</span> ; <span style=\"font-variant:small-caps;\">Jasperneite, Jürgen</span>: Towards automated risk assessments for modular manufacturing systems. In: <i>Automatisierungstechnik : AT </i> Bd. 71. Berlin, Walter de Gruyter GmbH (2023), Nr. 6, S. 453–466","bjps":"<b>Ehrlich M <i>et al.</i></b> (2023) Towards Automated Risk Assessments for Modular Manufacturing Systems. <i>Automatisierungstechnik : AT </i> <b>71</b>, 453–466.","chicago-de":"Ehrlich, Marco, Andre Bröring, Christian Diedrich und Jürgen Jasperneite. 2023. Towards automated risk assessments for modular manufacturing systems. <i>Automatisierungstechnik : AT </i> 71, Nr. 6: 453–466. doi:<a href=\"https://doi.org/10.1515/auto-2022-0098\">10.1515/auto-2022-0098</a>, .","havard":"M. Ehrlich, A. Bröring, C. Diedrich, J. Jasperneite, Towards automated risk assessments for modular manufacturing systems, Automatisierungstechnik : AT . 71 (2023) 453–466.","ufg":"<b>Ehrlich, Marco u. a.</b>: Towards automated risk assessments for modular manufacturing systems, in: <i>Automatisierungstechnik : AT </i> 71 (2023), H. 6,  S. 453–466.","ama":"Ehrlich M, Bröring A, Diedrich C, Jasperneite J. Towards automated risk assessments for modular manufacturing systems. <i>Automatisierungstechnik : AT </i>. 2023;71(6):453-466. doi:<a href=\"https://doi.org/10.1515/auto-2022-0098\">10.1515/auto-2022-0098</a>","apa":"Ehrlich, M., Bröring, A., Diedrich, C., &#38; Jasperneite, J. (2023). Towards automated risk assessments for modular manufacturing systems. <i>Automatisierungstechnik : AT </i>, <i>71</i>(6), 453–466. <a href=\"https://doi.org/10.1515/auto-2022-0098\">https://doi.org/10.1515/auto-2022-0098</a>","van":"Ehrlich M, Bröring A, Diedrich C, Jasperneite J. Towards automated risk assessments for modular manufacturing systems. Automatisierungstechnik : AT . 2023;71(6):453–66.","ieee":"M. Ehrlich, A. Bröring, C. Diedrich, and J. Jasperneite, “Towards automated risk assessments for modular manufacturing systems,” <i>Automatisierungstechnik : AT </i>, vol. 71, no. 6, pp. 453–466, 2023, doi: <a href=\"https://doi.org/10.1515/auto-2022-0098\">10.1515/auto-2022-0098</a>."},"publisher":"Walter de Gruyter GmbH","keyword":["sasset administration shell","automation","information model","modular manufacturing system","risk assessment","security"],"alternative_title":["Process analysis and information model proposal"],"publication_identifier":{"eissn":["2196-677X"],"issn":["0178-2312"]},"publication_status":"published","department":[{"_id":"DEP5023"}],"title":"Towards automated risk assessments for modular manufacturing systems","doi":"10.1515/auto-2022-0098","issue":"6","publication":"Automatisierungstechnik : AT ","isi":"1","author":[{"full_name":"Ehrlich, Marco","id":"61562","last_name":"Ehrlich","first_name":"Marco"},{"first_name":"Andre","id":"65130","full_name":"Bröring, Andre","last_name":"Bröring"},{"full_name":"Diedrich, Christian","last_name":"Diedrich","first_name":"Christian"},{"first_name":"Jürgen","full_name":"Jasperneite, Jürgen","id":"1899","last_name":"Jasperneite"}],"status":"public","place":"Berlin","abstract":[{"text":"Manufacturing systems based on Industry 4.0 concepts provide a greater availability of data and have modular characteristics enabling frequent changes. This raises the need for new security engineering concepts that cover the increasing complexity and frequency of mandatory security risk assessments. In contrast, the current standardization landscape used for the assessment of these systems only offers abstract, static, manual, and resource-intensive procedures. Therefore, this work proposes a method that further specifies the IEC 62443 aiming to automate the security risk assessments in such a way that manual efforts can be reduced and a consistent quality can be achieved. The methodology is presented using network segmentation as a guiding example and consists of four main steps: Information collection based on a process analysis, information formalisation with a semi-formal model, information usage applying first order logic to extract expert knowledge, and information access using the concept of the digital twin. In addition, the applicability of the IEC 62443 standard to the risk assessment of modular manufacturing systems is evaluated.","lang":"eng"}],"_id":"12875","type":"scientific_journal_article","page":"453-466","volume":71,"user_id":"83781","date_updated":"2025-06-25T13:14:59Z","year":"2023","language":[{"iso":"eng"}],"date_created":"2025-04-29T07:17:44Z","external_id":{"isi":["001004217900004"]}},{"abstract":[{"text":"Due to Industry 4.0 developments, the demanded modularity of manufacturing systems generates additional manual efforts for security experts to guarantee a secure operation. The rising utilization of information and the frequent changes of system structures necessitate a continuous and automated security engineering, especially by application of the mandatory security risk assessments. Collecting the required information for these assessments and formalising expert knowledge shall improve the security of modular manufacturing systems in the future. In order to automate the security risk assessment process, this work proposes a method to determine the Target Security Level (SL-T) in conformance to the IEC 62443 standard based on the MITRE ATT&CK framework and the Intel Threat Agent Library (TAL).","lang":"eng"}],"editor":[{"first_name":"Jürgen","last_name":"Jasperneite","id":"1899","full_name":"Jasperneite, Jürgen"}],"_id":"12995","type":"conference_editor_article","author":[{"last_name":"Ehrlich","id":"61562","full_name":"Ehrlich, Marco","first_name":"Marco"},{"id":"65130","full_name":"Bröring, Andre","last_name":"Bröring","first_name":"Andre"},{"full_name":"Diedrich, Christian","last_name":"Diedrich","first_name":"Christian"},{"full_name":"Jasperneite, Jürgen","id":"1899","last_name":"Jasperneite","first_name":"Jürgen"},{"full_name":"Kastner, Wolfgang","last_name":"Kastner","first_name":"Wolfgang"},{"orcid":"0000-0002-0133-0656","first_name":"Henning","last_name":"Trsek","full_name":"Trsek, Henning","id":"1486"}],"status":"public","place":"[Piscataway, NJ]","language":[{"iso":"eng"}],"corporate_editor":["Institute of Electrical and Electronics Engineers"],"date_created":"2025-06-18T13:30:31Z","user_id":"83781","date_updated":"2025-06-18T13:37:07Z","year":"2023","publisher":"IEEE","citation":{"chicago-de":"Ehrlich, Marco, Andre Bröring, Christian Diedrich, Jürgen Jasperneite, Wolfgang Kastner und Henning Trsek. 2023. <i>Determining the Target Security Level for Automated Security Risk Assessments</i>. Hg. von Jürgen Jasperneite und Institute of Electrical and Electronics Engineers. <i>2023 IEEE 21st International Conference on Industrial Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany</i>. [Piscataway, NJ]: IEEE. doi:<a href=\"https://doi.org/10.1109/indin51400.2023.10217902\">10.1109/indin51400.2023.10217902</a>, .","bjps":"<b>Ehrlich M <i>et al.</i></b> (2023) <i>Determining the Target Security Level for Automated Security Risk Assessments</i>, Jasperneite J and Institute of Electrical and Electronics Engineers (eds). [Piscataway, NJ]: IEEE.","din1505-2-1":"<span style=\"font-variant:small-caps;\">Ehrlich, Marco</span> ; <span style=\"font-variant:small-caps;\">Bröring, Andre</span> ; <span style=\"font-variant:small-caps;\">Diedrich, Christian</span> ; <span style=\"font-variant:small-caps;\">Jasperneite, Jürgen</span> ; <span style=\"font-variant:small-caps;\">Kastner, Wolfgang</span> ; <span style=\"font-variant:small-caps;\">Trsek, Henning</span> ; <span style=\"font-variant:small-caps;\">Jasperneite, J.</span> ; <span style=\"font-variant:small-caps;\">Institute of Electrical and Electronics Engineers</span> (Hrsg.): <i>Determining the Target Security Level for Automated Security Risk Assessments</i>. [Piscataway, NJ] : IEEE, 2023","short":"M. Ehrlich, A. Bröring, C. Diedrich, J. Jasperneite, W. Kastner, H. Trsek, Determining the Target Security Level for Automated Security Risk Assessments, IEEE, [Piscataway, NJ], 2023.","chicago":"Ehrlich, Marco, Andre Bröring, Christian Diedrich, Jürgen Jasperneite, Wolfgang Kastner, and Henning Trsek. <i>Determining the Target Security Level for Automated Security Risk Assessments</i>. Edited by Jürgen Jasperneite and Institute of Electrical and Electronics Engineers. <i>2023 IEEE 21st International Conference on Industrial Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany</i>. [Piscataway, NJ]: IEEE, 2023. <a href=\"https://doi.org/10.1109/indin51400.2023.10217902\">https://doi.org/10.1109/indin51400.2023.10217902</a>.","mla":"Ehrlich, Marco, et al. “Determining the Target Security Level for Automated Security Risk Assessments.” <i>2023 IEEE 21st International Conference on Industrial Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany</i>, edited by Jürgen Jasperneite and Institute of Electrical and Electronics Engineers, IEEE, 2023, <a href=\"https://doi.org/10.1109/indin51400.2023.10217902\">https://doi.org/10.1109/indin51400.2023.10217902</a>.","van":"Ehrlich M, Bröring A, Diedrich C, Jasperneite J, Kastner W, Trsek H. Determining the Target Security Level for Automated Security Risk Assessments. Jasperneite J, Institute of Electrical and Electronics Engineers, editors. 2023 IEEE 21st International Conference on Industrial Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany. [Piscataway, NJ]: IEEE; 2023.","ieee":"M. Ehrlich, A. Bröring, C. Diedrich, J. Jasperneite, W. Kastner, and H. Trsek, <i>Determining the Target Security Level for Automated Security Risk Assessments</i>. [Piscataway, NJ]: IEEE, 2023. doi: <a href=\"https://doi.org/10.1109/indin51400.2023.10217902\">10.1109/indin51400.2023.10217902</a>.","apa":"Ehrlich, M., Bröring, A., Diedrich, C., Jasperneite, J., Kastner, W., &#38; Trsek, H. (2023). Determining the Target Security Level for Automated Security Risk Assessments. In J. Jasperneite &#38; Institute of Electrical and Electronics Engineers (Eds.), <i>2023 IEEE 21st International Conference on Industrial Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany</i>. IEEE. <a href=\"https://doi.org/10.1109/indin51400.2023.10217902\">https://doi.org/10.1109/indin51400.2023.10217902</a>","ama":"Ehrlich M, Bröring A, Diedrich C, Jasperneite J, Kastner W, Trsek H. <i>Determining the Target Security Level for Automated Security Risk Assessments</i>. (Jasperneite J, Institute of Electrical and Electronics Engineers, eds.). IEEE; 2023. doi:<a href=\"https://doi.org/10.1109/indin51400.2023.10217902\">10.1109/indin51400.2023.10217902</a>","ufg":"<b>Ehrlich, Marco u. a.</b>: Determining the Target Security Level for Automated Security Risk Assessments, hg. von Jasperneite, Jürgen, Institute of Electrical and Electronics Engineers, [Piscataway, NJ] 2023.","havard":"M. Ehrlich, A. Bröring, C. Diedrich, J. Jasperneite, W. Kastner, H. Trsek, Determining the Target Security Level for Automated Security Risk Assessments, IEEE, [Piscataway, NJ], 2023."},"doi":"10.1109/indin51400.2023.10217902","publication_status":"published","publication_identifier":{"isbn":["978-1-6654-9314-7"],"eisbn":["978-1-6654-9313-0"]},"title":"Determining the Target Security Level for Automated Security Risk Assessments","department":[{"_id":"DEP5023"}],"conference":{"name":"21st International Conference on Industrial Informatics (INDIN)","end_date":"2023-07-20","location":"Lemgo","start_date":"2023-07-18"},"publication":"2023 IEEE 21st International Conference on Industrial Informatics : INDIN 2023 : 17-20 July 2023, Lemgo, Germany","keyword":["Integrated circuits","Industries","Libraries","Security","Risk management","IEC Standards","Interviews"]},{"place":"lemgo","status":"public","author":[{"first_name":"Andre","id":"65130","full_name":"Bröring, Andre","last_name":"Bröring"},{"first_name":"Marco","last_name":"Ehrlich","full_name":"Ehrlich, Marco","id":"61562"},{"last_name":"Wisniewski","id":"1710","full_name":"Wisniewski, Lukasz","first_name":"Lukasz"},{"last_name":"Trsek","id":"1486","full_name":"Trsek, Henning","orcid":"0000-0002-0133-0656","first_name":"Henning"},{"id":"1031","full_name":"Heiss, Stefan","last_name":"Heiss","first_name":"Stefan"}],"page":"192-203","_id":"11168","type":"conference","editor":[{"first_name":"Jürgen","last_name":"Jasperneite","full_name":"Jasperneite, Jürgen","id":"1899"},{"full_name":"Jumar, Ulrich","last_name":"Jumar","first_name":"Ulrich"}],"year":"2022","date_updated":"2024-03-11T10:33:16Z","user_id":"83781","corporate_editor":["Institut für industrielle Informationstechnik - inIT"],"date_created":"2024-03-01T14:37:04Z","language":[{"iso":"eng"}],"citation":{"bjps":"<b>Bröring A <i>et al.</i></b> (2022) An Asset Administration Shell Version Control to Enforce Integrity Protection. In Jasperneite J, Jumar U, and Institut für industrielle Informationstechnik - inIT (eds), <i>Kommunikation in Der Automation : Beiträge Des Jahreskolloquiums KommA 2022</i>. lemgo: Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe , pp. 192–203.","chicago-de":"Bröring, Andre, Marco Ehrlich, Lukasz Wisniewski, Henning Trsek und Stefan Heiss. 2022. An Asset Administration Shell Version Control to Enforce Integrity Protection. In: <i>Kommunikation in der Automation : Beiträge des Jahreskolloquiums KommA 2022</i>, hg. von Jürgen Jasperneite, Ulrich Jumar, und Institut für industrielle Informationstechnik - inIT, 192–203. lemgo: Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe . doi:<a href=\"https://doi.org/10.25644/a4ws-9a49\">10.25644/a4ws-9a49</a>, .","van":"Bröring A, Ehrlich M, Wisniewski L, Trsek H, Heiss S. An Asset Administration Shell Version Control to Enforce Integrity Protection. In: Jasperneite J, Jumar U, Institut für industrielle Informationstechnik - inIT, editors. Kommunikation in der Automation : Beiträge des Jahreskolloquiums KommA 2022. lemgo: Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe ; 2022. p. 192–203.","ieee":"A. Bröring, M. Ehrlich, L. Wisniewski, H. Trsek, and S. Heiss, “An Asset Administration Shell Version Control to Enforce Integrity Protection,” in <i>Kommunikation in der Automation : Beiträge des Jahreskolloquiums KommA 2022</i>, Lemgo, 2022, pp. 192–203. doi: <a href=\"https://doi.org/10.25644/a4ws-9a49\">10.25644/a4ws-9a49</a>.","ama":"Bröring A, Ehrlich M, Wisniewski L, Trsek H, Heiss S. An Asset Administration Shell Version Control to Enforce Integrity Protection. In: Jasperneite J, Jumar U, Institut für industrielle Informationstechnik - inIT, eds. <i>Kommunikation in Der Automation : Beiträge Des Jahreskolloquiums KommA 2022</i>. Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe ; 2022:192-203. doi:<a href=\"https://doi.org/10.25644/a4ws-9a49\">10.25644/a4ws-9a49</a>","short":"A. Bröring, M. Ehrlich, L. Wisniewski, H. Trsek, S. Heiss, in: J. Jasperneite, U. Jumar, Institut für industrielle Informationstechnik - inIT (Eds.), Kommunikation in Der Automation : Beiträge Des Jahreskolloquiums KommA 2022, Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe , lemgo, 2022, pp. 192–203.","chicago":"Bröring, Andre, Marco Ehrlich, Lukasz Wisniewski, Henning Trsek, and Stefan Heiss. “An Asset Administration Shell Version Control to Enforce Integrity Protection.” In <i>Kommunikation in Der Automation : Beiträge Des Jahreskolloquiums KommA 2022</i>, edited by Jürgen Jasperneite, Ulrich Jumar, and Institut für industrielle Informationstechnik - inIT, 192–203. lemgo: Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe , 2022. <a href=\"https://doi.org/10.25644/a4ws-9a49\">https://doi.org/10.25644/a4ws-9a49</a>.","mla":"Bröring, Andre, et al. “An Asset Administration Shell Version Control to Enforce Integrity Protection.” <i>Kommunikation in Der Automation : Beiträge Des Jahreskolloquiums KommA 2022</i>, edited by Jürgen Jasperneite et al., Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe , 2022, pp. 192–203, <a href=\"https://doi.org/10.25644/a4ws-9a49\">https://doi.org/10.25644/a4ws-9a49</a>.","apa":"Bröring, A., Ehrlich, M., Wisniewski, L., Trsek, H., &#38; Heiss, S. (2022). An Asset Administration Shell Version Control to Enforce Integrity Protection. In J. Jasperneite, U. Jumar, &#38; Institut für industrielle Informationstechnik - inIT (Eds.), <i>Kommunikation in der Automation : Beiträge des Jahreskolloquiums KommA 2022</i> (pp. 192–203). Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe . <a href=\"https://doi.org/10.25644/a4ws-9a49\">https://doi.org/10.25644/a4ws-9a49</a>","din1505-2-1":"<span style=\"font-variant:small-caps;\">Bröring, Andre</span> ; <span style=\"font-variant:small-caps;\">Ehrlich, Marco</span> ; <span style=\"font-variant:small-caps;\">Wisniewski, Lukasz</span> ; <span style=\"font-variant:small-caps;\">Trsek, Henning</span> ; <span style=\"font-variant:small-caps;\">Heiss, Stefan</span>: An Asset Administration Shell Version Control to Enforce Integrity Protection. In: <span style=\"font-variant:small-caps;\">Jasperneite, J.</span> ; <span style=\"font-variant:small-caps;\">Jumar, U.</span> ; <span style=\"font-variant:small-caps;\">Institut für industrielle Informationstechnik - inIT</span> (Hrsg.): <i>Kommunikation in der Automation : Beiträge des Jahreskolloquiums KommA 2022</i>. lemgo : Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe , 2022, S. 192–203","havard":"A. Bröring, M. Ehrlich, L. Wisniewski, H. Trsek, S. Heiss, An Asset Administration Shell Version Control to Enforce Integrity Protection, in: J. Jasperneite, U. Jumar, Institut für industrielle Informationstechnik - inIT (Eds.), Kommunikation in Der Automation : Beiträge Des Jahreskolloquiums KommA 2022, Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe , lemgo, 2022: pp. 192–203.","ufg":"<b>Bröring, Andre u. a.</b>: An Asset Administration Shell Version Control to Enforce Integrity Protection, in: <i>Jasperneite, Jürgen/Jumar, Ulrich, Institut für industrielle Informationstechnik - inIT (Hgg.)</i>: Kommunikation in der Automation : Beiträge des Jahreskolloquiums KommA 2022, lemgo 2022,  S. 192–203."},"publisher":"Institut für industrielle Informationstechnik - inIT, Technische Hochschule Ostwestfalen-Lippe ","publication":"Kommunikation in der Automation : Beiträge des Jahreskolloquiums KommA 2022","conference":{"location":"Lemgo","start_date":"2022-11-03 ","end_date":"2022-11-03 ","name":"KommA 2022"},"department":[{"_id":"DEP5023"}],"title":"An Asset Administration Shell Version Control to Enforce Integrity Protection","publication_identifier":{"isbn":["978-3-9818463-3-1"]},"publication_status":"published","doi":"10.25644/a4ws-9a49"},{"place":"Berlin, Germany","status":"public","author":[{"first_name":"Andre","last_name":"Bröring","id":"65130","full_name":"Bröring, Andre"},{"full_name":"Belyaev, Alexander","last_name":"Belyaev","first_name":"Alexander"},{"full_name":"Trsek, Henning","id":"1486","last_name":"Trsek","first_name":"Henning","orcid":"0000-0002-0133-0656"},{"first_name":"Lukasz","last_name":"Wisniewski","id":"1710","full_name":"Wisniewski, Lukasz"},{"first_name":"Christian","last_name":"Diedrich","full_name":"Diedrich, Christian"}],"publisher":"Plattform Industrie 4.0 secretariat","citation":{"mla":"Bröring, Andre, et al. “Secure Asset Administration Shell Exchange with Distributed Ledger Technology.” <i>Shaping a Globally Secure Industrie 4.0 Ecosystem - Enabling International Interoperable Security Policies</i>, Plattform Industrie 4.0 secretariat, 2021, pp. 78–91.","short":"A. Bröring, A. Belyaev, H. Trsek, L. Wisniewski, C. Diedrich, in: Shaping a Globally Secure Industrie 4.0 Ecosystem - Enabling International Interoperable Security Policies, Plattform Industrie 4.0 secretariat, Berlin, Germany, 2021, pp. 78–91.","chicago":"Bröring, Andre, Alexander Belyaev, Henning Trsek, Lukasz Wisniewski, and Christian Diedrich. “Secure Asset Administration Shell Exchange with Distributed Ledger Technology.” In <i>Shaping a Globally Secure Industrie 4.0 Ecosystem - Enabling International Interoperable Security Policies</i>, 78–91. Berlin, Germany: Plattform Industrie 4.0 secretariat, 2021.","din1505-2-1":"<span style=\"font-variant:small-caps;\">Bröring, Andre</span> ; <span style=\"font-variant:small-caps;\">Belyaev, Alexander</span> ; <span style=\"font-variant:small-caps;\">Trsek, Henning</span> ; <span style=\"font-variant:small-caps;\">Wisniewski, Lukasz</span> ; <span style=\"font-variant:small-caps;\">Diedrich, Christian</span>: Secure Asset Administration Shell exchange with Distributed Ledger Technology. In: <i>Shaping a globally secure Industrie 4.0 Ecosystem - Enabling international interoperable security policies</i>. Berlin, Germany : Plattform Industrie 4.0 secretariat, 2021, S. 78–91","bjps":"<b>Bröring A <i>et al.</i></b> (2021) Secure Asset Administration Shell Exchange with Distributed Ledger Technology. <i>Shaping a Globally Secure Industrie 4.0 Ecosystem - Enabling International Interoperable Security Policies</i>. Berlin, Germany: Plattform Industrie 4.0 secretariat, pp. 78–91.","chicago-de":"Bröring, Andre, Alexander Belyaev, Henning Trsek, Lukasz Wisniewski und Christian Diedrich. 2021. Secure Asset Administration Shell exchange with Distributed Ledger Technology. In: <i>Shaping a globally secure Industrie 4.0 Ecosystem - Enabling international interoperable security policies</i>, 78–91. Berlin, Germany: Plattform Industrie 4.0 secretariat.","havard":"A. Bröring, A. Belyaev, H. Trsek, L. Wisniewski, C. Diedrich, Secure Asset Administration Shell exchange with Distributed Ledger Technology, in: Shaping a Globally Secure Industrie 4.0 Ecosystem - Enabling International Interoperable Security Policies, Plattform Industrie 4.0 secretariat, Berlin, Germany, 2021: pp. 78–91.","ufg":"<b>Bröring, Andre u. a.</b>: Secure Asset Administration Shell exchange with Distributed Ledger Technology, in: o. Hg.: Shaping a globally secure Industrie 4.0 Ecosystem - Enabling international interoperable security policies, Berlin, Germany 2021,  S. 78–91.","ama":"Bröring A, Belyaev A, Trsek H, Wisniewski L, Diedrich C. Secure Asset Administration Shell exchange with Distributed Ledger Technology. In: <i>Shaping a Globally Secure Industrie 4.0 Ecosystem - Enabling International Interoperable Security Policies</i>. Plattform Industrie 4.0 secretariat; 2021:78-91.","apa":"Bröring, A., Belyaev, A., Trsek, H., Wisniewski, L., &#38; Diedrich, C. (2021). Secure Asset Administration Shell exchange with Distributed Ledger Technology. <i>Shaping a Globally Secure Industrie 4.0 Ecosystem - Enabling International Interoperable Security Policies</i>, 78–91.","ieee":"A. Bröring, A. Belyaev, H. Trsek, L. Wisniewski, and C. Diedrich, “Secure Asset Administration Shell exchange with Distributed Ledger Technology,” in <i>Shaping a globally secure Industrie 4.0 Ecosystem - Enabling international interoperable security policies</i>, 2021, pp. 78–91.","van":"Bröring A, Belyaev A, Trsek H, Wisniewski L, Diedrich C. Secure Asset Administration Shell exchange with Distributed Ledger Technology. In: Shaping a globally secure Industrie 40 Ecosystem - Enabling international interoperable security policies. Berlin, Germany: Plattform Industrie 4.0 secretariat; 2021. p. 78–91."},"type":"conference","_id":"11156","page":"78-91","oa":"1","date_updated":"2024-03-11T14:21:42Z","year":"2021","user_id":"83781","date_created":"2024-03-01T14:29:19Z","publication":"Shaping a globally secure Industrie 4.0 Ecosystem - Enabling international interoperable security policies","main_file_link":[{"open_access":"1","url":"https://www.plattform-i40.de/IP/Redaktion/DE/Downloads/Publikation/2021-conference-volume-industrie40-security.pdf?__blob=publicationFile&v=1"}],"language":[{"iso":"eng"}],"department":[{"_id":"DEP5023"}],"title":"Secure Asset Administration Shell exchange with Distributed Ledger Technology","publication_status":"published"},{"doi":"10.25673/39569","title":"Secure usage of asset administration shells : an overview and analysis of best practises","department":[{"_id":"DEP5019"}],"publication_identifier":{"isbn":["978-3-948749101 "]},"publication_status":"published","conference":{"name":"Komma 2021, Kommunikation in der Automation","start_date":"2021-11-18","location":"virtuell","end_date":"2021-11-18"},"publication":"Kommunikation in der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : in Verbindung mit dem Industrial Radio Day, 17.11.2021","oa":"1","publisher":"Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität ","citation":{"din1505-2-1":"<span style=\"font-variant:small-caps;\">Bröring, Andre</span> ; <span style=\"font-variant:small-caps;\">Ehrlich, Marco</span> ; <span style=\"font-variant:small-caps;\">Trsek, Henning</span> ; <span style=\"font-variant:small-caps;\">Wisniewski, Lukasz</span>: Secure usage of asset administration shells : an overview and analysis of best practises. In: <span style=\"font-variant:small-caps;\">Jumar, U.</span> ; <span style=\"font-variant:small-caps;\">Jasperneite, J.</span> ; <span style=\"font-variant:small-caps;\">Universitätsbibliothek, Magdeburg</span> (Hrsg.): <i>Kommunikation in der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : in Verbindung mit dem Industrial Radio Day, 17.11.2021</i>. Magdeburg : Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität , 2021","chicago":"Bröring, Andre, Marco Ehrlich, Henning Trsek, and Lukasz Wisniewski. “Secure Usage of Asset Administration Shells : An Overview and Analysis of Best Practises.” In <i>Kommunikation in Der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : In Verbindung Mit Dem Industrial Radio Day, 17.11.2021</i>, edited by Ulrich Jumar, Jürgen Jasperneite, and Universitätsbibliothek, Magdeburg. Magdeburg: Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität , 2021. <a href=\"https://doi.org/10.25673/39569\">https://doi.org/10.25673/39569</a>.","short":"A. Bröring, M. Ehrlich, H. Trsek, L. Wisniewski, in: U. Jumar, J. Jasperneite, Universitätsbibliothek, Magdeburg (Eds.), Kommunikation in Der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : In Verbindung Mit Dem Industrial Radio Day, 17.11.2021, Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität , Magdeburg, 2021.","mla":"Bröring, Andre, et al. “Secure Usage of Asset Administration Shells : An Overview and Analysis of Best Practises.” <i>Kommunikation in Der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : In Verbindung Mit Dem Industrial Radio Day, 17.11.2021</i>, edited by Ulrich Jumar et al., Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität , 2021, <a href=\"https://doi.org/10.25673/39569\">https://doi.org/10.25673/39569</a>.","bjps":"<b>Bröring A <i>et al.</i></b> (2021) Secure Usage of Asset Administration Shells : An Overview and Analysis of Best Practises. In Jumar U, Jasperneite J, and Universitätsbibliothek, Magdeburg (eds), <i>Kommunikation in Der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : In Verbindung Mit Dem Industrial Radio Day, 17.11.2021</i>. Magdeburg: Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität .","chicago-de":"Bröring, Andre, Marco Ehrlich, Henning Trsek und Lukasz Wisniewski. 2021. Secure usage of asset administration shells : an overview and analysis of best practises. In: <i>Kommunikation in der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : in Verbindung mit dem Industrial Radio Day, 17.11.2021</i>, hg. von Ulrich Jumar, Jürgen Jasperneite, und Universitätsbibliothek, Magdeburg. Magdeburg: Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität . doi:<a href=\"https://doi.org/10.25673/39569\">10.25673/39569</a>, .","ufg":"<b>Bröring, Andre u. a.</b>: Secure usage of asset administration shells : an overview and analysis of best practises, in: <i>Jumar, Ulrich/Jasperneite, Jürgen, Universitätsbibliothek, Magdeburg (Hgg.)</i>: Kommunikation in der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : in Verbindung mit dem Industrial Radio Day, 17.11.2021, Magdeburg 2021.","havard":"A. Bröring, M. Ehrlich, H. Trsek, L. Wisniewski, Secure usage of asset administration shells : an overview and analysis of best practises, in: U. Jumar, J. Jasperneite, Universitätsbibliothek, Magdeburg (Eds.), Kommunikation in Der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : In Verbindung Mit Dem Industrial Radio Day, 17.11.2021, Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität , Magdeburg, 2021.","apa":"Bröring, A., Ehrlich, M., Trsek, H., &#38; Wisniewski, L. (2021). Secure usage of asset administration shells : an overview and analysis of best practises. In U. Jumar, J. Jasperneite, &#38; Universitätsbibliothek, Magdeburg (Eds.), <i>Kommunikation in der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : in Verbindung mit dem Industrial Radio Day, 17.11.2021</i>. Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität . <a href=\"https://doi.org/10.25673/39569\">https://doi.org/10.25673/39569</a>","ama":"Bröring A, Ehrlich M, Trsek H, Wisniewski L. Secure usage of asset administration shells : an overview and analysis of best practises. In: Jumar U, Jasperneite J, Universitätsbibliothek, Magdeburg, eds. <i>Kommunikation in Der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : In Verbindung Mit Dem Industrial Radio Day, 17.11.2021</i>. Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität ; 2021. doi:<a href=\"https://doi.org/10.25673/39569\">10.25673/39569</a>","van":"Bröring A, Ehrlich M, Trsek H, Wisniewski L. Secure usage of asset administration shells : an overview and analysis of best practises. In: Jumar U, Jasperneite J, Universitätsbibliothek, Magdeburg, editors. Kommunikation in der Automation (KommA 2021) : 12 Jahreskolloquium, 18112021 : in Verbindung mit dem Industrial Radio Day, 17112021. Magdeburg: Institut für Automation und Kommunikation e.V. - Magdeburg : An-Institut der Otto-von-Guericke-Universität ; 2021.","ieee":"A. Bröring, M. Ehrlich, H. Trsek, and L. Wisniewski, “Secure usage of asset administration shells : an overview and analysis of best practises,” in <i>Kommunikation in der Automation (KommA 2021) : 12. Jahreskolloquium, 18.11.2021 : in Verbindung mit dem Industrial Radio Day, 17.11.2021</i>, virtuell, 2021. doi: <a href=\"https://doi.org/10.25673/39569\">10.25673/39569</a>."},"language":[{"iso":"eng"}],"corporate_editor":["Universitätsbibliothek, Magdeburg"],"date_created":"2021-12-23T17:37:29Z","main_file_link":[{"open_access":"1"}],"user_id":"83781","year":"2021","date_updated":"2024-03-05T14:57:40Z","abstract":[{"lang":"eng","text":"The Asset Administration Shell (AAS) is a core element for Industrie 4.0. In addition, the security of industrial systems is a permanent topic that could be improved by the AAS and should have a high priority for future developments and implementations of the AAS. This paper evaluates the current threat landscape for Industrial Control Systems (ICS) communicating to the AAS, as well as for IT systems hosting the AAS. The relevance of these threats is evaluated for the AAS and the threats with the highest relevance, namely BasicWeb Application Attacks and Malware Infections, are analysed in detail. The recommended countermeasures for these threats are compared with the state of the art of AAS security concepts and result in missing countermeasures and research gaps for an overall security of the AAS."}],"editor":[{"last_name":"Jumar","full_name":"Jumar, Ulrich","first_name":"Ulrich"},{"full_name":"Jasperneite, Jürgen","id":"1899","last_name":"Jasperneite","first_name":"Jürgen"}],"_id":"6931","type":"conference","status":"public","author":[{"first_name":"Andre","id":"65130","full_name":"Bröring, Andre","last_name":"Bröring"},{"first_name":"Marco","last_name":"Ehrlich","id":"61562","full_name":"Ehrlich, Marco"},{"full_name":"Trsek, Henning","id":"1486","last_name":"Trsek","first_name":"Henning","orcid":"0000-0002-0133-0656"},{"full_name":"Wisniewski, Lukasz","id":"1710","last_name":"Wisniewski","first_name":"Lukasz"}],"place":"Magdeburg"},{"keyword":["safety","security","alignment","automation","processes","models"],"issue":"6","doi":"10.1007/s00502-021-00927-9","title":"Alignment of safety and security risk assessments for modular production systems","department":[{"_id":"DEP5019"},{"_id":"DEP5023"}],"publication_status":"published","publication_identifier":{"issn":["0932-383X"],"eissn":["1613-7620"]},"isi":"1","publication":"Elektrotechnik und Informationstechnik : e & i","intvolume":"       138","publisher":"Springer","citation":{"havard":"M. Ehrlich, A. Bröring, D. Harder, T. Auhagen-Meyer, P. Kleen, L. Wisniewski, H. Trsek, J. Jasperneite, Alignment of safety and security risk assessments for modular production systems, Elektrotechnik Und Informationstechnik : E &#38; i. 138 (2021) 454–461.","ufg":"<b>Ehrlich, Marco u. a.</b>: Alignment of safety and security risk assessments for modular production systems, in: <i>Elektrotechnik und Informationstechnik : e &#38; i</i> 138 (2021), H. 6,  S. 454–461.","short":"M. Ehrlich, A. Bröring, D. Harder, T. Auhagen-Meyer, P. Kleen, L. Wisniewski, H. Trsek, J. Jasperneite, Elektrotechnik Und Informationstechnik : E &#38; i 138 (2021) 454–461.","ama":"Ehrlich M, Bröring A, Harder D, et al. Alignment of safety and security risk assessments for modular production systems. <i>Elektrotechnik und Informationstechnik : e &#38; i</i>. 2021;138(6):454-461. doi:<a href=\"https://doi.org/10.1007/s00502-021-00927-9\">10.1007/s00502-021-00927-9</a>","chicago":"Ehrlich, Marco, Andre Bröring, Dimitri Harder, Torben Auhagen-Meyer, Philip Kleen, Lukasz Wisniewski, Henning Trsek, and Jürgen Jasperneite. “Alignment of Safety and Security Risk Assessments for Modular Production Systems.” <i>Elektrotechnik Und Informationstechnik : E &#38; i</i> 138, no. 6 (2021): 454–61. <a href=\"https://doi.org/10.1007/s00502-021-00927-9\">https://doi.org/10.1007/s00502-021-00927-9</a>.","mla":"Ehrlich, Marco, et al. “Alignment of Safety and Security Risk Assessments for Modular Production Systems.” <i>Elektrotechnik Und Informationstechnik : E &#38; i</i>, vol. 138, no. 6, 2021, pp. 454–61, <a href=\"https://doi.org/10.1007/s00502-021-00927-9\">https://doi.org/10.1007/s00502-021-00927-9</a>.","apa":"Ehrlich, M., Bröring, A., Harder, D., Auhagen-Meyer, T., Kleen, P., Wisniewski, L., Trsek, H., &#38; Jasperneite, J. (2021). Alignment of safety and security risk assessments for modular production systems. <i>Elektrotechnik Und Informationstechnik : E &#38; i</i>, <i>138</i>(6), 454–461. <a href=\"https://doi.org/10.1007/s00502-021-00927-9\">https://doi.org/10.1007/s00502-021-00927-9</a>","din1505-2-1":"<span style=\"font-variant:small-caps;\">Ehrlich, Marco</span> ; <span style=\"font-variant:small-caps;\">Bröring, Andre</span> ; <span style=\"font-variant:small-caps;\">Harder, Dimitri</span> ; <span style=\"font-variant:small-caps;\">Auhagen-Meyer, Torben</span> ; <span style=\"font-variant:small-caps;\">Kleen, Philip</span> ; <span style=\"font-variant:small-caps;\">Wisniewski, Lukasz</span> ; <span style=\"font-variant:small-caps;\">Trsek, Henning</span> ; <span style=\"font-variant:small-caps;\">Jasperneite, Jürgen</span>: Alignment of safety and security risk assessments for modular production systems. In: <i>Elektrotechnik und Informationstechnik : e &#38; i</i> Bd. 138, Springer (2021), Nr. 6, S. 454–461","van":"Ehrlich M, Bröring A, Harder D, Auhagen-Meyer T, Kleen P, Wisniewski L, et al. Alignment of safety and security risk assessments for modular production systems. Elektrotechnik und Informationstechnik : e &#38; i. 2021;138(6):454–61.","ieee":"M. Ehrlich <i>et al.</i>, “Alignment of safety and security risk assessments for modular production systems,” <i>Elektrotechnik und Informationstechnik : e &#38; i</i>, vol. 138, no. 6, pp. 454–461, 2021, doi: <a href=\"https://doi.org/10.1007/s00502-021-00927-9\">10.1007/s00502-021-00927-9</a>.","chicago-de":"Ehrlich, Marco, Andre Bröring, Dimitri Harder, Torben Auhagen-Meyer, Philip Kleen, Lukasz Wisniewski, Henning Trsek und Jürgen Jasperneite. 2021. Alignment of safety and security risk assessments for modular production systems. <i>Elektrotechnik und Informationstechnik : e &#38; i</i> 138, Nr. 6: 454–461. doi:<a href=\"https://doi.org/10.1007/s00502-021-00927-9\">10.1007/s00502-021-00927-9</a>, .","bjps":"<b>Ehrlich M <i>et al.</i></b> (2021) Alignment of Safety and Security Risk Assessments for Modular Production Systems. <i>Elektrotechnik und Informationstechnik : e &#38; i</i> <b>138</b>, 454–461."},"user_id":"83781","date_updated":"2025-06-26T13:28:58Z","year":"2021","language":[{"iso":"eng"}],"external_id":{"isi":["000696142100001"]},"date_created":"2021-12-23T17:37:45Z","status":"public","author":[{"first_name":"Marco","full_name":"Ehrlich, Marco","id":"61562","last_name":"Ehrlich"},{"last_name":"Bröring","full_name":"Bröring, Andre","id":"65130","first_name":"Andre"},{"full_name":"Harder, Dimitri","id":"69147","last_name":"Harder","first_name":"Dimitri"},{"full_name":"Auhagen-Meyer, Torben","last_name":"Auhagen-Meyer","first_name":"Torben"},{"full_name":"Kleen, Philip","id":"44776","last_name":"Kleen","first_name":"Philip"},{"full_name":"Wisniewski, Lukasz","id":"1710","last_name":"Wisniewski","first_name":"Lukasz"},{"last_name":"Trsek","full_name":"Trsek, Henning","id":"1486","orcid":"0000-0002-0133-0656","first_name":"Henning"},{"id":"1899","full_name":"Jasperneite, Jürgen","last_name":"Jasperneite","first_name":"Jürgen"}],"abstract":[{"lang":"eng","text":"n order to ensure the safety and security of industrial systems with regard to all life cycle phases from development through operation to disposal, specific regulatory and normative requirements are imposed. Due to the digitalization, interconnection, and constantly increasing complexity of manufacturing systems in the context of Industrie 4.0, the manual effort necessary to achieve the required safety and security is becoming ever greater and almost impossible to manage, especially for small and medium-sized enterprises. Therefore, this paper examines the existing challenges in this area in more detail and gives an outlook on the possible solutions to ensure safety and security much quicker and with less manual effort. The overall vision is a (partially) automated risk assessment of modular systems with respect to safety and security, including the alignment of the corresponding processes from both domains and the formalization of the information models needed."}],"volume":138,"_id":"6932","page":"454-461","type":"journal_article"},{"year":2021,"date_updated":"2023-03-15T13:49:56Z","user_id":"45673","publication":"22. VDI-Kongress AUTOMATION","conference":{"start_date":"2021-06-29","location":"digital","end_date":"2021-06-30","name":"22. VDI-Kongress AUTOMATION 2021"},"date_created":"2021-02-05T09:59:11Z","title":"Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie","department":[{"_id":"DEP5023"}],"publication_status":"published","language":[{"iso":"ger"}],"place":"Berlin","status":"public","author":[{"first_name":"Andre","last_name":"Bröring","id":"65130","full_name":"Bröring, Andre"},{"first_name":"Alexander","last_name":"Belyaev","full_name":"Belyaev, Alexander"},{"last_name":"Trsek","full_name":"Trsek, Henning","id":"1486","first_name":"Henning"},{"id":"1710","full_name":"Wisniewski, Lukasz","last_name":"Wisniewski","first_name":"Lukasz"},{"full_name":"Diedrich, Christian","last_name":"Diedrich","first_name":"Christian"}],"citation":{"din1505-2-1":"<span style=\"font-variant:small-caps;\">Bröring, Andre</span> ; <span style=\"font-variant:small-caps;\">Belyaev, Alexander</span> ; <span style=\"font-variant:small-caps;\">Trsek, Henning</span> ; <span style=\"font-variant:small-caps;\">Wisniewski, Lukasz</span> ; <span style=\"font-variant:small-caps;\">Diedrich, Christian</span>: <i>Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie</i>. Berlin : VDI- Verlag, 2021","chicago":"Bröring, Andre, Alexander Belyaev, Henning Trsek, Lukasz Wisniewski, and Christian Diedrich. <i>Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie</i>. <i>22. VDI-Kongress AUTOMATION</i>. Berlin: VDI- Verlag, 2021.","short":"A. Bröring, A. Belyaev, H. Trsek, L. Wisniewski, C. Diedrich, Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie, VDI- Verlag, Berlin, 2021.","mla":"Bröring, Andre, et al. “Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie.” <i>22. VDI-Kongress AUTOMATION</i>, VDI- Verlag, 2021.","bjps":"<b>Bröring A <i>et al.</i></b> (2021) <i>Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie</i>. Berlin: VDI- Verlag.","chicago-de":"Bröring, Andre, Alexander Belyaev, Henning Trsek, Lukasz Wisniewski und Christian Diedrich. 2021. <i>Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie</i>. <i>22. VDI-Kongress AUTOMATION</i>. Berlin: VDI- Verlag.","ufg":"<b>Bröring, Andre et. al. (2021)</b>: Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie, Berlin.","havard":"A. Bröring, A. Belyaev, H. Trsek, L. Wisniewski, C. Diedrich, Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie, VDI- Verlag, Berlin, 2021.","apa":"Bröring, A., Belyaev, A., Trsek, H., Wisniewski, L., &#38; Diedrich, C. (2021). <i>Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie</i>. <i>22. VDI-Kongress AUTOMATION</i>. Berlin: VDI- Verlag.","ama":"Bröring A, Belyaev A, Trsek H, Wisniewski L, Diedrich C. <i>Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie</i>. Berlin: VDI- Verlag; 2021.","van":"Bröring A, Belyaev A, Trsek H, Wisniewski L, Diedrich C. Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie. 22. VDI-Kongress AUTOMATION. Berlin: VDI- Verlag; 2021.","ieee":"A. Bröring, A. Belyaev, H. Trsek, L. Wisniewski, and C. Diedrich, <i>Sicherer Austausch von Inhalten der Verwaltungsschale mit Distributed Ledger Technologie</i>. Berlin: VDI- Verlag, 2021."},"type":"conference_editor_article","_id":"4898","publisher":"VDI- Verlag"},{"publication_status":"published","title":"Smartwatches zur Unterstützung von Produktionsmitarbeitern.","department":[{"_id":"DEP5023"}],"language":[{"iso":"ger"}],"doi":"10.18420/muc2019-up-0324","publication":"H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235","date_created":"2020-11-27T10:22:46Z","conference":{"end_date":"2019-09-11","start_date":"2019-09-08","location":"Hamburg","name":"Mensch und Computer 2019"},"user_id":"15514","date_updated":"2023-03-15T13:49:50Z","year":2019,"abstract":[{"text":"Der steigende Automatisierungsgrad in der Produktion führt dazu, dass einzelne Mitarbeiter für eine wachsende Zahl an Maschinen verantwortlich sind. Um Informationen von Maschinen in einer verteilten Industrieumgebung zu Mitarbeitern zu bringen, setzt Phoenix Contact seit kurzer Zeit Smartwatches ein. Im Rahmen dieses Beitrags wird der Entwicklungsprozess sowie das Ergebnis der entsprechenden Smartwatch-Anwendung vorgestellt.Um eine hohe Gebrauchstauglichkeit und die Akzeptanz der neuen Technologie bei der Belegschaft zu erreichen, wurden von Beginn an Nutzer in die Entwicklung der Anwendung einbezogen. Durch Kontextanalysen, Diskussionen von Storyboards sowie die iterative Prototypen-Erstellung und -Evaluierung wurde die Interaktion zwischen Mensch und Produktionsumgebung mit Hilfe von Smartwatches optimiert.","lang":"ger"}],"page":" 228 - 235","_id":"4106","type":"conference","citation":{"short":"A. Bröring, S. Büttner, M. Heinz, C. Röcker, in: H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235, Gesellschaft für Informatik e.V., Bonn, 2019, pp. 228–235.","chicago":"Bröring, Andre, Sebastian Büttner, Mario Heinz, and Carsten Röcker. “Smartwatches zur Unterstützung von Produktionsmitarbeitern.” In <i>H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235</i>, 228–35. Bonn: Gesellschaft für Informatik e.V., 2019. <a href=\"https://doi.org/10.18420/muc2019-up-0324\">https://doi.org/10.18420/muc2019-up-0324</a>.","mla":"Bröring, Andre, et al. “Smartwatches zur Unterstützung von Produktionsmitarbeitern.” <i>H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235</i>, Gesellschaft für Informatik e.V., 2019, pp. 228–35, doi:<a href=\"https://doi.org/10.18420/muc2019-up-0324\">10.18420/muc2019-up-0324</a>.","din1505-2-1":"<span style=\"font-variant:small-caps;\">Bröring, Andre</span> ; <span style=\"font-variant:small-caps;\">Büttner, Sebastian</span> ; <span style=\"font-variant:small-caps;\">Heinz, Mario</span> ; <span style=\"font-variant:small-caps;\">Röcker, Carsten</span>: Smartwatches zur Unterstützung von Produktionsmitarbeitern. In: <i>H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235</i>. Bonn : Gesellschaft für Informatik e.V., 2019, S. 228–235","bjps":"<b>Bröring A <i>et al.</i></b> (2019) Smartwatches zur Unterstützung von Produktionsmitarbeitern. <i>H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235</i>. Bonn: Gesellschaft für Informatik e.V., pp. 228–235.","chicago-de":"Bröring, Andre, Sebastian Büttner, Mario Heinz und Carsten Röcker. 2019. Smartwatches zur Unterstützung von Produktionsmitarbeitern. In: <i>H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235</i>, 228–235. Bonn: Gesellschaft für Informatik e.V. doi:<a href=\"https://doi.org/10.18420/muc2019-up-0324,\">10.18420/muc2019-up-0324,</a> .","havard":"A. Bröring, S. Büttner, M. Heinz, C. Röcker, Smartwatches zur Unterstützung von Produktionsmitarbeitern., in: H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235, Gesellschaft für Informatik e.V., Bonn, 2019: pp. 228–235.","ufg":"<b>Bröring, Andre et. al. (2019)</b>: Smartwatches zur Unterstützung von Produktionsmitarbeitern., in: <i>H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235</i>, Bonn, S. 228–235.","ama":"Bröring A, Büttner S, Heinz M, Röcker C. Smartwatches zur Unterstützung von Produktionsmitarbeitern. In: <i>H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235</i>. Bonn: Gesellschaft für Informatik e.V.; 2019:228-235. doi:<a href=\"https://doi.org/10.18420/muc2019-up-0324\">10.18420/muc2019-up-0324</a>","apa":"Bröring, A., Büttner, S., Heinz, M., &#38; Röcker, C. (2019). Smartwatches zur Unterstützung von Produktionsmitarbeitern. In <i>H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235</i> (pp. 228–235). Bonn: Gesellschaft für Informatik e.V. <a href=\"https://doi.org/10.18420/muc2019-up-0324\">https://doi.org/10.18420/muc2019-up-0324</a>","van":"Bröring A, Büttner S, Heinz M, Röcker C. Smartwatches zur Unterstützung von Produktionsmitarbeitern. In: H Fischer, S Hess (Eds): Mensch und Computer 2019 - Usability Professionals Gesellschaft für Informatik eV Und German UPA eV, Bonn, Germany, pp 228 - 235. Bonn: Gesellschaft für Informatik e.V.; 2019. p. 228–35.","ieee":"A. Bröring, S. Büttner, M. Heinz, and C. Röcker, “Smartwatches zur Unterstützung von Produktionsmitarbeitern.,” in <i>H. Fischer, S. Hess (Eds.): Mensch und Computer 2019 - Usability Professionals. Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, Germany, pp. 228 - 235</i>, Hamburg, 2019, pp. 228–235."},"publisher":"Gesellschaft für Informatik e.V.","author":[{"last_name":"Bröring","id":"65130","full_name":"Bröring, Andre","first_name":"Andre"},{"last_name":"Büttner","full_name":"Büttner, Sebastian","id":"61868","first_name":"Sebastian"},{"first_name":"Mario","last_name":"Heinz","id":"68913","full_name":"Heinz, Mario"},{"first_name":"Carsten","full_name":"Röcker, Carsten","id":"61525","last_name":"Röcker"}],"status":"public","place":"Bonn"},{"user_id":"15514","year":2019,"date_updated":"2023-03-15T13:49:50Z","language":[{"iso":"ger"}],"date_created":"2020-11-27T10:22:51Z","main_file_link":[{"url":"https://dl.gi.de/bitstream/handle/20.500.12116/24520/muc2019-up-0324.pdf?sequence=1&isAllowed=y","open_access":"1"}],"author":[{"first_name":"Andre","full_name":"Bröring, Andre","id":"65130","last_name":"Bröring"},{"full_name":"Fast, Arno","last_name":"Fast","first_name":"Arno"},{"last_name":"Büttner","full_name":"Büttner, Sebastian","id":"61868","first_name":"Sebastian"},{"last_name":"Heinz","id":"68913","full_name":"Heinz, Mario","first_name":"Mario"},{"first_name":"Carsten","full_name":"Röcker, Carsten","id":"61525","last_name":"Röcker"}],"status":"public","place":"Bonn","abstract":[{"lang":"ger","text":"Der steigende Automatisierungsgrad in der Produktion führt dazu, dass einzelne Mitarbeiter für eine wachsende Zahl an Maschinen verantwortlich sind. Um Informationen von Maschinen in einer verteilten Industrieumgebung zu Mitarbeitern zu bringen, setzt Phoenix Contact seit kurzer Zeit Smartwatches ein. Im Rahmen dieses Beitrags wird der Entwicklungsprozess sowie das Ergebnis der entsprechenden Smartwatch-Anwendung vorgestellt. Um eine hohe Gebrauchstauglichkeit und die Akzeptanz der neuen Technologie bei der Belegschaft zu erreichen, wurden von Beginn an Nutzer in die Entwicklung der Anwendung einbezogen. Durch Kontextanalysen, Diskussionen von Storyboards sowie die iterative Prototypen-Erstellung und -Evaluierung wurde die Interaktion zwischen Mensch und Produktionsumgebung mit Hilfe von Smartwatches optimiert. "}],"_id":"4110","type":"conference","doi":"10.18420/muc2019-up-0324","publication_status":"published","title":"Smartwatches zur Unterstüzung von Produktionsmitarbeitern ","department":[{"_id":"DEP5023"}],"conference":{"name":"Mensch und Computer 2019","end_date":"2019-09-11","start_date":"2019-09-08","location":"Hamburg"},"publication":"Mensch und Computer 2019 - Usability Professionals","oa":"1","publisher":"Gesellschaft für Informatik e.V. Und German UPA e.V.","citation":{"van":"Bröring A, Fast A, Büttner S, Heinz M, Röcker C. Smartwatches zur Unterstüzung von Produktionsmitarbeitern . In: Mensch und Computer 2019 - Usability Professionals. Bonn: Gesellschaft für Informatik e.V. Und German UPA e.V.; 2019.","ieee":"A. Bröring, A. Fast, S. Büttner, M. Heinz, and C. Röcker, “Smartwatches zur Unterstüzung von Produktionsmitarbeitern ,” in <i>Mensch und Computer 2019 - Usability Professionals</i>, Hamburg, 2019.","havard":"A. Bröring, A. Fast, S. Büttner, M. Heinz, C. Röcker, Smartwatches zur Unterstüzung von Produktionsmitarbeitern , in: Mensch und Computer 2019 - Usability Professionals, Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, 2019.","ufg":"<b>Bröring, Andre et. al. (2019)</b>: Smartwatches zur Unterstüzung von Produktionsmitarbeitern , in: <i>Mensch und Computer 2019 - Usability Professionals</i>, Bonn.","ama":"Bröring A, Fast A, Büttner S, Heinz M, Röcker C. Smartwatches zur Unterstüzung von Produktionsmitarbeitern . In: <i>Mensch und Computer 2019 - Usability Professionals</i>. Bonn: Gesellschaft für Informatik e.V. Und German UPA e.V.; 2019. doi:<a href=\"https://doi.org/10.18420/muc2019-up-0324\">10.18420/muc2019-up-0324</a>","apa":"Bröring, A., Fast, A., Büttner, S., Heinz, M., &#38; Röcker, C. (2019). Smartwatches zur Unterstüzung von Produktionsmitarbeitern . In <i>Mensch und Computer 2019 - Usability Professionals</i>. Bonn: Gesellschaft für Informatik e.V. Und German UPA e.V. <a href=\"https://doi.org/10.18420/muc2019-up-0324\">https://doi.org/10.18420/muc2019-up-0324</a>","chicago-de":"Bröring, Andre, Arno Fast, Sebastian Büttner, Mario Heinz und Carsten Röcker. 2019. Smartwatches zur Unterstüzung von Produktionsmitarbeitern . In: <i>Mensch und Computer 2019 - Usability Professionals</i>. Bonn: Gesellschaft für Informatik e.V. Und German UPA e.V. doi:<a href=\"https://doi.org/10.18420/muc2019-up-0324,\">10.18420/muc2019-up-0324,</a> .","bjps":"<b>Bröring A <i>et al.</i></b> (2019) Smartwatches zur Unterstüzung von Produktionsmitarbeitern . <i>Mensch und Computer 2019 - Usability Professionals</i>. Bonn: Gesellschaft für Informatik e.V. Und German UPA e.V.","short":"A. Bröring, A. Fast, S. Büttner, M. Heinz, C. Röcker, in: Mensch und Computer 2019 - Usability Professionals, Gesellschaft für Informatik e.V. Und German UPA e.V., Bonn, 2019.","chicago":"Bröring, Andre, Arno Fast, Sebastian Büttner, Mario Heinz, and Carsten Röcker. “Smartwatches zur Unterstüzung von Produktionsmitarbeitern .” In <i>Mensch und Computer 2019 - Usability Professionals</i>. Bonn: Gesellschaft für Informatik e.V. Und German UPA e.V., 2019. <a href=\"https://doi.org/10.18420/muc2019-up-0324\">https://doi.org/10.18420/muc2019-up-0324</a>.","mla":"Bröring, Andre, et al. “Smartwatches zur Unterstüzung von Produktionsmitarbeitern .” <i>Mensch und Computer 2019 - Usability Professionals</i>, Gesellschaft für Informatik e.V. Und German UPA e.V., 2019, doi:<a href=\"https://doi.org/10.18420/muc2019-up-0324\">10.18420/muc2019-up-0324</a>.","din1505-2-1":"<span style=\"font-variant:small-caps;\">Bröring, Andre</span> ; <span style=\"font-variant:small-caps;\">Fast, Arno</span> ; <span style=\"font-variant:small-caps;\">Büttner, Sebastian</span> ; <span style=\"font-variant:small-caps;\">Heinz, Mario</span> ; <span style=\"font-variant:small-caps;\">Röcker, Carsten</span>: Smartwatches zur Unterstüzung von Produktionsmitarbeitern . In: <i>Mensch und Computer 2019 - Usability Professionals</i>. Bonn : Gesellschaft für Informatik e.V. Und German UPA e.V., 2019"}}]
