{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:20:33Z","timestamp":1740169233496,"version":"3.37.3"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3056491","type":"journal-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T05:54:22Z","timestamp":1612331662000},"page":"24288-24304","source":"Crossref","is-referenced-by-count":0,"title":["Proposal and Validation of a Standard Protection Profile for Homologation of Commercial Videoconferencing Equipment"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-7699-1280","authenticated-orcid":false,"given":"Ariane C. B.","family":"Florentino","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-1664-4866","authenticated-orcid":false,"given":"Sanderson Cesar Macado","family":"Barbalho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-3339-9735","authenticated-orcid":false,"given":"Raphael Carlos Santos","family":"Machado","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911031"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875890"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2020.9111678"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2019.8932339"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyy002"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006172"},{"year":"2011","author":"conti","key":"ref39"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-020-00050-w"},{"journal-title":"Common Criteria","year":"2013","author":"mead","key":"ref38"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/cybsec\/tyz013","article-title":"The cyber-resilience of financial institutions: Significance and applicability","volume":"5","author":"dupont","year":"2019","journal-title":"J Cybersecur"},{"journal-title":"Disciplina a Gest&#x00E3;o de Seguran&#x00E7;a da Informa&#x00E7;&#x00E3;o e Comunica&#x00E7;&#x00F5;es na Administra&#x00E7;&#x00E3;o P&#x00FA;blica Federal Direta e Indireta e d&#x00E1; Outras Provid&#x00EA;ncias Instru&#x00E7;&#x00E3;o Normativa GSI\/PR no 1 DSIC\/GSIPR","year":"2008","key":"ref79"},{"journal-title":"Tecnologia da Informa&#x00E7;&#x00E3;o - T&#x00E9;cnicas de Seguran&#x00E7;a&#x2014;Sistemas de Gest&#x00E3;o de Seguran&#x00E7;a da Informa&#x00E7;&#x00E3;o&#x2014;Requisitos NBR 27001 2006","year":"2006","key":"ref33"},{"journal-title":"Cisco Unified Communications Manager Security Target Version 1 0","year":"2015","key":"ref32"},{"journal-title":"Edital Preg&#x00E3;o Eletr&#x00F4;nico Para Registro de Pre&#x00E7;os","year":"2015","key":"ref31"},{"journal-title":"Common Criteria for Information Technology Security Evaluation Part 1 Introduction and General Model Version 3 1 Revision 5","year":"2017","key":"ref30"},{"key":"ref37","first-page":"21","article-title":"Application of common criteria to telecom services: A case study","volume":"17","author":"herrmann","year":"2001","journal-title":"Comput Secur"},{"year":"2013","author":"lisi","key":"ref36"},{"journal-title":"Disp&#x00F5;e Sobre Comunica&#x00E7;&#x00E3;o de Dados e Servi&#x00E7;os de Tecnologia da Informa&#x00E7;&#x00E3;o","first-page":"83","year":"2014","key":"ref35"},{"journal-title":"E-PING Padr&#x00F5;es de Interoperabilidade de Governo Eletr&#x00F4;nico&#x2014;Documento Refer&#x00EA;ncia","year":"2015","key":"ref34"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2016.7555262"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2016.7555280"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2016.7430108"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2016.7795822"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9629-2"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2017.7827883"},{"key":"ref27","first-page":"35","article-title":"Trustiness certification of information technology equipment","volume":"13","author":"coelho","year":"2013","journal-title":"Int J Comput Sci Netw Secur"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2017.8070423"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2018.8358670"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.05.022"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"4022","DOI":"10.35940\/ijeat.F9302.088619","article-title":"Common vulnerability scoring system for SDN environment","volume":"8","author":"deb","year":"2019","journal-title":"Int J Eng Adv Technol"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2019.8986448"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1590\/S0104-530X2013000100012"},{"journal-title":"Defesa Cibern&#x00E9;tica Not&#x00ED;cias EPEX","year":"2015","author":"padilha","key":"ref2"},{"journal-title":"Sistemas Integrados de Gest&#x00E3;o&#x2014;ERP Uma Abordagem Gerencial","year":"2011","author":"junior","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0920-5489(03)00014-X"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2008.34"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.12.007"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu101"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2005.12.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.11.007"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.ijcip.2015.02.002","article-title":"A survey of cyber security management in industrial control systems","volume":"9","author":"disso","year":"2015","journal-title":"International Journal of Critical Infrastrucutre Protection"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35515-3_4"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.12720\/jcm.8.8.490-496"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MoNeTeC.2018.8572267"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.106"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-3-642-00587-9_4","article-title":"Modeling trusted computing support in a protection profile for high assurance security kernels","volume":"5471","author":"l\u00f6hr","year":"2009","journal-title":"Trusted Computing"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00199-4_10"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77493-8_6"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898864"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1051\/epjconf\/20147700001"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.170"},{"journal-title":"Avalia&#x00E7;&#x00E3;o da Seguran&#x00E7;a de Sistemas de Informa&#x00E7;&#x00E3;o Usando uma Abordagem Multicrit&#x00E9;rio","year":"2014","author":"silva","key":"ref10"},{"key":"ref11","volume":"1","author":"ohtoshi","year":"2008","journal-title":"An&#x00E1;lise comparativa de metodologias de gest&#x00E3;o e de an&#x00E1;lise de riscos sob a &#x00F3;tica da norma ABNT NBR ISO\/IEC 27005"},{"journal-title":"Tecnologia da Informa&#x00E7;&#x00E3;o&#x2014;T&#x00E9;cnicas de Seguran&#x00E7;a&#x2014;C&#x00F3;digo de Pr&#x00E1;tica Para a Gest&#x00E3;o da Seguran&#x00E7;a da Informa&#x00E7;&#x00E3;o NBR 27002 2005","year":"2005","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4301\/S1807-17752005000200002"},{"key":"ref13","first-page":"61","article-title":"O gerenciamento estrat&#x00E9;gico da seguran&#x00E7;a da informa&#x00E7;&#x00E3;o","author":"d\u2019ornellas","year":"2009","journal-title":"Proc Simp&#x00F3;sio Brasileiro de Pesquisa Operacional-Pesquisa Operacional na Gest&#x00E3;o do Conhecimento"},{"key":"ref14","first-page":"9","article-title":"Gest&#x00E3;o de riscos de seguran&#x00E7;a da informa&#x00E7;&#x00E3;o baseada na norma ISO\/IEC 27005 usando padr&#x00F5;es de seguran&#x00E7;a","author":"fontoura","year":"2012","journal-title":"Proc Simp&#x00F3;sio de Excel&#x00EA;ncia em Gest&#x00E3;o e Tecnologia (SEGET)"},{"key":"ref15","first-page":"1","article-title":"Um modelo de sistema de gest&#x00E3;o da seguran&#x00E7;a da informa&#x00E7;&#x00E3;o baseado nas normas ABNT NBR ISO\/IEC 27001:2006, 27002:2005 e 27005:2008","volume":"15","author":"filho","year":"2013","journal-title":"Revista Telecomunica&#x00E7;&#x00F5;es"},{"key":"ref16","first-page":"22","article-title":"Uma metodologia de gest&#x00E3;o de seguran&#x00E7;a da informa&#x00E7;&#x00E3;o direcionada a riscos baseado na abordagem Seis Sigma","author":"amaral","year":"2008","journal-title":"Proc Encontro Nacional de Engenharia de Produ&#x00E7;&#x00E3;o"},{"journal-title":"Disp&#x00F5;e Sobre os Par&#x00E2;metros e Padr&#x00F5;es M&#x00ED;nimos dos Recursos Criptogr&#x00E1;ficos Baseados em Algoritmos de Estado Para Criptografia da Informa&#x00E7;&#x00E3;o Classificada no &#x00C2;mbito do Poder Executivo Federal Instru&#x00E7;&#x00E3;o Normativa GSI\/PR no 3 DSIC\/GSIPR","year":"2013","key":"ref81"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)08019-6"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(03)00413-9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.10.006"},{"journal-title":"Disp&#x00F5;e Sobre o Credenciamento de Seguran&#x00E7;a Para o Tratamento de Informa&#x00E7;&#x00E3;o Classificada em Qualquer Grau de Sigilo no &#x00C2;mbito do Poder Executivo Federal Instru&#x00E7;&#x00E3;o Normativa GSI\/PR no 2 DSIC\/GSIPR","year":"2013","key":"ref80"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"424","DOI":"10.14488\/1676-1901.v18i2.2789","article-title":"Diagn&#x00F3;stico dos processos de homologa&#x00E7;&#x00E3;o e certifica&#x00E7;&#x00E3;o de produtos de natureza cibern&#x00E9;tica: Perspectivas para a constru&#x00E7;&#x00E3;o de $\\mu{\\mathrm{ m}}$\n sistema nacional","volume":"18","author":"reis","year":"2018","journal-title":"Revista Produc&#x00E3;o Online"},{"journal-title":"CBSI&#x2014;Comunidade Brasileira de Sistemas de Informa&#x00E7;&#x00E3;o","year":"2014","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.mechatronics.2012.08.004"},{"key":"ref5","first-page":"174","author":"buur","year":"1990","journal-title":"A theoretical approach to mechatronics design"},{"journal-title":"AV-iQ","year":"2017","key":"ref8"},{"journal-title":"Modelo de Refer&#x00EA;ncia Para o Desenvolvimento de Produtos Mecatr&#x00F4;nicos Conceitos e Aplica&#x00E7;&#x00F5;es","year":"2016","author":"barbalho","key":"ref7"},{"key":"ref49","first-page":"116","article-title":"Smart metering, Common Criteria and European privacy needs","author":"bartsch","year":"2012","journal-title":"Securing Electronic Business Processes"},{"journal-title":"Network Security Essentials Applications and Standards","year":"2003","author":"stallings","key":"ref9"},{"journal-title":"Seguran&#x00E7;a de Computadores Princ&#x00ED;pios e Pr&#x00E1;ticas","year":"2014","author":"brown","key":"ref46"},{"journal-title":"Protection Profile for Voice Over IP (VoIP) Applications Version 1 3","year":"2014","key":"ref45"},{"key":"ref48","first-page":"1","article-title":"A detailed strategy for managing corporation cyber war security","volume":"2","author":"al-ahmad","year":"2013","journal-title":"International Journal of Cyber-Security and Digital Forensics (UCSDF"},{"journal-title":"Draft&#x2014;Framework for Cyber-Physical Systems Release 0 8","year":"2015","key":"ref47"},{"journal-title":"Estabelece as Diretrizes para Implementa&#x00E7;&#x00E3;o de Controles de Acesso Relativos &#x00E0; Seguran&#x00E7;a da Informa&#x00E7;&#x00E3;o e Comunica&#x00E7;&#x00F5;es nos &#x00F3;rg&#x00E3;os e entidades da Administra&#x00E7;&#x00E3;o P&#x00FA;blica Federal direta e indireta&#x2014;APF Norma Complementar 07\/IN01\/DSIC\/GSIPR DSIC\/GSIPR","year":"2010","key":"ref42"},{"journal-title":"Tecnologia da Informa&#x00E7;&#x00E3;o&#x2014;T&#x00E9;cnicas de Seguran&#x00E7;a&#x2014;Gest&#x00E3;o de Riscos de Seguran&#x00E7;a da Informa&#x00E7;&#x00E3;o NBR 27005 2008","year":"2008","key":"ref41"},{"year":"2017","author":"reis","key":"ref44"},{"journal-title":"Estabelece Diretrizes nos Contextos de Atua&#x00E7;&#x00E3;o e Adequa&#x00E7;&#x00F5;es Para Profissionais da &#x00C1;rea de Seguran&#x00E7;a da Informa&#x00E7;&#x00E3;o e Comunica&#x00E7;&#x00F5;es (SIC) nos &#x00D3;rg&#x00E3;os e Entidades da Administra&#x00E7;&#x00E3;o P&#x00FA;blica Federal (APF) Norma Complementar 17\/IN01\/DSIC\/GSIPR DSIC\/GSIPR","year":"2013","key":"ref43"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09344589.pdf?arnumber=9344589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,2]],"date-time":"2022-02-02T20:19:35Z","timestamp":1643833175000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/9344589\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":81,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/access.2021.3056491","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2021]]}}}