{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:33Z","timestamp":1740099273943,"version":"3.37.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030047702"},{"type":"electronic","value":"9783030047719"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04771-9_49","type":"book-chapter","created":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T17:02:53Z","timestamp":1544029373000},"page":"644-655","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Model-Based Communication Control for the Internet of Things"],"prefix":"10.1007","author":[{"given":"Imad","family":"Berrouyne","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Adda","sequence":"additional","affiliation":[]},{"given":"Jean-Marie","family":"Mottu","sequence":"additional","affiliation":[]},{"given":"Jean-Claude","family":"Royer","sequence":"additional","affiliation":[]},{"given":"Massimo","family":"Tisi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"key":"49_CR1","doi-asserted-by":"crossref","unstructured":"Alshehri, A., Sandhu, R.: Access control models for virtual object communication in cloud-enabled IoT. In: 2017 IEEE International Conference on Information Reuse and Integration (IRI), pp. 16\u201325. IEEE (2017)","DOI":"10.1109\/IRI.2017.60"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Basin, D., Clavel, M., Egea, M.: A decade of model-driven security, pp. 1\u201310(2011)","DOI":"10.1145\/1998441.1998443"},{"issue":"10","key":"49_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MC.2009.326","volume":"42","author":"Gordon Blair","year":"2009","unstructured":"Blair, G., Bencomo, N., France, R.B.: Models@ run. time. Computer, 42(10) (2009)","journal-title":"Computer"},{"key":"49_CR4","unstructured":"OASIS XACML Technical Committee, et al.: Extensible access control markup language (XACML) version 3.0. Oasis standard, OASIS (2013)"},{"key":"49_CR5","unstructured":"Cugini, J., Kuhn, R., Ferraiolo, D.: Role-based access control: features and motivations (1995)"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Davis, N., Humphrey, W., Redwine, S.T., Zibulski, G., McGraw, G.: Processes for producing secure software. IEEE Security & Privacy (2004)","DOI":"10.1109\/MSP.2004.21"},{"key":"49_CR7","doi-asserted-by":"crossref","unstructured":"Dietterle, D., Ryman, J., Dombrowski, K., Kraemer, R.: Mapping of high-level SDL models to efficient implementations for TinyOS. In: Euromicro Symposium on Digital System Design 2004, DSD 2004, pp. 402\u2013406. IEEE (2004)","DOI":"10.1109\/DSD.2004.1333303"},{"key":"49_CR8","unstructured":"Eclipse: Eclipse Vorto - IoT Toolset for standardized device descriptions"},{"key":"49_CR9","unstructured":"UK Egham: Gartner says 8.4 billion connected \u201cthings\u201d will be in use in 2017, up 31 percent from 2016. Gartner Inc. 7 (2017)"},{"key":"49_CR10","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.jss.2015.05.015","volume":"107","author":"AB Fadhel","year":"2015","unstructured":"Fadhel, A.B., Bianculli, D., Briand, L.: A comprehensive modeling framework for role-based access control policies. J. Syst. Softw. 107, 110\u2013126 (2015)","journal-title":"J. Syst. Softw."},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Harrand, N., Fleurey, F., Morin, B., Husa, K.E.: Thingml: a language and code generation framework for heterogeneous targets. In: Proceedings of the ACM\/IEEE 19th International Conference on Model Driven Engineering Languages and Systems, pp. 125\u2013135 (2016)","DOI":"10.1145\/2976767.2976812"},{"issue":"2","key":"49_CR12","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MC.2015.33","volume":"48","author":"VC Hu","year":"2015","unstructured":"Hu, V.C., Richard Kuhn, D., Ferraiolo, D.F.: Attribute-based access control. Computer 48(2), 85\u201388 (2015)","journal-title":"Computer"},{"issue":"7","key":"49_CR13","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Light, R.A.: Mosquitto: server and client implementation of the MQTT protocol. J. Open Source Softw. 2(13) (2017)","DOI":"10.21105\/joss.00265"},{"key":"49_CR15","doi-asserted-by":"crossref","unstructured":"Luzuriaga, J.E., Cano, J.C., Calafate, C., Manzoni, P., Perez, M., Boronat, P.: Handling mobility in IoT applications using the MQTT protocol. In: Internet Technologies and Applications (ITA), 2015. IEEE (2015)","DOI":"10.1109\/ITechA.2015.7317403"},{"key":"49_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-41533-3_4","volume-title":"Model-Driven Engineering Languages and Systems","author":"S Mart\u00ednez","year":"2013","unstructured":"Mart\u00ednez, S., Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Cabot, J.: Model-driven extraction and analysis of network security policies. In: Moreira, A., Sch\u00e4tz, B., Gray, J., Vallecillo, A., Clarke, P. (eds.) MODELS 2013. LNCS, vol. 8107, pp. 52\u201368. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41533-3_4"},{"key":"49_CR17","doi-asserted-by":"crossref","unstructured":"Mavropoulos, O., Mouratidis, H., Fish, A., Panaousis, E.: Asto: a tool for security analysis of IoT systems. In: 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 395\u2013400. IEEE (2017)","DOI":"10.1109\/SERA.2017.7965757"},{"issue":"1","key":"49_CR18","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MS.2017.11","volume":"34","author":"B Morin","year":"2017","unstructured":"Morin, B., Harrand, N., Fleurey, F.: Model-based software engineering to tame the IoT jungle. IEEE Softw. 34(1), 30\u201336 (2017)","journal-title":"IEEE Softw."},{"key":"49_CR19","unstructured":"Mukerji, J., Miller, J.: MDA Guide. Object Management Group (2003)"},{"key":"49_CR20","unstructured":"Pescatore, J., Shpantzer, G.: Securing the internet of things survey. SANS Institute, pp. 1\u201322 (2014)"},{"issue":"2","key":"49_CR21","doi-asserted-by":"publisher","first-page":"57","DOI":"10.4304\/jnw.2.2.57-67","volume":"2","author":"LIW Pesonen","year":"2007","unstructured":"Pesonen, L.I.W., Eyers, D.M., Bacon, J.: Access control in decentralised publish\/subscribe systems. JNW 2(2), 57\u201367 (2007)","journal-title":"JNW"},{"key":"49_CR22","unstructured":"Rathfelder, C., Taspolatoglu, E.: SensIDL: towards a generic framework for implementing sensor communication interfaces (2015)"},{"key":"49_CR23","doi-asserted-by":"crossref","unstructured":"Seralathan, Y., et al.: Iot security vulnerability: a case study of a web camera. In: 2018 20th International Conference on Advanced Communication Technology (ICACT), pp. 172\u2013177. IEEE (2018)","DOI":"10.23919\/ICACT.2018.8323686"},{"key":"49_CR24","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1007\/978-0-387-09751-0_49","volume-title":"Handbook of Peer-to-Peer Networking","author":"H Shen","year":"2010","unstructured":"Shen, H.: Content-based publish\/subscribe systems. In: Shen, X., Yu, H., Buford, J., Akon, M. (eds.) Handbook of Peer-to-Peer Networking, pp. 1333\u20131366. Springer, Boston (2010). https:\/\/doi.org\/10.1007\/978-0-387-09751-0_49"},{"key":"49_CR25","unstructured":"Trend Micro: TrendLabs Security Intelligence BlogPersirai: New Internet of Things (IoT) Botnet Targets IP Cameras - TrendLabs Security Intelligence Blog (2017)"},{"key":"49_CR26","doi-asserted-by":"crossref","unstructured":"Vasilevskiy, A., Morin, B., Haugen, \u00d8., Evensen, P.: Agile development of home automation system with thingml. In: 2016 IEEE 14th International Conference on Industrial Informatics (INDIN). IEEE (2016)","DOI":"10.1109\/INDIN.2016.7819183"},{"key":"49_CR27","unstructured":"Woolf, N.: DDoS attack that disrupted internet was largest of its kind in history, experts say. The Guardian, 26 (2016)"}],"container-title":["Lecture Notes in Computer Science","Software Technologies: Applications and Foundations"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04771-9_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T15:53:28Z","timestamp":1573055608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04771-9_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030047702","9783030047719"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04771-9_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"STAF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Federation of International Conferences on Software Technologies: Applications and Foundations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"staf2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.staf2018.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}