{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T05:53:45Z","timestamp":1773294825436,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030123291","type":"print"},{"value":"9783030123307","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-12330-7_6","type":"book-chapter","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T22:20:47Z","timestamp":1557786047000},"page":"115-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Distributed Usage Control Framework for Industrial Internet of Things"],"prefix":"10.1007","author":[{"given":"Antonio La","family":"Marra","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,14]]},"reference":[{"issue":"2","key":"6_CR1","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/606272.606299","volume":"46","author":"H Balakrishnan","year":"2003","unstructured":"Balakrishnan H, Kaashoek MF, Karger D, Morris R, Stoica I (2003) Looking up data in P2P systems. Commun ACM 46(2):43\u201348. \n                    https:\/\/doi.org\/10.1145\/606272.606299","journal-title":"Commun ACM"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.future.2016.04.010","volume":"63","author":"E Carniani","year":"2016","unstructured":"Carniani E, D\u2019Arenzo D, Lazouski A, Martinelli F, Mori P (2016) Usage control on cloud systems. Futur Gener Comput Syst 63:37\u201355. \n                    https:\/\/doi.org\/10.1016\/j.future.2016.04.010","journal-title":"Futur Gener Comput Syst"},{"issue":"5","key":"6_CR3","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MIC.2015.108","volume":"19","author":"VG Cerf","year":"2015","unstructured":"Cerf VG (2015) Access control and the Internet of Things. IEEE Internet Comput 19(5):96\u2013c3","journal-title":"IEEE Internet Comput"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Chakeres ID, Belding-Royer EM (2004) AODV routing protocol implementation design. In: 24th International Conference on Distributed Computing Systems Workshops, Mar 2004. Proceedings, pp 698\u2013703","DOI":"10.1109\/ICDCSW.2004.1284108"},{"key":"6_CR5","unstructured":"Colombo M, Lazouski A, Martinelli F, Mori P (2009) A proposal on enhancing XACML with continuous usage control features. In: Grids, P2P and Services Computing [Proceedings of the CoreGRID ERCIM Working Group Workshop on Grids, P2P and Service Computing, 24 Aug 2009, Delft], pp 133\u2013146"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Das PK, Narayanan S, Sharma NK, Joshi A, Joshi K, Finin T (2016) Context-sensitive policy based security in Internet of Things. In: 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp 1\u20136","DOI":"10.1109\/SMARTCOMP.2016.7501684"},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Faiella M, Martinelli F, Mori P, Saracino A, Sheikhalishahi M (2016) Collaborative attribute retrieval in environment with faulty attribute managers. In: 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, 31 Aug \u2013 2 Sept 2016, pp 296\u2013303. \n                    https:\/\/doi.org\/10.1109\/ARES.2016.51","DOI":"10.1109\/ARES.2016.51"},{"issue":"1","key":"6_CR8","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1080\/00396338.2011.555586","volume":"53","author":"JP Farwell","year":"2011","unstructured":"Farwell JP, Rohozinski R (2011) Stuxnet and the future of cyber war. Survival 53(1):23\u201340. \n                    https:\/\/doi.org\/10.1080\/00396338.2011.555586","journal-title":"Survival"},{"key":"6_CR9","unstructured":"Featherston D (2010) Cassandra: principles and application. Department of Computer Science University of Illinois at Urbana-Champaign"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-28166-7_20","volume-title":"Applied Cryptography and Network Security","author":"Florian Kelbert","year":"2015","unstructured":"Kelbert F, Pretschner A (2015) A fully decentralized data usage control enforcement infrastructure. In: 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, New York, 2\u20135 June 2015, Revised Selected Papers, pp 409\u2013430"},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s10207-016-0336-y","volume":"16","author":"A Lazouski","year":"2016","unstructured":"Lazouski A, Martinelli F, Mori P, Saracino A (2016) Stateful data usage control for android mobile devices. Int J Inf Secur 16(4):345\u2013369","journal-title":"Int J Inf Secur"},{"key":"6_CR12","doi-asserted-by":"publisher","unstructured":"Marra AL, Martinelli F, Mori P, Saracino A (2017) Implementing usage control in Internet of Things: a smart home use case. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, Sydney, 1\u20134 Aug 2017, pp 1056\u20131063. \n                    https:\/\/doi.org\/10.1109\/Trustcom\/BigDataSE\/ICESS.2017.352","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.352"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Miller B, Rowe D (2012) A survey SCADA of and critical infrastructure incidents. In: Proceedings of the 1st Annual Conference on Research in Information Technology, pp 51\u201356. RIIT\u201912, ACM, New York. \n                    https:\/\/doi.org\/10.1145\/2380790.2380805","DOI":"10.1145\/2380790.2380805"},{"key":"6_CR14","unstructured":"Mordeno A, Russell B (2017) Identity and access management in the Internet of things \u2013 summary guidance. \n                    https:\/\/cloudsecurityalliance.org\/download\/identity-and-access-management-for-the-iot\/"},{"key":"6_CR15","unstructured":"OASIS: eXtensible Access Control Markup Language (XACML) version 3.0 (January 2013)"},{"issue":"1","key":"6_CR16","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park J, Sandhu R (2004) The UCON\nABC usage control model. ACM Trans Inf Syst Secur 7(1):128\u2013174","journal-title":"ACM Trans Inf Syst Secur"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Park J, Zhang X, Sandhu R (2004) Attribute mutability in usage control. In: Research Directions in Data and Applications Security XVIII, IFIP TC11\/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, pp 15\u201329","DOI":"10.1007\/1-4020-8128-6_2"},{"issue":"9","key":"6_CR18","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/1151030.1151053","volume":"49","author":"A Pretschner","year":"2006","unstructured":"Pretschner A, Hilty M, Basin D (2006) Distributed usage control. Commun ACM 49(9):39\u201344","journal-title":"Commun ACM"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed Internet of Things. Comput Netw 57(10):2266\u20132279. \n                    http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128613000054\n                    \n                  , towards a Science of Cyber SecuritySecurity and Identity Architecture for the Future Internet","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"6_CR20","unstructured":"Sitenkov D, Seitz SL, Raza S, Selander G (2014) Access control in the Internet of Things. Master\u2019s thesis"},{"issue":"4","key":"6_CR21","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/1108906.1108908","volume":"8","author":"X Zhang","year":"2005","unstructured":"Zhang X, Parisi-Presicce F, Sandhu R, Park J (2005) Formal model and policy specification of usage control. ACM Trans Inf Syst Secur 8(4):351\u2013387","journal-title":"ACM Trans Inf Syst Secur"}],"container-title":["Advanced Sciences and Technologies for Security Applications","Security and Privacy Trends in the Industrial Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-12330-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T05:32:11Z","timestamp":1563255131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-12330-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030123291","9783030123307"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-12330-7_6","relation":{},"ISSN":["1613-5113","2363-9466"],"issn-type":[{"value":"1613-5113","type":"print"},{"value":"2363-9466","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}