{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:14:38Z","timestamp":1758845678968},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322571"},{"type":"electronic","value":"9783030322588"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-32258-8_3","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T05:31:35Z","timestamp":1569907895000},"page":"23-34","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["CAAVI-RICS Model for Analyzing the Security of Fog Computing Systems"],"prefix":"10.1007","author":[{"given":"Sa\u0161a","family":"Pe\u0161i\u0107","sequence":"first","affiliation":[]},{"given":"Milo\u0161","family":"Radovanovi\u0107","sequence":"additional","affiliation":[]},{"given":"Mirjana","family":"Ivanovi\u0107","sequence":"additional","affiliation":[]},{"given":"Costin","family":"Badica","sequence":"additional","affiliation":[]},{"given":"Milenko","family":"To\u0161i\u0107","sequence":"additional","affiliation":[]},{"given":"Ognjen","family":"Ikovi\u0107","sequence":"additional","affiliation":[]},{"given":"Dragan","family":"Bo\u0161kovi\u0107","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ahmed, S., Tepe, K.: Misbehaviour detection in vehicular networks using logistic trust. In: 2016 IEEE Wireless Communications and Networking Conference, pp. 1\u20136. IEEE (2016)","key":"3_CR1","DOI":"10.1109\/WCNC.2016.7564966"},{"doi-asserted-by":"crossref","unstructured":"Babar, S., Mahalle, P., Stango, A., Prasad, N., Prasad, R.: Proposed security model and threat taxonomy for the Internet of Things (IoT). In: International Conference on Network Security and Applications, pp. 420\u2013429. Springer (2010)","key":"3_CR2","DOI":"10.1007\/978-3-642-14478-3_42"},{"unstructured":"Bao, F., Chen, R.: Trust management for the Internet of Things and its application to service composition. In: 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20136. IEEE (2012)","key":"3_CR3"},{"unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 164\u2013173. IEEE (1996)","key":"3_CR4"},{"issue":"6","key":"3_CR5","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599\u2013616 (2009)","journal-title":"Future Gener. Comput. Syst."},{"issue":"6","key":"3_CR6","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1109\/JIOT.2016.2584538","volume":"3","author":"M Chiang","year":"2016","unstructured":"Chiang, M., Zhang, T.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3(6), 854\u2013864 (2016)","journal-title":"IEEE Internet Things J."},{"key":"3_CR7","doi-asserted-by":"publisher","first-page":"1162","DOI":"10.1016\/j.asoc.2016.09.014","volume":"49","author":"M Chiappetta","year":"2016","unstructured":"Chiappetta, M., Savas, E., Yilmaz, C.: Real time detection of cache-based side-channel attacks using hardware performance counters. Appl. Soft Comput. 49, 1162\u20131174 (2016)","journal-title":"Appl. Soft Comput."},{"issue":"4","key":"3_CR8","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","volume":"13","author":"JH Cho","year":"2011","unstructured":"Cho, J.H., Swami, A., Chen, R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials 13(4), 562\u2013583 (2011)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"197","DOI":"10.3390\/a6020197","volume":"6","author":"S Cirani","year":"2013","unstructured":"Cirani, S., Ferrari, G., Veltri, L.: Enforcing security mechanisms in the IP-based Internet of Things: an algorithmic overview. Algorithms 6(2), 197\u2013226 (2013)","journal-title":"Algorithms"},{"doi-asserted-by":"crossref","unstructured":"Dillon, T., Wu, C., Chang, E.: Cloud computing: issues and challenges. In: 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp. 27\u201333. IEEE (2010)","key":"3_CR10","DOI":"10.1109\/AINA.2010.187"},{"issue":"3","key":"3_CR11","first-page":"15","volume":"4","author":"S Ganeriwal","year":"2008","unstructured":"Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. (TOSN) 4(3), 15 (2008)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2016.10.012","volume":"97","author":"J Guo","year":"2017","unstructured":"Guo, J., Chen, R., Tsai, J.J.: A survey of trust computation models for service management in Internet of Things systems. Comput. Commun. 97, 1\u201314 (2017)","journal-title":"Comput. Commun."},{"unstructured":"Haldar, V., Chandra, D., Franz, M.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: USENIX Virtual Machine Research and Technology Symposium, vol. 2004 (2004)","key":"3_CR13"},{"doi-asserted-by":"crossref","unstructured":"J\u00f8sang, A., Keser, C., Dimitrakos, T.: Can we manage trust? In: International Conference on Trust Management, pp. 93\u2013107. Springer (2005)","key":"3_CR14","DOI":"10.1007\/11429760_7"},{"doi-asserted-by":"crossref","unstructured":"Jyothi, V., Wang, X., Addepalli, S.K., Karri, R.: Brain: behavior based adaptive intrusion detection in networks: using hardware performance counters to detect DDoS attacks. In: 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), pp. 587\u2013588. IEEE (2016)","key":"3_CR15","DOI":"10.1109\/VLSID.2016.115"},{"issue":"1","key":"3_CR16","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s13677-017-0090-3","volume":"6","author":"S Khan","year":"2017","unstructured":"Khan, S., Parkinson, S., Qin, Y.: Fog computing security: a review of current applications and security solutions. J. Cloud Comput. 6(1), 19 (2017)","journal-title":"J. Cloud Comput."},{"key":"3_CR17","volume-title":"Cloud Security: A Comprehensive Guide to Secure Cloud Computing","author":"RL Krutz","year":"2010","unstructured":"Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Wiley, Indianapolis (2010)"},{"doi-asserted-by":"crossref","unstructured":"Kumar, P., Zaidi, N., Choudhury, T.: Fog computing: common security issues and proposed countermeasures. In: 2016 International Conference System Modeling and Advancement in Research Trends (SMART), pp. 311\u2013315. IEEE (2016)","key":"3_CR18","DOI":"10.1109\/SYSMART.2016.7894541"},{"doi-asserted-by":"crossref","unstructured":"Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of Things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336\u2013341. IEEE (2015)","key":"3_CR19","DOI":"10.1109\/ICITST.2015.7412116"},{"doi-asserted-by":"crossref","unstructured":"Moore, T., Raya, M., Clulow, J., Papadimitratos, P., Anderson, R., Hubaux, J.P.: Fast exclusion of errant devices from vehicular networks. In: 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 135\u2013143. IEEE (2008)","key":"3_CR20","DOI":"10.1109\/SAHCN.2008.26"},{"issue":"3","key":"3_CR21","doi-asserted-by":"publisher","first-page":"648","DOI":"10.3923\/itj.2011.648.655","volume":"10","author":"Z Muda","year":"2011","unstructured":"Muda, Z., Yassin, W., Sulaiman, M., Udzir, N.I., et al.: A k-means and Naive Bayes learning approach for better intrusion detection. Inform. Technol. J. 10(3), 648\u2013655 (2011)","journal-title":"Inform. Technol. J."},{"doi-asserted-by":"crossref","unstructured":"Nitti, M., Girau, R., Atzori, L., Iera, A., Morabito, G.: A subjective model for trustworthiness evaluation in the social Internet of Things. In: 2012 23rd International Symposium on Personal, Indoor and Mobile Radio Communications-(PIMRC), pp. 18\u201323. IEEE (2012)","key":"3_CR22","DOI":"10.1109\/PIMRC.2012.6362662"},{"doi-asserted-by":"crossref","unstructured":"Razouk, W., Sgandurra, D., Sakurai, K.: A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. In: Proceedings of the 1st International Conference on Internet of Things and Machine Learning, p. 35. ACM (2017)","key":"3_CR23","DOI":"10.1145\/3109761.3158413"},{"doi-asserted-by":"crossref","unstructured":"Rosenfeld, K., Gavas, E., Karri, R.: Sensor physical unclonable functions. In: 2010 IEEE International Symposium on Hardware-oriented Security and Trust (HOST), pp. 112\u2013117. IEEE (2010)","key":"3_CR24","DOI":"10.1109\/HST.2010.5513103"},{"unstructured":"Sadeghi, A.R., Schulz, S., Wachsmann, C.: Short paper: lightweight remote attestation using physical functions. In: WiSec 2011 (2011)","key":"3_CR25"},{"key":"3_CR26","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Stojmenovic, I., Wen, S.: The fog computing paradigm: scenarios and security issues. In: 2014 Federated Conference on Computer Science and Information Systems, pp. 1\u20138. IEEE (2014)","key":"3_CR27","DOI":"10.15439\/2014F503"},{"issue":"2","key":"3_CR28","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MCOM.2008.4473092","volume":"46","author":"Y Sun","year":"2008","unstructured":"Sun, Y., Han, Z., Liu, K.R.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(2), 112\u2013119 (2008)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"3_CR29","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TCAD.2015.2474374","volume":"35","author":"X Wang","year":"2016","unstructured":"Wang, X., Karri, R.: Reusing hardware performance counters to detect and identify kernel control-flow modifying rootkits. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 35(3), 485\u2013498 (2016)","journal-title":"IEEE Trans. Comput. Aided Des. Integr. Circuits Syst."},{"doi-asserted-by":"crossref","unstructured":"Wang, X., Konstantinou, C., Maniatakos, M., Karri, R.: Confirm: detecting firmware modifications in embedded systems using hardware performance counters. In: Proceedings of the IEEE\/ACM International Conference on Computer-Aided Design, pp. 544\u2013551. IEEE Press (2015)","key":"3_CR30","DOI":"10.1109\/ICCAD.2015.7372617"},{"doi-asserted-by":"crossref","unstructured":"Yi, S., Qin, Z., Li, Q.: Security and privacy issues of fog computing: a survey. In: International Conference on Wireless Algorithms, Systems, and Applications, pp. 685\u2013695. Springer (2015)","key":"3_CR31","DOI":"10.1007\/978-3-319-21837-3_67"},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"23626","DOI":"10.1109\/ACCESS.2018.2831898","volume":"6","author":"J Yuan","year":"2018","unstructured":"Yuan, J., Li, X.: A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6, 23626\u201323638 (2018)","journal-title":"IEEE Access"}],"container-title":["Studies in Computational Intelligence","Intelligent Distributed Computing XIII"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32258-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T05:32:07Z","timestamp":1569907927000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32258-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030322571","9783030322588"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32258-8_3","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IDC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent and Distributed Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"idc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/idc2019.ru\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}