{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:26:47Z","timestamp":1726068407452},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030419127"},{"type":"electronic","value":"9783030419134"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41913-4_16","type":"book-chapter","created":{"date-parts":[[2020,2,15]],"date-time":"2020-02-15T00:04:50Z","timestamp":1581725090000},"page":"195-205","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Distributed Digital Object Architecture to Support Secure IoT Ecosystems"],"prefix":"10.1007","author":[{"given":"Angel","family":"Ruiz-Zafra","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Mag\u00e1n-Carri\u00f3n","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,15]]},"reference":[{"issue":"15","key":"16_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Mazhelis, O., Tyrvainen, P.: A framework for evaluating Internet-of-Things platforms: application provider viewpoint. In: 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 147\u2013152. IEEE, March 2014","DOI":"10.1109\/WF-IoT.2014.6803137"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Ray, P.P.: A survey on Internet of Things architectures. J. King Saud Univ. Comput. Inf. Sci. (2016)","DOI":"10.4108\/eai.1-12-2016.151714"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Leo, M., Battisti, F., Carli, M., Neri, A.: A federated architecture approach for Internet of Things security. In: Euro Med Telco Conference (EMTC), pp. 1\u20135. IEEE, November 2014","DOI":"10.1109\/EMTC.2014.6996632"},{"issue":"1","key":"16_CR5","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/2192-1121-1-9","volume":"1","author":"R Kranenburg Van","year":"2012","unstructured":"Van Kranenburg, R., Bassi, A.: IoT challenges. Commun. Mob. Comput. 1(1), 9 (2012)","journal-title":"Commun. Mob. Comput."},{"issue":"6","key":"16_CR6","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6), 53\u201357 (2004)","journal-title":"Commun. ACM"},{"issue":"8","key":"16_CR7","first-page":"09","volume":"26","author":"I Grant","year":"2009","unstructured":"Grant, I.: Insiders cause most IT security breaches. Comput. Wkly 26(8), 09 (2009)","journal-title":"Comput. Wkly"},{"issue":"3","key":"16_CR8","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1109\/COMST.2019.2896380","volume":"21","author":"Nadia Chaabouni","year":"2019","unstructured":"Chaabouni, N., Mosbah, M., Zemmari, A., Sauvignac, C., Faruki, P.: Network intrusion detection for IoT security based on learning techniques. IEEE Commun. Surv. Tutor. 21, 2671\u20132701 (2019)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Kothmayr, T., Schmitt, C., Hu, W., Br\u00fcnig, M., Carle, G.: A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: 2012 IEEE 37th Conference on Local Computer Networks Workshops (LCN Workshops), pp. 956\u2013963. IEEE, October 2012","DOI":"10.1109\/LCNW.2012.6424088"},{"issue":"2","key":"16_CR10","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1080\/00207160.2014.915316","volume":"93","author":"JL Hern\u00e1ndez-Ramos","year":"2016","unstructured":"Hern\u00e1ndez-Ramos, J.L., Jara, A.J., Mar\u00edn, L., Skarmeta G\u00f3mez, A.F.: DCapBAC: embedding authorization logic into smart things through ECC optimizations. Int. J. Comput. Math. 93(2), 345\u2013366 (2016)","journal-title":"Int. J. Comput. Math."},{"key":"16_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pmcj.2015.08.001","volume":"24","author":"S Kalra","year":"2015","unstructured":"Kalra, S., Sood, S.K.: Secure authentication scheme for IoT and cloud servers. Pervasive Mob. Comput. 24, 210\u2013223 (2015)","journal-title":"Pervasive Mob. Comput."},{"issue":"4","key":"16_CR12","first-page":"364","volume":"9","author":"B Zhang","year":"2011","unstructured":"Zhang, B., Ma, X.X., Qin, Z.G.: Security architecture on the trusting Internet of Things. J. Electron. Sc. Technol. 9(4), 364\u2013367 (2011)","journal-title":"J. Electron. Sc. Technol."},{"key":"16_CR13","first-page":"1586","volume":"3","author":"N Paskin","year":"2010","unstructured":"Paskin, N.: Digital object identifier (DOI\u00ae) system. Encycl. Libr.Inf. Sci. 3, 1586\u20131592 (2010)","journal-title":"Encycl. Libr.Inf. Sci."},{"issue":"6","key":"16_CR14","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/JIOT.2015.2417684","volume":"2","author":"L Catarinucci","year":"2015","unstructured":"Catarinucci, L., et al.: An IoT-aware architecture for smart healthcare systems. IEEE Internet Things J. 2(6), 515\u2013526 (2015)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"16_CR15","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","volume":"1","author":"A Zanella","year":"2014","unstructured":"Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of Things for smart cities. IEEE Internet Things J. 1(1), 22\u201332 (2014)","journal-title":"IEEE Internet Things J."},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Sun, S., Lannom, L., Boesch, B.: Handle system overview (No. RFC 3650) (2003)","DOI":"10.17487\/rfc3650"},{"key":"16_CR17","unstructured":"http:\/\/hdl.handle.net\/20.1000\/105"}],"container-title":["Communications in Computer and Information Science","Optimization and Learning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41913-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T17:19:50Z","timestamp":1665854390000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41913-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030419127","9783030419134"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41913-4_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"OLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Optimization and Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"C\u00e1diz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 February 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 February 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ola2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ola2020.sciencesconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"sciencesconf.org","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}