{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:32:52Z","timestamp":1774866772646,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030420475","type":"print"},{"value":"9783030420482","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42048-2_3","type":"book-chapter","created":{"date-parts":[[2020,2,21]],"date-time":"2020-02-21T05:18:51Z","timestamp":1582262331000},"page":"35-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Distributed UCON in CoAP and MQTT Protocols"],"prefix":"10.1007","author":[{"given":"Athanasios","family":"Rizos","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Bastos","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"issue":"4","key":"3_CR1","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutor. 17(4), 2347\u20132376 (2015). https:\/\/doi.org\/10.1109\/COMST.2015.2444095. (Fourthquarter)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Bastos, D., Shackleton, M., El-Moussa, F.: Internet of Things: a survey of technologies and security risks in smart home and city environments. In: Living in the Internet of Things: Cybersecurity of the IoT - 2018, pp. 1\u20137, March 2018. https:\/\/doi.org\/10.1049\/cp.2018.0030","DOI":"10.1049\/cp.2018.0030"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Capossele, A., Cervo, V., De Cicco, G., Petrioli, C.: Security as a CoAP resource: an optimized DTLS implementation for the IoT. In: 2015 IEEE International Conference on Communications (ICC), pp. 549\u2013554. IEEE (2015)","DOI":"10.1109\/ICC.2015.7248379"},{"issue":"C","key":"3_CR4","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/j.future.2016.04.010","volume":"63","author":"E Carniani","year":"2016","unstructured":"Carniani, E., D\u2019Arenzo, D., Lazouski, A., Martinelli, F., Mori, P.: Usage control on cloud systems. Future Gener. Comput. Syst. 63(C), 37\u201355 (2016). https:\/\/doi.org\/10.1016\/j.future.2016.04.010","journal-title":"Future Gener. Comput. Syst."},{"key":"3_CR5","unstructured":"Chen, D., Varshney, P.K.: QoS support in wireless sensor networks: a survey. In: International Conference on Wireless Networks, vol. 233, pp. 1\u20137 (2004)"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Collina, M., Corazza, G.E., Vanelli-Coralli, A.: Introducing the QEST broker: scaling the IoT by bridging MQTT and REST. In: 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 36\u201341, September 2012. https:\/\/doi.org\/10.1109\/PIMRC.2012.6362813","DOI":"10.1109\/PIMRC.2012.6362813"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Costantino, G., La Marra, A., Martinelli, F., Mori, P., Saracino, A.: Privacy preserving distributed attribute computation for usage control in the Internet of Things. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 1844\u20131851, August 2018. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00279","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00279"},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Faiella, M., Martinelli, F., Mori, P., Saracino, A., Sheikhalishahi, M.: Collaborative attribute retrieval in environment with faulty attribute managers. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 296\u2013303, August 2016. https:\/\/doi.org\/10.1109\/ARES.2016.51","DOI":"10.1109\/ARES.2016.51"},{"key":"3_CR9","unstructured":"Gerdes, S., Bergmann, O., Bormann, C., Selander, G., Seitz, L.: Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE). Internet-Draft draft-ietf-ace-dtls-authorize-07, Internet Engineering Task Force, March 2019. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-ace-dtls-authorize-07. (work in Progress)"},{"key":"3_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7","volume-title":"The Internet of Things","author":"D Giusto","year":"2010","unstructured":"Giusto, D., Iera, A., Morabito, G., Atzori, L.: The Internet of Things. Springer, New York (2010). https:\/\/doi.org\/10.1007\/978-1-4419-1674-7"},{"issue":"3","key":"3_CR11","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","volume":"17","author":"J Granjal","year":"2015","unstructured":"Granjal, J., Monteiro, E., Silva, J.S.: Security for the Internet of Things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutor. 17(3), 1294\u20131312 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Hartke, K.: Observing Resources in the Constrained Application Protocol (CoAP). RFC 7641, September 2015. https:\/\/doi.org\/10.17487\/RFC7641. https:\/\/rfc-editor.org\/rfc\/rfc7641.txt","DOI":"10.17487\/RFC7641"},{"key":"3_CR13","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.cose.2013.09.005","volume":"39","author":"G Karopoulos","year":"2013","unstructured":"Karopoulos, G., Mori, P., Martinelli, F.: Usage control in SIP-based multimedia delivery. Comput. Secur. 39, 406\u2013418 (2013). https:\/\/doi.org\/10.1016\/j.cose.2013.09.005","journal-title":"Comput. Secur."},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/978-3-319-72389-1_43","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"A La Marra","year":"2017","unstructured":"La Marra, A., Martinelli, F., Mori, P., Rizos, A., Saracino, A.: Improving MQTT by inclusion of usage control. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 545\u2013560. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-72389-1_43"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-319-72817-9_3","volume-title":"Computer Security","author":"A La Marra","year":"2018","unstructured":"La Marra, A., Martinelli, F., Mori, P., Rizos, A., Saracino, A.: Introducing usage control in MQTT. In: Katsikas, S.K., et al. (eds.) CyberICPS\/SECPRE 2017. LNCS, vol. 10683, pp. 35\u201343. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-72817-9_3"},{"issue":"2","key":"3_CR16","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.cosrev.2010.02.002","volume":"4","author":"A Lazouski","year":"2010","unstructured":"Lazouski, A., Martinelli, F., Mori, P.: Usage control in computer security: a survey. Comput. Sci. Rev. 4(2), 81\u201399 (2010). https:\/\/doi.org\/10.1016\/j.cosrev.2010.02.002","journal-title":"Comput. Sci. Rev."},{"issue":"4","key":"3_CR17","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/s10207-016-0336-y","volume":"16","author":"Aliaksandr Lazouski","year":"2016","unstructured":"Lazouski, A., Martinelli, F., Mori, P., Saracino, A.: Stateful data usage control for android mobile devices. Int. J. Inf. Secur., pp. 1\u201325 (2016). https:\/\/doi.org\/10.1007\/s10207-016-0336-y","journal-title":"International Journal of Information Security"},{"key":"3_CR18","unstructured":"Locke, D.: MQ telemetry transport (MQTT) v3. 1 protocol specification. IBM developerWorks Technical Library (2010)"},{"key":"3_CR19","doi-asserted-by":"publisher","unstructured":"Marra, A.L., Martinelli, F., Mori, P., Saracino, A.: Implementing usage control in Internet of Things: a smart home use case. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, pp. 1056\u20131063, August 2017. https:\/\/doi.org\/10.1109\/Trustcom\/BigDataSE\/ICESS.2017.352","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.352"},{"issue":"1","key":"3_CR20","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The UCONABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), 128\u2013174 (2004). https:\/\/doi.org\/10.1145\/984334.984339","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"10","key":"3_CR21","doi-asserted-by":"publisher","first-page":"3711","DOI":"10.1109\/JSEN.2013.2277656","volume":"13","author":"S Raza","year":"2013","unstructured":"Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure CoAP for the Internet of Things. IEEE Sens. J. 13(10), 3711\u20133720 (2013). https:\/\/doi.org\/10.1109\/JSEN.2013.2277656","journal-title":"IEEE Sens. J."},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Rescorla, E., Modadugu, N.: Datagram Transport Layer Security Version 1.2. RFC 6347, January 2012. https:\/\/doi.org\/10.17487\/RFC6347. https:\/\/rfc-editor.org\/rfc\/rfc6347.txt","DOI":"10.17487\/RFC6347"},{"key":"3_CR23","unstructured":"Rescorla, E., Tschofenig, H., Modadugu, N.: The Datagram Transport Layer Security (DTLS) Protocol Version 1.3. Internet-Draft draft-ietf-tls-dtls13-31, Internet Engineering Task Force, March 2019. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-tls-dtls13-31. (work in Progress)"},{"key":"3_CR24","unstructured":"INFSO D.4 Networked Enterprise and RFID INFSO G.2 Micro and Nanosystem: Internet of Things in 2020, A Roadmap for the Future (2009)"},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: The Constrained Application Protocol (CoAP). RFC 7252, June 2014. https:\/\/doi.org\/10.17487\/RFC7252. https:\/\/rfc-editor.org\/rfc\/rfc7252.txt","DOI":"10.17487\/RFC7252"},{"key":"3_CR26","doi-asserted-by":"publisher","unstructured":"Singh, M., Rajan, M.A., Shivraj, V.L., Balamuralidhar, P.: Secure MQTT for Internet of Things (IoT). In: 2015 Fifth International Conference on Communication Systems and Network Technologies, pp. 746\u2013751, April 2015. https:\/\/doi.org\/10.1109\/CSNT.2015.16","DOI":"10.1109\/CSNT.2015.16"},{"key":"3_CR27","unstructured":"Tiloca, M., Selander, G., Palombini, F., Park, J.: Group OSCORE - Secure Group Communication for CoAP. Internet-Draft draft-ietf-core-oscore-groupcomm-04, Internet Engineering Task Force, March 2019. https:\/\/datatracker.ietf.org\/doc\/html\/draft-ietf-core-oscore-groupcomm-04. (work in Progress)"},{"issue":"4","key":"3_CR28","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1108\/IJPCC-01-2014-0002","volume":"10","author":"A Ukil","year":"2014","unstructured":"Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., Bose, T.: Lightweight security scheme for IoT applications using CoAP. Int. J. Pervasive Comput. Commun. 10(4), 372\u2013392 (2014)","journal-title":"Int. J. Pervasive Comput. Commun."}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42048-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T23:02:16Z","timestamp":1740092536000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-42048-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030420475","9783030420482"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42048-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CyberICPS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cyberics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ds.unipi.gr\/cybericps2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}