{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T19:27:00Z","timestamp":1775244420445,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030503987","type":"print"},{"value":"9783030503994","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-50399-4_17","type":"book-chapter","created":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:02:37Z","timestamp":1591700557000},"page":"173-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Adaptive Architecture and Principles for Securing the IoT Systems"],"prefix":"10.1007","author":[{"given":"Asif Qumer","family":"Gill","sequence":"first","affiliation":[]},{"given":"Ghassan","family":"Beydoun","sequence":"additional","affiliation":[]},{"given":"Mahmood","family":"Niazi","sequence":"additional","affiliation":[]},{"given":"Habib Ullah","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Othman, N.A., Aydin, I.: A face recognition method in the internet of things for security applications in smart homes and cities. In: 6th International Istanbul Smart Grids and Cities Congress and Fair (ICSG) (2018)","DOI":"10.1109\/SGCF.2018.8408934"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Bashir, M.R., Gill, A.Q.: IoT enabled smart buildings: a systematic review. In: IEEE Intelligent Systems Conference (IntelliSys), pp. 151\u2013159 (2017)","DOI":"10.1109\/IntelliSys.2017.8324283"},{"key":"17_CR3","doi-asserted-by":"publisher","first-page":"3257","DOI":"10.1109\/ACCESS.2016.2580623","volume":"4","author":"A Bader","year":"2016","unstructured":"Bader, A., Ghazzai, H., Kadri, A., Alouini, M.S.: Front-end intelligence for large-scale application-oriented internet-of-things. IEEE Access 4, 3257\u20133272 (2016)","journal-title":"IEEE Access"},{"key":"17_CR4","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.is.2016.02.004","volume":"58","author":"AQ Gill","year":"2016","unstructured":"Gill, A.Q., Phennel, N., Lane, D., Phung, V.L.: IoT-enabled emergency information supply chain architecture for elderly people: the Australian context. Inf. Syst. 58, 75\u201386 (2016)","journal-title":"Inf. Syst."},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1016\/j.proeng.2017.01.237","volume":"174","author":"L Dong","year":"2017","unstructured":"Dong, L., Mingyue, R., Guoying, M.: Application of internet of things technology on predictive maintenance system of coal equipment. Procedia Eng. 174, 885\u2013889 (2017)","journal-title":"Procedia Eng."},{"key":"17_CR6","unstructured":"Gay, V., Leijdekkers, P., Gill, A. and Felix, N.K.: Le Bon Samaritain: A Community-Based Care Model Supported by Technology. Studies in health technology and informatics, (2015)"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Gill, A.Q., Behbood, V., Ramadan-Jradi, R., Beydoun, G.: IoT architectural concerns: a systematic review. In: Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing (ICC 2017), pp. 1\u20139 (2017)","DOI":"10.1145\/3018896.3025166"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Korhonen, J.J., Lapalme, J., McDavid, D., Gill, A.Q.: Adaptive enterprise architecture for the future: towards a reconceptualization of EA. In: IEEE 18th Conference on Business Informatics (CBI), pp. 272\u2013281 (2016)","DOI":"10.1109\/CBI.2016.38"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijiit.2014010101","volume":"10","author":"AQ Gill","year":"2014","unstructured":"Gill, A.Q.: Applying agility and living service systems thinking to enterprise architecture. Int. J. Intell. Inf. Technol. (IJIIT) 10, 1\u201315 (2014)","journal-title":"Int. J. Intell. Inf. Technol. (IJIIT)"},{"key":"17_CR10","unstructured":"TOGAF 9.2. The Open Group Architecture Framework (2018)"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Gill, A.Q.: Adaptive cloud enterprise architecture. World Sci. (2015)","DOI":"10.1142\/9363"},{"key":"17_CR12","unstructured":"ISO\/IEC\/IEEE 42010. Defining architecture"},{"key":"17_CR13","unstructured":"The Gill Framework. \nhttp:\/\/www.adaptinn.com\/the-gill-framework\/"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Anwar, M.J., Gill, A.Q.: A review of the seven modelling approaches for digital ecosystem architecture. In: 2019 IEEE 21st Conference on Business Informatics (CBI), Moscow, Russia, pp. 94\u2013103 (2019)","DOI":"10.1109\/CBI.2019.00018"},{"issue":"4","key":"17_CR15","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.im.2018.09.011","volume":"56","author":"AQ Gill","year":"2019","unstructured":"Gill, A.Q., Chew, E.: Configuration information system architecture: insights from applied action design research. Inf. Manage. 56(4), 507\u2013525 (2019)","journal-title":"Inf. Manage."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Madhuri, M., Gill, A.Q., Khan, H.U.: IoT-enabled smart child safety digital system architecture. In: IEEE 14th International Conference on Semantic Computing (ICSC), San Diego, CA, USA, pp. 166\u2013169 (2020)","DOI":"10.1109\/ICSC.2020.00033"},{"key":"17_CR17","unstructured":"ACSC. Securing the Internet of Things for Consumers. Draft Code of Practice (2019)"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Dasgupta, A., Gill, A.Q., Hussain, F.: Privacy of IoT-enabled smart home systems. In: Internet of Things (IoT) for Automated and Smart Applications. IntechOpen (2019)","DOI":"10.5772\/intechopen.84338"},{"key":"17_CR19","unstructured":"Gill, A.Q., Bunker, D.: Crowd sourcing challenges assessment index for disaster management. In: 18th Americas Conference on Information Systems (2012)"},{"key":"17_CR20","unstructured":"Micrrosoft. Azure IoT reference architecture (2020). \nhttps:\/\/docs.microsoft.com\/en-us\/azure\/architecture\/reference-architectures\/iot\/"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Nahar, K., Gill, A.Q.: A review towards the development of ontology based identity and access management metamodel. In: WAINA. Springer (2020)","DOI":"10.1007\/978-3-030-44038-1_21"},{"issue":"3","key":"17_CR22","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.ijinfomgt.2010.06.001","volume":"31","author":"NF Doherty","year":"2011","unstructured":"Doherty, N.F., Anastasakis, L., Fulford, H.: Reinforcing the security of corporate information resources: a critical review of the role of the acceptable use policy. Int. J. Inf. Manage. 31(3), 201\u2013209 (2011)","journal-title":"Int. J. Inf. Manage."},{"issue":"4","key":"17_CR23","first-page":"210","volume":"3","author":"IH Cha","year":"2008","unstructured":"Cha, I.H.: A study on the development of personnel security management for protection against insider threat. J. Korea Inst. Electron. Commun. Sci. 3(4), 210\u2013220 (2008)","journal-title":"J. Korea Inst. Electron. Commun. Sci."},{"issue":"3","key":"17_CR24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.ijhcs.2015.10.007","volume":"87","author":"AA Lopez-Lorca","year":"2016","unstructured":"Lopez-Lorca, A.A., Beydoun, G., Valencia-Garcia, R., Martinez-Bejar, R.: Supporting agent-oriented requirement analysis with ontologies. Int. J. Hum. Comput. Stud. 87(3), 20\u201337 (2016)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"8","key":"17_CR25","doi-asserted-by":"publisher","first-page":"9352","DOI":"10.1016\/j.eswa.2011.01.104","volume":"38","author":"G Beydoun","year":"2011","unstructured":"Beydoun, G., Low, G., Tran, N., Bogg, P.: Development of a peer-to-peer information sharing system using ontologies. Expert Syst. Appl. 38(8), 9352\u20139364 (2011)","journal-title":"Expert Syst. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50399-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,9]],"date-time":"2020-06-09T11:25:23Z","timestamp":1591701923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50399-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"ISBN":["9783030503987","9783030503994"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50399-4_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"10 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lodz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/imis\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}