{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:25:14Z","timestamp":1743009914178,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030523053"},{"type":"electronic","value":"9783030523060"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52306-0_6","type":"book-chapter","created":{"date-parts":[[2020,7,6]],"date-time":"2020-07-06T09:03:55Z","timestamp":1594026235000},"page":"84-102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Design Optimization of IoT Models: Structured Safety and Security Flaw Identification"],"prefix":"10.1007","author":[{"given":"Julia","family":"Rauscher","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Bauer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,7]]},"reference":[{"key":"6_CR1","unstructured":"S. R. Department, Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (2020). https:\/\/bit.ly\/38TUYgO . Accessed 25 Feb 2020"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Gang, G., Zeyong, L.U.: Internet of Things Security Analysis (2011)","DOI":"10.1109\/ITAP.2011.6006307"},{"key":"6_CR3","volume-title":"Building Secure Software: How to Avoid Security Problems the Right Way","author":"J Viega","year":"2011","unstructured":"Viega, J., McGraw, G.: Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley Professional, Massachusetts (2011)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Rauscher, R., Bauer, B.: Safety and security architecture analyses framework for the internet of things of medical devices. In: 2018 IEEE 20th International Conference e-Health Networking, Applications and Services (Healthcom), pp. 3\u20135 (2018)","DOI":"10.1109\/HealthCom.2018.8531121"},{"key":"6_CR5","unstructured":"RAPID7, HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities (2015). https:\/\/bit.ly\/1JC9jfS . Accessed 24 Feb 2020"},{"key":"6_CR6","unstructured":"FDA: Cybersecurity Vulnerabilities Identified in St. Jude Medical\u2019s Implantable Cardiac Devices and Merlin@home Transmitter: FDA Safety Communication (2017). https:\/\/bit.ly\/2qqkgiA . Accessed 18 Feb 2020"},{"issue":"3","key":"6_CR7","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1002\/smr.521","volume":"23","author":"M Zhang","year":"2011","unstructured":"Zhang, M., Hall, T., Baddoo, N.: Code bad smells: a review of current knowledge. J. Softw. Maint. Evol. Res. Pract. 23(3), 179\u2013202 (2011)","journal-title":"J. Softw. Maint. Evol. Res. Pract."},{"issue":"12","key":"6_CR8","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1002\/smr.1656","volume":"26","author":"M Zanoni","year":"2014","unstructured":"Zanoni, M., Perin, F., Fontana, F.A., Viscusi, G.: Pattern detection for conceptual schema recovery in data-intensive systems. J. Softw. Evol. Process 26(12), 1172\u20131192 (2014)","journal-title":"J. Softw. Evol. Process"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Wortman, P.A., Tehranipoor, F., Karimian, N., Chandy, J.A.: Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain, pp. 185\u2013188 (2017)","DOI":"10.1109\/BHI.2017.7897236"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Lee, WT., Law, P.J.: A case study in applying security design patterns for IoT software system, p. 978\u20131 (2017)","DOI":"10.1109\/ICASI.2017.7988402"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Rauscher, J., Bauer, B., Langermeier, M.: Characteristics of enterprise architecture analyses. In: Proceedings Sixth International Symposium Business Model. Software Descriptions, pp. 104\u2013113 (2016)","DOI":"10.5220\/0006222701040113"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Sommestad, T., Ekstedt, M., Johnson, P.: Combining defense graphs and enterprise architecture models for security analysis. In: Conference of EDOC 2008, pp. 349\u2013355 (2008)","DOI":"10.1109\/EDOC.2008.37"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Ekstedt, M., Sommestad, T.: Enterprise architecture models for cyber security analysis. In: 2009 IEEE\/PES Power System Conference Exposition, pp. 1\u20136 (2009)","DOI":"10.1109\/PSCE.2009.4840267"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Johnson, P., Lagerstr\u00f6m, R., N\u00e4rman, P., Simonsson, M.: Extended influence diagrams for enterprise architecture analysis. In: EDOC, pp. 3\u201312 (2006)","DOI":"10.1109\/EDOC.2006.27"},{"key":"6_CR15","unstructured":"EMF, Eclipse EMF (2020). https:\/\/bit.ly\/3bUNnjU . Accessed 24 Feb 2020"},{"key":"6_CR16","volume-title":"Eclipse Modeling Project: A Domain-Specific Language (DSL) Toolkit","author":"R Gronback","year":"2009","unstructured":"Gronback, R.: Eclipse Modeling Project: A Domain-Specific Language (DSL) Toolkit. Pearson Education, London (2009)"},{"key":"6_CR17","unstructured":"Xtend\/Xtext, Xtend\/Xtext (2020). https:\/\/bit.ly\/2HQcaIc . Accessed 30 Jan 2020"},{"key":"6_CR18","unstructured":"Carrez, F.: Internet of Things \u2013 Architecture IoT-A Deliverable D1.5-Final architectural reference model for the IoT v3 no. 257521 (2013)"},{"key":"6_CR19","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-030-24854-3_4","volume-title":"Business modeling and software design","author":"P Lohm\u00fcller","year":"2019","unstructured":"Lohm\u00fcller, P., Rauscher, J., Bauer, B.: Failure and Change Impact Analysis for Safety-Critical Systems. In: Shishkov, B. (ed.) BMSD 2019. LNBIP, vol. 356, pp. 47\u201363. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24854-3_4"},{"key":"6_CR20","unstructured":"Microsoft, Microsoft STRIDE (2007). https:\/\/bit.ly\/37SKuwE . Accessed 17 Feb 2020"},{"key":"6_CR21","unstructured":"Covington, M.J., Carskadden, R.: Threat implications of the Internet of Things. In: International Conference Cyber Conflict, CYCON, pp. 1\u201312 (2013)"},{"issue":"04","key":"6_CR22","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1142\/S021853930100058X","volume":"08","author":"DR Wallace","year":"2001","unstructured":"Wallace, D.R., Kuhn, R.D.: Failure modes in medical device software: an analysis of 15 years of recall data. Int. J. Reliab. Qual. Saf. Eng. 08(04), 351\u2013371 (2001)","journal-title":"Int. J. Reliab. Qual. Saf. Eng."},{"key":"6_CR23","unstructured":"Department of Defense USA.: Department of Defense Standard Practice System Safety Amsc. Mctechsystems.Com, pp. 1\u201398 (2012)"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"IEC.: Standard 62304, Medical device software\u2014Software life cycle processes (2006)","DOI":"10.1049\/ic:20060141"},{"key":"6_CR25","unstructured":"Microsoft.: Microsoft Azure IoT Reference Architecture, pp. 1\u201361 (2018)"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Dohr, A., et al.: The internet of things for ambient assisted living. In: 2010 Seventh International Conference on Information Technology: New Generations. IEEE (2010)","DOI":"10.1109\/ITNG.2010.104"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Pires, G., et al.: VITASENIOR-MT: A telehealth solution for the elderly focused on the interaction with TV. In: 2018 IEEE 20th Healthcom. IEEE (2018)","DOI":"10.1109\/HealthCom.2018.8531126"}],"container-title":["Lecture Notes in Business Information Processing","Business Modeling and Software Design"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52306-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T09:09:12Z","timestamp":1723194552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52306-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030523053","9783030523060"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52306-0_6","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"7 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BMSD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Business Modeling and Software Design","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Berlin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bmsd2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.is-bmsd.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}