{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T16:36:00Z","timestamp":1775579760625,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031106835","type":"print"},{"value":"9783031106842","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-10684-2_11","type":"book-chapter","created":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:05:06Z","timestamp":1657609506000},"page":"183-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Verification and\u00a0Validation Methods for\u00a0a\u00a0Trust-by-Design Framework for\u00a0the\u00a0IoT"],"prefix":"10.1007","author":[{"given":"Davide","family":"Ferraris","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carmen","family":"Fernandez-Gago","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,7,13]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/52.28121","volume":"6","author":"AF Ackerman","year":"1989","unstructured":"Ackerman, A.F., Buchwald, L.S., Lewski, F.H.: Software inspections: an effective verification process. IEEE Softw. 6(3), 31\u201336 (1989)","journal-title":"IEEE Softw."},{"issue":"3","key":"11_CR2","first-page":"353","volume":"11","author":"A Alonso-Nogueira","year":"2017","unstructured":"Alonso-Nogueira, A., Est\u00e9vez-Fern\u00e1ndez, H., Garc\u00eda, I.: JREM: an approach for formalising models in the requirements phase with JSON and NoSQL databases. Int. J. Comput. Inf. Eng. 11(3), 353\u2013358 (2017)","journal-title":"Int. J. Comput. Inf. Eng."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Arthur, J.D., Dabney, J.B.: Applying standard independent verification and validation (IV &V) techniques within an agile framework: is there a compatibility issue? In: 2017 Annual IEEE International Systems Conference (SysCon), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/SYSCON.2017.7934770"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Arthur, J.D., Nance, R.E.: Independent verification and validation: a missing link in simulation methodology? In: Proceedings Winter Simulation Conference, pp. 230\u2013236. IEEE (1996)","DOI":"10.1145\/256562.256612"},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.comnet.2018.07.017","volume":"144","author":"A \u010colakovi\u0107","year":"2018","unstructured":"\u010colakovi\u0107, A., Had\u017eiali\u0107, M.: Internet of things (IoT): a review of enabling technologies, challenges, and open research issues. Comput. Netw. 144, 17\u201339 (2018)","journal-title":"Comput. Netw."},{"key":"11_CR6","unstructured":"Edition, F.: Ieee guide-adoption of the project management institute (pmi\u00ae) standard a guide to the project management body of knowledge (pmbok\u00ae guide) (2011)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Erickson, J.: Trust metrics. In: International Symposium on Collaborative Technologies and Systems, CTS 2009, pp. 93\u201397. IEEE (2009)","DOI":"10.1109\/CTS.2009.5067467"},{"key":"11_CR8","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/978-3-642-59412-0_35","volume-title":"Software Pioneers","author":"M Fagan","year":"2002","unstructured":"Fagan, M.: Design and code inspections to reduce errors in program development. In: Broy, M., Denert, E. (eds.) Software Pioneers, pp. 575\u2013607. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/978-3-642-59412-0_35"},{"key":"11_CR9","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ins.2017.02.039","volume":"396","author":"C Fernandez-Gago","year":"2017","unstructured":"Fernandez-Gago, C., Moyano, F., Lopez, J.: Modelling trust dynamics in the internet of things. Infor. Sci. 396, 72\u201382 (2017)","journal-title":"Infor. Sci."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Ferraris, D., Daniel, J., Fernandez-Gago, C., Lopez, J.: A segregated architecture for a trust-based network of internet of things. In: 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) (CCNC 2019). Las Vegas, USA, January 2019","DOI":"10.1109\/CCNC.2019.8651703"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Ferraris, D., Fernandez-Gago, C.: TrUStAPIS: a trust requirements elicitation method for IoT. Int. J. Inf. Securi. 19, 1\u201317 (2019)","DOI":"10.1007\/s10207-019-00438-x"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Ferraris, D., Fernandez-Gago, C., Lopez, J.: A trust by design framework for the internet of things. In: NTMS\u20192018 - Security Track (NTMS 2018 Security Track). Paris, France, February 2018","DOI":"10.1109\/NTMS.2018.8328674"},{"issue":"1","key":"11_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-020-00257-3","volume":"10","author":"D Ferraris","year":"2020","unstructured":"Ferraris, D., Fernandez-Gago, C., Lopez, J.: A model-driven approach to ensure trust in the IoT. Hum.-Cent. Comput. Inf. Sci. 10(1), 1\u201333 (2020)","journal-title":"Hum.-Cent. Comput. Inf. Sci."},{"key":"11_CR14","volume-title":"Guideline on general principles of process validation","author":"U Food","year":"1987","unstructured":"Food, U., Administration, D., et al.: Guideline on general principles of process validation. US FDA, Rockville (1987)"},{"key":"11_CR15","unstructured":"Haskins, C., Forsberg, K., Krueger, M., Walden, D., Hamelin, D.: Systems engineering handbook. In: INCOSE (2006)"},{"issue":"7","key":"11_CR16","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1139922.1139924","volume":"49","author":"LJ Hoffman","year":"2006","unstructured":"Hoffman, L.J., Lawson-Jenkins, K., Blum, J.: Trust beyond security: an expanded trust model. Commun. ACM 49(7), 94\u2013101 (2006)","journal-title":"Commun. ACM"},{"issue":"4","key":"11_CR17","first-page":"18","volume":"16","author":"P Katz","year":"2012","unstructured":"Katz, P., Campbell, C.: FDA 2011 process validation guidance: process validation revisited. J. GXP Compliance 16(4), 18 (2012)","journal-title":"J. GXP Compliance"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Linhares, M.V., de Oliveira, R.S., Farines, J.M., Vernadat, F.: Introducing the modeling and verification process in SysML. In: 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007), pp. 344\u2013351. IEEE (2007)","DOI":"10.1109\/EFTA.2007.4416788"},{"issue":"2","key":"11_CR19","doi-asserted-by":"publisher","first-page":"262","DOI":"10.3390\/iot3020015","volume":"3","author":"C Marche","year":"2022","unstructured":"Marche, C., Nitti, M.: Can we trust trust management systems? IoT 3(2), 262\u2013272 (2022)","journal-title":"IoT"},{"key":"11_CR20","doi-asserted-by":"publisher","first-page":"1775","DOI":"10.1109\/ACCESS.2021.3138768","volume":"10","author":"CK Nkuba","year":"2021","unstructured":"Nkuba, C.K., Kim, S., Dietrich, S., Lee, H.: Riding the IoT wave with VFuzz: discovering security flaws in smart homes. IEEE Access 10, 1775\u20131789 (2021)","journal-title":"IEEE Access"},{"key":"11_CR21","unstructured":"Pavlidis, M.: Designing for trust. In: CAiSE (Doctoral Consortium), pp. 3\u201314 (2011)"},{"key":"11_CR22","volume-title":"Survey of automation practices in model-driven development and operations","author":"C Ponsard","year":"2022","unstructured":"Ponsard, C., Ramon, V.: Survey of automation practices in model-driven development and operations. Tech. rep, EasyChair (2022)"},{"issue":"9","key":"11_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R Roman","year":"2011","unstructured":"Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51\u201358 (2011)","journal-title":"Computer"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXXVI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-10684-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,12]],"date-time":"2022-07-12T07:09:06Z","timestamp":1657609746000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-10684-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031106835","9783031106842"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-10684-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"13 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DBSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Annual Conference on Data and Applications Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Newark, NJ","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"36","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dbsec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cs.iit.edu\/~dbsec2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}