{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T16:24:58Z","timestamp":1764433498121,"version":"3.40.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031254666"},{"type":"electronic","value":"9783031254673"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25467-3_1","type":"book-chapter","created":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T06:05:12Z","timestamp":1675058712000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Ontology-Based Approach for\u00a0Setting Security Policies in\u00a0Smart Homes"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Monge Roffarello","sequence":"first","affiliation":[]},{"given":"Luigi","family":"De Russis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,31]]},"reference":[{"key":"1_CR1","unstructured":"FOAF vocabulary specification (2004). http:\/\/xmlns.com\/foaf\/0.1\/. Accessed 07 Nov 2022"},{"key":"1_CR2","unstructured":"IFTTT (2019). https:\/\/ifttt.com\/. Accessed 20 Nov 2019"},{"key":"1_CR3","unstructured":"Microsoft flow (2019). https:\/\/flow.microsoft.com\/en-us\/. Accessed 20 Nov 2019"},{"key":"1_CR4","unstructured":"Smartrules (2019). http:\/\/smartrulesapp.com\/. Accessed 20 Nov 2019"},{"key":"1_CR5","unstructured":"Webthings gateway (2019). https:\/\/iot.mozilla.org\/gateway\/. Accessed 20 Nov 2019"},{"key":"1_CR6","unstructured":"Zapier (2019). https:\/\/zapier.com\/. Accessed 20 Nov 2019"},{"key":"1_CR7","unstructured":"Oasis extensible access control markup language (XACML) TC (2020). https:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml. Accessed 07 Nov 2022"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Augusto, J.C., Hornos, M.J.: Software simulation and verification to increase the reliability of intelligent environments. Adv. Eng. Softw. 58(Suppl. C), 18\u201334 (2013). https:\/\/doi.org\/10.1016\/j.advengsoft.2012.12.004","DOI":"10.1016\/j.advengsoft.2012.12.004"},{"issue":"1","key":"1_CR9","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.tcs.2003.09.003","volume":"311","author":"J Bailey","year":"2004","unstructured":"Bailey, J., Dong, G., Ramamohanarao, K.: On the decidability of the termination problem of active database systems. Theoret. Comput. Sci. 311(1), 389\u2013437 (2004). https:\/\/doi.org\/10.1016\/j.tcs.2003.09.003","journal-title":"Theoret. Comput. Sci."},{"key":"1_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-319-18425-8_2","volume-title":"End-User Development","author":"BR Barricelli","year":"2015","unstructured":"Barricelli, B.R., Valtolina, S.: Designing for end-user development in the internet of things. In: D\u00edaz, P., Pipek, V., Ardito, C., Jensen, C., Aedo, I., Boden, A. (eds.) IS-EUD 2015. LNCS, vol. 9083, pp. 9\u201324. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18425-8_2"},{"key":"1_CR11","doi-asserted-by":"publisher","unstructured":"Brackenbury, W., et al.: How users interpret bugs in trigger-action programming. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, pp. 552:1\u2013552:12. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3290605.3300782","DOI":"10.1145\/3290605.3300782"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Brich, J., Walch, M., Rietzler, M., Weber, M., Schaub, F.: Exploring end user programming needs in home automation. ACM Trans. Comput.-Hum. Interact. 24(2), 11:1\u201311:35 (2017). https:\/\/doi.org\/10.1145\/3057858","DOI":"10.1145\/3057858"},{"key":"1_CR13","doi-asserted-by":"publisher","unstructured":"Brush, A.B., Lee, B., Mahajan, R., Agarwal, S., Saroiu, S., Dixon, C.: Home automation in the wild: challenges and opportunities. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, pp. 2115\u20132124. ACM, New York (2011). https:\/\/doi.org\/10.1145\/1978942.1979249","DOI":"10.1145\/1978942.1979249"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.jss.2018.06.035","volume":"144","author":"D Caivano","year":"2018","unstructured":"Caivano, D., Fogli, D., Lanzilotti, R., Piccinno, A., Cassano, F.: Supporting end users to control their smart home: design implications from a literature review and an empirical investigation. J. Syst. Softw. 144, 295\u2013313 (2018). https:\/\/doi.org\/10.1016\/j.jss.2018.06.035","journal-title":"J. Syst. Softw."},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-662-43376-8_3","volume-title":"Coordination Models and Languages","author":"J Cano","year":"2014","unstructured":"Cano, J., Delaval, G., Rutten, E.: Coordination of ECA rules by verification and control. In: K\u00fchn, E., Pugliese, R. (eds.) COORDINATION 2014. LNCS, vol. 8459, pp. 33\u201348. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-43376-8_3"},{"issue":"2","key":"1_CR16","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2016.51","volume":"49","author":"V Cerf","year":"2016","unstructured":"Cerf, V., Senges, M.: Taking the internet to the next physical level. IEEE Comput. 49(2), 80\u201386 (2016). https:\/\/doi.org\/10.1109\/MC.2016.51","journal-title":"IEEE Comput."},{"issue":"11","key":"1_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MC.2017.4041355","volume":"50","author":"F Corno","year":"2017","unstructured":"Corno, F., De Russis, L., Monge Roffarello, A.: A semantic web approach to simplifying trigger-action programming in the IoT. Computer 50(11), 18\u201324 (2017). https:\/\/doi.org\/10.1109\/MC.2017.4041355","journal-title":"Computer"},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Corno, F., De Russis, L., Monge Roffarello, A.: Empowering end users in debugging trigger-action rules. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, pp. 1\u201313. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3290605.3300618","DOI":"10.1145\/3290605.3300618"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Corno, F., De Russis, L., Monge Roffarello, A.: A high-level semantic approach to end-user development in the internet of things. Int. J. Hum.-Comput. Stud. 125(C), 41\u201354 (2019). https:\/\/doi.org\/10.1016\/j.ijhcs.2018.12.008","DOI":"10.1016\/j.ijhcs.2018.12.008"},{"key":"1_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55049-2","volume-title":"Mashups: Concepts, Models and Architectures","author":"F Daniel","year":"2014","unstructured":"Daniel, F., Matera, M.: Mashups: Concepts, Models and Architectures. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55049-2"},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Desolda, G., Ardito, C., Matera, M.: Empowering end users to customize their smart environments: model, composition paradigms, and domain-specific tools. ACM Trans. Comput.-Hum. Interact. 24(2), 12:1\u201312:52 (2017). https:\/\/doi.org\/10.1145\/3057859","DOI":"10.1145\/3057859"},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/11748625_16","volume-title":"Pervasive Computing","author":"AK Dey","year":"2006","unstructured":"Dey, A.K., Sohn, T., Streng, S., Kodama, J.: iCAP: interactive prototyping of context-aware applications. In: Fishkin, K.P., Schiele, B., Nixon, P., Quigley, A. (eds.) Pervasive 2006. LNCS, vol. 3968, pp. 254\u2013271. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11748625_16"},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Gatziu, S., Dittrich, K.R.: Detecting composite events in active database systems using petri nets. In: Proceedings of IEEE International Workshop on Research Issues in Data Engineering: Active Databases Systems, pp. 2\u20139 (1994). https:\/\/doi.org\/10.1109\/RIDE.1994.282859","DOI":"10.1109\/RIDE.1994.282859"},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Huang, J., Cakmak, M.: Supporting mental model accuracy in trigger-action programming. In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, UbiComp 2015, pp. 215\u2013225. ACM, New York (2015). https:\/\/doi.org\/10.1145\/2750858.2805830","DOI":"10.1145\/2750858.2805830"},{"key":"1_CR25","unstructured":"Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use, vol. 2. Springer, London (1995)"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-662-45730-6_6","volume-title":"Transactions on Petri Nets and Other Models of Concurrency IX","author":"X Jin","year":"2014","unstructured":"Jin, X., Lembachar, Y., Ciardo, G.: Symbolic termination and confluence checking for ECA rules. In: Koutny, M., Haddad, S., Yakovlev, A. (eds.) Transactions on Petri Nets and Other Models of Concurrency IX. LNCS, vol. 8910, pp. 99\u2013123. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45730-6_6"},{"key":"1_CR27","doi-asserted-by":"publisher","unstructured":"Li, X., Medina, J.M., Chapa, S.V.: Applying petri nets in active database systems. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 37(4), 482\u2013493 (2007). https:\/\/doi.org\/10.1109\/TSMCC.2007.897329","DOI":"10.1109\/TSMCC.2007.897329"},{"key":"1_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/1-4020-5386-X_1","volume-title":"End User Development","author":"H Lieberman","year":"2006","unstructured":"Lieberman, H., Patern\u00f2, F., Klann, M., Wulf, V.: End-user development: an emerging paradigm. In: Lieberman, H., Patern\u00f3, F., Wulf, V. (eds.) End User Development, pp. 1\u20138. Springer, Dordrecht (2006). https:\/\/doi.org\/10.1007\/1-4020-5386-X_1"},{"key":"1_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/978-3-642-17226-7_15","volume-title":"From Active Data Management to Event-Based Systems and More","author":"F Mattern","year":"2010","unstructured":"Mattern, F., Floerkemeier, C.: From the internet of computers to the internet of things. In: Sachs, K., Petrov, I., Guerrero, P. (eds.) From Active Data Management to Event-Based Systems and More. LNCS, vol. 6462, pp. 242\u2013259. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17226-7_15"},{"key":"1_CR30","doi-asserted-by":"publisher","unstructured":"Mi, X., Qian, F., Zhang, Y., Wang, X.: An empirical characterization of IFTTT: ecosystem, usage, and performance. In: Proceedings of the 2017 Internet Measurement Conference, IMC 2017, pp. 398\u2013404. ACM, New York (2017). https:\/\/doi.org\/10.1145\/3131365.3131369","DOI":"10.1145\/3131365.3131369"},{"key":"1_CR31","unstructured":"Munjin, D.: User empowerment in the internet of things. Ph.D. thesis, Universit\u00e9 de Gen\u00e8ve (2013). http:\/\/archive-ouverte.unige.ch\/unige:28951"},{"issue":"10","key":"1_CR32","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TSE.2016.2532873","volume":"42","author":"A Namoun","year":"2016","unstructured":"Namoun, A., Daskalopoulou, A., Mehandjiev, N., Xun, Z.: Exploring mobile end user development: existing use and design factors. IEEE Trans. Software Eng. 42(10), 960\u2013976 (2016). https:\/\/doi.org\/10.1109\/TSE.2016.2532873","journal-title":"IEEE Trans. Software Eng."},{"key":"1_CR33","unstructured":"We are Social Digital in 2020 (2020). https:\/\/wearesocial.com\/blog\/2020\/01\/digital-2020-3-8-billion-people-use-social-media"},{"issue":"12","key":"1_CR34","doi-asserted-by":"publisher","first-page":"1654","DOI":"10.1109\/TSE.2013.42","volume":"39","author":"KT Stolee","year":"2013","unstructured":"Stolee, K.T., Elbaum, S.: Identification, impact, and refactoring of smells in pipe-like web mashups. IEEE Trans. Software Eng. 39(12), 1654\u20131679 (2013). https:\/\/doi.org\/10.1109\/TSE.2013.42","journal-title":"IEEE Trans. Software Eng."},{"key":"1_CR35","doi-asserted-by":"publisher","unstructured":"Ur, B., et al.: Trigger-action programming in the wild: an analysis of 200,000 IFTTT recipes. In: Proceedings of the 34rd Annual ACM Conference on Human Factors in Computing Systems, CHI 2016, pp. 3227\u20133231. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2858036.2858556","DOI":"10.1145\/2858036.2858556"},{"key":"1_CR36","doi-asserted-by":"publisher","unstructured":"Ur, B., McManus, E., Pak Yong Ho, M., Littman, M.L.: Practical trigger-action programming in the smart home. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2014, pp. 803\u2013812. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2556288.2557420","DOI":"10.1145\/2556288.2557420"},{"issue":"2","key":"1_CR37","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s40860-017-0036-z","volume":"3","author":"C Vannucchi","year":"2017","unstructured":"Vannucchi, C., et al.: Symbolic verification of event\u2013condition\u2013action rules in intelligent environments. J. Reliab. Intell. Environ. 3(2), 117\u2013130 (2017). https:\/\/doi.org\/10.1007\/s40860-017-0036-z","journal-title":"J. Reliab. Intell. Environ."},{"key":"1_CR38","doi-asserted-by":"publisher","unstructured":"Yang, S.J.H., Lee, A.S., Chu, W.C., Yang, H.: Rule base verification using petri nets. In: Proceedings of the Twenty-Second Annual International Computer Software and Applications Conference, COMPSAC 1998, pp. 476\u2013481 (1998). https:\/\/doi.org\/10.1109\/CMPSAC.1998.716699","DOI":"10.1109\/CMPSAC.1998.716699"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Authorization and Authentication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25467-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T06:05:39Z","timestamp":1675058739000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25467-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031254666","9783031254673"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25467-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ETAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Emerging Technologies for Authorization and Authentication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"etaa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/hosting.services.iit.cnr.it\/etaa2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}