{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:06:26Z","timestamp":1748577986740,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_55","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"619-630","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["RT-SPDM: Real-Time Security, Privacy and Dependability Management of Heterogeneous Systems"],"prefix":"10.1007","author":[{"given":"Konstantinos","family":"Fysarakis","sequence":"first","affiliation":[]},{"given":"George","family":"Hatzivasilis","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Askoxylakis","sequence":"additional","affiliation":[]},{"given":"Charalampos","family":"Manifavas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"55_CR1","first-page":"119","volume-title":"Secure Smart Embedded Devices, Platforms and Applications","author":"K Mayes","year":"2013","unstructured":"Mayes, K., Markantonakis, K.: Information security best practices. In: Markantonakis, K., Mayes, K. (eds.) Secure Smart Embedded Devices, Platforms and Applications, pp. 119\u2013144. Springer, New York (2013). Part II"},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Hatzivasilis, G., Papaefstathiou, I., Manifavas, C., Papadakis, N.: A reasoning system for composition verification and security validation. In: 6th NTMS 2014, pp. 1\u20134 (2014)","DOI":"10.1109\/NTMS.2014.6814001"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Eguia, I., Del Ser, J.: A meta-heuristically optimized fuzzy approach towards multi-metric security risk assessment in heterogeneous system of systems. In: PECCS, pp. 231\u2013236 (2014)","DOI":"10.5220\/0004876802310236"},{"key":"55_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1007\/11752578_124","volume-title":"Parallel Processing and Applied Mathematics","author":"M Walter","year":"2006","unstructured":"Walter, M., Trinitis, C.: Quantifying the security of composed systems. In: Wyrzykowski, R., Dongarra, J., Meyer, N., Wa\u015bniewski, J. (eds.) PPAM 2005. LNCS, vol. 3911, pp. 1026\u20131033. Springer, Heidelberg (2006)"},{"key":"55_CR5","unstructured":"Devices profile for web services, version 1.1. http:\/\/docs.oasis-open.org\/ws-dd\/dpws\/1.1\/os\/wsdd-dpws-1.1-spec-os.pdf"},{"key":"55_CR6","unstructured":"Open Services Gateway Initiative (OSGi). http:\/\/www.osgi.org\/"},{"key":"55_CR7","doi-asserted-by":"crossref","unstructured":"Mueller, E.T.: Commonsense Reasoning (2006)","DOI":"10.1016\/B978-012369388-4\/50072-2"},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Patkos, T., Plexousakis, D.: Epistemic reasoning for ambient intelligence. In: ICAART (1), pp. 242\u2013248 (2011)","DOI":"10.5220\/0003149902420248"},{"key":"55_CR9","unstructured":"Java Agent DEvelopment (JADE) Framework. http:\/\/jade.tilab.com\/"},{"key":"55_CR10","unstructured":"FIPA, A.C.L.: FIPA ACL message structure specification. Found. Intell. Phys. Agents. (2002). http:\/\/www.fipa.org\/specs\/fipa00061\/SC00061G.html"},{"key":"55_CR11","unstructured":"OASIS: Common Alerting Protocol Version 1.2. http:\/\/docs.oasis-open.org\/emergency\/cap\/v1.2\/CAP-v1.2-os.pdf"},{"key":"55_CR12","unstructured":"Knopflerfish - Open Source OSGi service platform. http:\/\/www.knopflerfish.org\/"},{"key":"55_CR13","unstructured":"WS4D-JMEDS DPWS Stack. http:\/\/sourceforge.net\/projects\/ws4d-javame\/"},{"key":"55_CR14","unstructured":"Lawrence, K., Kaler, C., Nadalin, A., Monzilo, R., Hallam-Baker, P.: Web Services Security: SOAP Message Security 1.1. https:\/\/www.oasis-open.org\/committees\/download.php\/16790\/wss-v1.1-spec-os-SOAPMessageSecurity.pdf"},{"key":"55_CR15","doi-asserted-by":"crossref","unstructured":"Petroulakis, N.E., Askoxylakis I.G., Tryfonas T.: Life-logging in smart environments: challenges and security threats. In: IEEE ICC 2012, pp. 5680\u20135684 (2012)","DOI":"10.1109\/ICC.2012.6364934"},{"key":"55_CR16","doi-asserted-by":"crossref","unstructured":"Fysarakis, K., Papaefstathiou, I., Manifavas, C., Rantos, K., Sultatos, O.: Policy-based access control for DPWS-enabled ubiquitous devices. In: 2014 IEEE ETFA, pp. 1\u20138 (2014)","DOI":"10.1109\/ETFA.2014.7005233"},{"key":"55_CR17","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1108\/09685220410518856","volume":"12","author":"V Tsoumas","year":"2004","unstructured":"Tsoumas, V., Tryfonas, T.: From risk analysis to effective security management: towards an automated approach. Inf. Manag. Comput. Secur. 12, 91\u2013101 (2004)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"55_CR18","doi-asserted-by":"crossref","unstructured":"Lahlou, S. (ed.): Designing User Friendly Augmented Work Environments. Springer-Verlag, London (2009)","DOI":"10.1007\/978-1-84800-098-8"},{"key":"55_CR19","doi-asserted-by":"publisher","first-page":"116","DOI":"10.4018\/978-1-59904-843-7.ch014","volume-title":"Encyclopedia of Decision Making and Decision Support Technologies","author":"W Beuschel","year":"2008","unstructured":"Beuschel, W.: Dashboards for management. In: Adam, F., Humphreys, P. (eds.) Encyclopedia of Decision Making and Decision Support Technologies, pp. 116-123. Information Science Reference, Hershey, PA (2008). doi: 10.4018\/978-1-59904-843-7.ch014"},{"key":"55_CR20","unstructured":"Read, A., Tarrell, A., Fruhling, A.: Exploring user preference for the dashboard menu design. In: 42nd Annual Hawaii International Conference on System Sciences, HICSS (2009)"},{"key":"55_CR21","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1080\/12460125.2014.886497","volume":"23","author":"I Linden","year":"2014","unstructured":"Linden, I.: Proposals for the integration of interactive dashboards in business process monitoring to support resources allocation decisions. J. Decis. Syst. 23, 318\u2013332 (2014)","journal-title":"J. Decis. Syst."},{"key":"55_CR22","unstructured":"BeagleBone System Reference Manual, RevA3_1.0. http:\/\/beagleboard.org\/static\/beaglebone\/a3\/Docs\/Hardware\/BONE_SRM.pdf"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T12:23:00Z","timestamp":1748521380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}