{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T10:40:01Z","timestamp":1749984001192,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319527260"},{"type":"electronic","value":"9783319527277"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52727-7_10","type":"book-chapter","created":{"date-parts":[[2017,2,14]],"date-time":"2017-02-14T13:32:01Z","timestamp":1487079121000},"page":"79-91","source":"Crossref","is-referenced-by-count":5,"title":["Formulating A Global Identifier Based on Actor Relationship for the Internet of Things"],"prefix":"10.1007","author":[{"given":"Ausama","family":"Majeed","sequence":"first","affiliation":[]},{"given":"Adil","family":"Al-Yasiri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,15]]},"reference":[{"issue":"10","key":"10_CR1","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266\u20132279 (2013)","journal-title":"Comput. Netw."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Fongen, A.: Identity management and integrity protection in the Internet of Things. In: 3rd International Conference on Emerging Security Technologies, pp. 111\u2013114, IEEE Press (2012)","DOI":"10.1109\/EST.2012.15"},{"key":"10_CR3","unstructured":"Alp\u00e1r, G., Hoepman, J.-H., Siljee, J.: The Identity Crisis. Security, Privacy and Usability Issues in Identity Management (2011). arXiv Preprint arXiv1101.0427"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Othmane, L.B, Lilien, L.: An entity-centric approach for privacy and identity management in cloud computing. In: 29th IEEE Symposium on Reliable Distributed Systems, pp. 177\u2013183. IEEE Press, New Delhi (2010)","DOI":"10.1109\/SRDS.2010.28"},{"key":"10_CR5","unstructured":"J\u00f8sang, A, Golbeck, J.: Challenges for robust trust and reputation systems. In: Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009), Saint Malo (2009)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Yeluri, R., Castro-Leon, E.: Identity management and control for clouds. In: Building the Infrastructure for Cloud Security, pp. 141\u2013159. Apress (2014)","DOI":"10.1007\/978-1-4302-6146-9_7"},{"key":"10_CR7","volume-title":"Identity Management for Internet of Things","author":"PN Mahalle","year":"2015","unstructured":"Mahalle, P.N., Railkar, P.N.: Identity Management for Internet of Things. River Publishers, Denmark (2015)"},{"key":"10_CR8","unstructured":"Gartner: The Identity of Things for the Internet of Things - (G00270277) (2015)"},{"key":"10_CR9","unstructured":"Forgerock: Whitepaper: The Identity of Things (IDoT): Access Management (IAM) Reference Architecture for The Internet of Things (IoT) (2015)"},{"key":"10_CR10","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.adhoc.2013.02.008","volume":"18","author":"CH Liu","year":"2014","unstructured":"Liu, C.H., Yang, B., Liu, T.: Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Netw. 18, 85\u2013101 (2014)","journal-title":"Ad Hoc Netw."},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Mahalle, P.N., Prasad, N.R., Prasad, R.: Novel context-aware clustering with hierarchical addressing (CCHA) for the Internet-of-Things (IoT). In: 5th International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013), pp. 267\u2013274. IET, Bangalore (2013)","DOI":"10.1049\/cp.2013.2246"},{"issue":"2","key":"10_CR12","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/s00779-013-0664-0","volume":"18","author":"JM Batalla","year":"2014","unstructured":"Batalla, J.M., Krawiec, P.: Conception of ID layer performance at the network level for Internet of Things. Pers. Ubiquit. Comput. 18(2), 465\u2013480 (2014)","journal-title":"Pers. Ubiquit. Comput."},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Van Thuan, D., Butkus, P.: A user centric identity management for Internet of Things. In: International Conference on IT Convergence and Security (ICITCS), pp. 1\u20134. IEEE Publisher, Beijing (2014)","DOI":"10.1109\/ICITCS.2014.7021724"},{"key":"10_CR14","unstructured":"Zdravkova, V.: Identity management approach in Internet of Things. Aalborg University (2015)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Vujovic, V., Maksimovic, M., Kosmajac, D., Perisic, B.: Resource: a connection between Internet of Things and resource-oriented architecture. In: Proceedings of Smart SysTech 2015, European Conference on Smart Objects, Systems and Technologies, pp. 1\u20137. VDE Publisher, Aachen (2015)","DOI":"10.1109\/CISTI.2015.7170415"},{"key":"10_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JQE.2015.2485219","volume":"99","author":"O Bello","year":"2015","unstructured":"Bello, O., Zeadally, S.: Intelligent device-to-device communication in the Internet of Things. IEEE Syst. J. 99, 1\u201311 (2015)","journal-title":"IEEE Syst. J."},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Serbanati, A., Medaglia, C.M., Ceipidor, U.B.: Building Blocks of the Internet of Things: State of the Art and Beyond. INTECH Open Access Publisher, Rijeka (2011)","DOI":"10.5772\/19997"},{"key":"10_CR18","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-642-40403-0","volume-title":"Enabling Things to Talk. Designing IoT Solutions with the IoT Architectural Reference Model","author":"A Bassi","year":"2013","unstructured":"Bassi, A., Bauer, M., Fiedler, M., Kramp, T., Van Kranenburg, R., Lange, S., Meissner, S.: Enabling Things to Talk. Designing IoT Solutions with the IoT Architectural Reference Model, pp. 163\u2013211. Springer, Heidelberg (2013)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Interoperability, Safety and Security in IoT"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52727-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T10:18:13Z","timestamp":1749982693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52727-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319527260","9783319527277"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52727-7_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}