{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T00:16:18Z","timestamp":1772151378556,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319605845","type":"print"},{"value":"9783319605852","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:00:00Z","timestamp":1497571200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-60585-2_12","type":"book-chapter","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T03:20:14Z","timestamp":1497496814000},"page":"106-116","source":"Crossref","is-referenced-by-count":9,"title":["Human Centric Security and Privacy for the IoT Using Formal Techniques"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kamm\u00fcller","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,16]]},"reference":[{"key":"12_CR1","unstructured":"SUCCESS: SecUre aCCESSibility for the internet of things. CHIST-ERA (2016). http:\/\/www.chistera.eu\/projects\/success"},{"issue":"3","key":"12_CR2","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MS.2011.27","volume":"28","author":"A Basu","year":"2011","unstructured":"Basu, A., Bensalem, S., Bozga, M., Combaz, J., Jaber, M., Nguyen, T.-H., Sifakis, J.: Rigorous component-based system design using the BIP framework. IEEE Softw. 28(3), 41\u201348 (2011)","journal-title":"IEEE Softw."},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Arnold, F., Hermanns, H., Pulungan, R., Stoelinga, M.I.A.: Time-dependent analysis of attacks. In: Principles of Security and Trust, POST 2014. LNCS, pp. 285\u2013305 (2014)","DOI":"10.1007\/978-3-642-54792-8_16"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F.: Formal modeling and analysis with humans in infrastructures for IoT healthcare systems. In: 5th International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2017, co-located with HCII 2017. LNAI. Springer, Heidelberg (2017)","DOI":"10.1007\/978-3-319-58460-7_24"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Ben Said, N., Abdellatif, T., Bensalem, S., Bozga, M.: Model-driven information flow security for component-based systems. In: ETAPS Workshop \u2018From Programs to Systems\u2019, FPS@ETAPS, vol. 2014, pp. 1\u201320 (2014)","DOI":"10.1007\/978-3-642-54848-2_1"},{"issue":"99","key":"12_CR6","first-page":"1","volume":"PP","author":"F Kamm\u00fcller","year":"2016","unstructured":"Kamm\u00fcller, F., Probst, C.W.: Modeling and verification of insider threats using logical analysis. IEEE Syst. J. PP(99), 1\u201312 (2016)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"12_CR7","first-page":"44","volume":"8","author":"F Kamm\u00fcller","year":"2017","unstructured":"Kamm\u00fcller, F., Kerber, M., Probst, C.W.: Insider threats for auctions: formal modeling, proof, and certified code. Spec. Issue J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA) 8(1), 44\u201378 (2017)","journal-title":"Spec. Issue J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. (JoWUA)"},{"key":"12_CR8","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"B Schneier","year":"2004","unstructured":"Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley, New York (2004)"},{"key":"12_CR9","unstructured":"Wikipedia: Bluetooth. https:\/\/en.wikipedia.org\/wiki\/Bluetooth . Accessed 4 Mar 2017"},{"key":"12_CR10","unstructured":"JSON. ECMA-404: The JSON Data Interchange Standard (2017). http:\/\/www.json.org"},{"key":"12_CR11","unstructured":"OASIS: Web services security: SOAP message security. Working Draft 13, Document identifier: WSS: SOAP Message Security -13, OASIS Open 2002. http:\/\/www.oasis-open.org\/committees\/documents.php"},{"issue":"3","key":"12_CR12","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1145\/322510.322530","volume":"2","author":"LC Paulson","year":"1999","unstructured":"Paulson, L.C.: Inductive analysis of the internet protocol TLS. ACM Trans. Inf. Syst. Secur. 2(3), 332\u2013351 (1999)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F.: Verification of DNSsec delegation signatures. In: 21st International Conference on Telecommunication. IEEE (2014)","DOI":"10.1109\/ICT.2014.6845127"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Wong, F.-L., Stajano, F., Clulow, J.: Repairing the bluetooth pairing protocol. In: Security Protocols 2005. LNCS, vol. 4631, pp. 31\u201345. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-77156-2_4"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Human Factors in Cybersecurity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60585-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T03:17:55Z","timestamp":1569467875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60585-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,16]]},"ISBN":["9783319605845","9783319605852"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60585-2_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,16]]}}}