{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T06:04:14Z","timestamp":1751522654593,"version":"3.37.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723884"},{"type":"electronic","value":"9783319723891"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72389-1_43","type":"book-chapter","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T09:53:21Z","timestamp":1512554001000},"page":"545-560","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Improving MQTT by Inclusion of Usage Control"],"prefix":"10.1007","author":[{"given":"Antonio","family":"La Marra","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]},{"given":"Athanasios","family":"Rizos","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347\u20132376 (2015, fourthquarter)","DOI":"10.1109\/COMST.2015.2444095"},{"issue":"C","key":"43_CR2","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.future.2016.04.010","volume":"63","author":"E Carniani","year":"2016","unstructured":"Carniani, E., D\u2019Arenzo, D., Lazouski, A., Martinelli, F., Mori, P.: Usage control on cloud systems. Future Gener. Comput. Syst. 63(C), 37\u201355 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"43_CR3","unstructured":"Chen, D., Varshney, P.K.: QoS support in wireless sensor networks: a survey (2004)"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Colitti, W., Steenhaut, K., De Caro, N., Buta, B., Dobrota, V.: Evaluation of constrained application protocol for wireless sensor networks. In: 2011 18th IEEE Workshop on Local Metropolitan Area Networks (LANMAN), pp. 1\u20136, October 2011","DOI":"10.1109\/LANMAN.2011.6076934"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Collina, M., Corazza, G.E., Vanelli-Coralli, A.: Introducing the QEST broker: scaling the IoT by bridging MQTT and REST. In: 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 36\u201341, September 2012","DOI":"10.1109\/PIMRC.2012.6362813"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Faiella, M., Martinelli, F., Mori, P., Saracino, A., Sheikhalishahi, M.: Collaborative attribute retrieval in environment with faulty attribute managers. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 296\u2013303, August 2016","DOI":"10.1109\/ARES.2016.51"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Fysarakis, K., Askoxylakis, I., Soultatos, O., Papaefstathiou, I., Manifavas, C., Katos, V.: Which IoT protocol? Comparing standardized approaches over a common M2M application. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/GLOCOM.2016.7842383"},{"issue":"1","key":"43_CR8","first-page":"11","volume":"1","author":"V Karagiannis","year":"2015","unstructured":"Karagiannis, V., Chatzimisios, P., Vzquez-Gallego, F., Alonso-Zrate, J.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 1(1), 11\u201317 (2015)","journal-title":"Trans. IoT Cloud Comput."},{"key":"43_CR9","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.cose.2013.09.005","volume":"39","author":"G Karopoulos","year":"2013","unstructured":"Karopoulos, G., Mori, P., Martinelli, F.: Usage control in SIP-based multimedia delivery. Comput. Secur. 39, 406\u2013418 (2013)","journal-title":"Comput. Secur."},{"issue":"2","key":"43_CR10","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.cosrev.2010.02.002","volume":"4","author":"A Lazouski","year":"2010","unstructured":"Lazouski, A., Martinelli, F., Mori, P.: Survey: usage control in computer security: a survey. Comput. Sci. Rev. 4(2), 81\u201399 (2010)","journal-title":"Comput. Sci. Rev."},{"issue":"4","key":"43_CR11","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1007\/s10207-016-0336-y","volume":"16","author":"A Lazouski","year":"2017","unstructured":"Lazouski, A., Martinelli, F., Mori, P., Saracino, A.: Stateful data usage control for android mobile devices. Int. J. Inf. Secur. 16(4), 345\u2013369 (2017)","journal-title":"Int. J. Inf. Secur."},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Lesjak, C., Hein, D., Hofmann, M., Maritsch, M., Aldrian, A., Priller, P., Ebner, T., Ruprechter, T., Pregartner, G.: Securing smart maintenance services: hardware-security and TLS for MQTT. In: 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), pp. 1243\u20131250, July 2015","DOI":"10.1109\/INDIN.2015.7281913"},{"key":"43_CR13","unstructured":"Locke, D.: MQ telemetry transport (MQTT) v3. 1 protocol specification. IBM developerWorks Technical Library (2010)"},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Luzuriaga, J.E., Perez, M., Boronat, P., Cano, J.C., Calafate, C., Manzoni, P.: A comparative evaluation of AMQP and MQTT protocols over unstable and mobile networks. In: 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 931\u2013936, January 2015","DOI":"10.1109\/CCNC.2015.7158101"},{"key":"43_CR15","doi-asserted-by":"crossref","unstructured":"La Marra, A., Martinelli, F., Mori, P., Saracino, A.: Implementing usage control in internet of things: a smart home use case. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, Sydney, Australia, 1\u20134 August 2017, pp. 1056\u20131063 (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.352"},{"issue":"7","key":"43_CR16","doi-asserted-by":"crossref","first-page":"1032","DOI":"10.1016\/j.future.2009.12.005","volume":"26","author":"F Martinelli","year":"2010","unstructured":"Martinelli, F., Mori, P.: On usage control for GRID systems. Future Gener. Comput. Syst. 26(7), 1032\u20131042 (2010)","journal-title":"Future Gener. Comput. Syst."},{"key":"43_CR17","unstructured":"NIST: MQTT and the NIST Cybersecurity Framework Version 1.0 (2014). http:\/\/docs.oasis-open.org\/mqtt\/mqtt-nist-cybersecurity\/v1.0\/cn01\/mqtt-nist-cybersecurity-v1.0-cn01.pdf . Accessed 22 Jan 2017"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Singh, M., Rajan, M.A., Shivraj, V.L., Balamuralidhar, P.: Secure MQTT for internet of things (IoT). In: 2015 Fifth International Conference on Communication Systems and Network Technologies, pp. 746\u2013751, April 2015","DOI":"10.1109\/CSNT.2015.16"},{"key":"43_CR19","doi-asserted-by":"crossref","unstructured":"Srivatsa, M., Liu, L.: Securing publish-subscribe overlay services with EventGuard. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, pp. 289\u2013298. ACM, New York (2005)","DOI":"10.1145\/1102120.1102158"},{"key":"43_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cmpb.2016.03.004","volume":"129","author":"A Talaminos-Barroso","year":"2016","unstructured":"Talaminos-Barroso, A., Estudillo-Valderrama, M.A., Roa, L.M., Reina-Tosina, J., Ortega-Ruiz, F.: A machine-to-machine protocol benchmark for eHealth applications use case: respiratory rehabilitation. Comput. Methods Programs Biomed. 129, 1\u201311 (2016)","journal-title":"Comput. Methods Programs Biomed."},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Thangavel, D., Ma, X., Valera, A., Tan, H.-X., Tan, C.K.-Y.: Performance evaluation of MQTT and CoAP via a common middleware. In: 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/ISSNIP.2014.6827678"},{"key":"43_CR22","doi-asserted-by":"crossref","unstructured":"Villari, M., Celesti, A., Fazio, M., Puliafito, A.: AllJoyn Lambda: an architecture for the management of smart environments in IoT. In: 2014 International Conference on Smart Computing Workshops, pp. 9\u201314, November 2014","DOI":"10.1109\/SMARTCOMP-W.2014.7046676"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72389-1_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T11:29:21Z","timestamp":1570447761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72389-1_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723884","9783319723891"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72389-1_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}