{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:00:15Z","timestamp":1771700415293,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319728162","type":"print"},{"value":"9783319728179","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:00:00Z","timestamp":1513900800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-72817-9_3","type":"book-chapter","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T11:44:29Z","timestamp":1513856669000},"page":"35-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Introducing Usage Control in MQTT"],"prefix":"10.1007","author":[{"given":"Antonio","family":"La Marra","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Martinelli","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Mori","sequence":"additional","affiliation":[]},{"given":"Athanasios","family":"Rizos","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Saracino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,22]]},"reference":[{"issue":"4","key":"3_CR1","doi-asserted-by":"crossref","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347\u20132376 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"C","key":"3_CR2","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.future.2016.04.010","volume":"63","author":"E Carniani","year":"2016","unstructured":"Carniani, E., D\u2019Arenzo, D., Lazouski, A., Martinelli, F., Mori, P.: Usage control on cloud systems. Future Gener. Comput. Syst. 63(C), 37\u201355 (2016)","journal-title":"Future Gener. Comput. Syst."},{"key":"3_CR3","unstructured":"Chen, D., Varshney, P.K.: QoS support in wireless sensor networks: a survey. In: International Conference on Wireless Networks, vol. 233, pp. 1\u20137 (2004)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Colitti, W., Steenhaut, K., De Caro, N., Buta, B., Dobrota, V.: Evaluation of constrained application protocol for wireless sensor networks. In: 2011 18th IEEE Workshop on Local Metropolitan Area Networks (LANMAN), pp. 1\u20136, October 2011","DOI":"10.1109\/LANMAN.2011.6076934"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Fysarakis, K., Askoxylakis, I., Soultatos, O., Papaefstathiou, I., Manifavas, C., Katos, V.: Which IoT protocol? Comparing standardized approaches over a common M2M application. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/GLOCOM.2016.7842383"},{"issue":"1","key":"3_CR6","first-page":"11","volume":"1","author":"V Karagiannis","year":"2015","unstructured":"Karagiannis, V., Chatzimisios, P., Vzquez-Gallego, F., Alonso-Zrate, J.: A survey on application layer protocols for the Internet of Things. Trans. IoT Cloud Comput. 1(1), 11\u201317 (2015)","journal-title":"Trans. IoT Cloud Comput."},{"issue":"2","key":"3_CR7","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.cosrev.2010.02.002","volume":"4","author":"A Lazouski","year":"2010","unstructured":"Lazouski, A., Martinelli, F., Mori, P.: Usage control in computer security: a survey. Comput. Sci. Rev. 4(2), 81\u201399 (2010)","journal-title":"Comput. Sci. Rev."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Lesjak, C., Hein, D., Hofmann, M., Maritsch, M., Aldrian, A., Priller, P., Ebner, T., Ruprechter, T., Pregartner, G.: Securing smart maintenance services: hardware-security and TLS for MQTT. In: 2015 IEEE 13th International Conference on Industrial Informatics (INDIN), pp. 1243\u20131250, July 2015","DOI":"10.1109\/INDIN.2015.7281913"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Luzuriaga, J.E., Perez, M., Boronat, P., Cano, J.C., Calafate, C., Manzoni, P.: A comparative evaluation of AMQP and MQTT protocols over unstable and mobile networks. In: 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), pp. 931\u2013936, January 2015","DOI":"10.1109\/CCNC.2015.7158101"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"La Marra, A., Martinelli, F., Mori, P., Saracino, A.: Implementing usage control in Internet of Things: a smart home use case. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, Sydney, Australia, 1\u20134 August 2017, pp. 1056\u20131063 (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.352"},{"issue":"7","key":"3_CR11","doi-asserted-by":"crossref","first-page":"1032","DOI":"10.1016\/j.future.2009.12.005","volume":"26","author":"F Martinelli","year":"2010","unstructured":"Martinelli, F., Mori, P.: On usage control for grid systems. Future Gener. Comput. Syst. 26(7), 1032\u20131042 (2010)","journal-title":"Future Gener. Comput. Syst."},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Thangavel, D., Ma, X., Valera, A., Tan, H.X., Tan, C.K.Y.: Performance evaluation of MQTT and CoAP via a common middleware. In: 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/ISSNIP.2014.6827678"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Villari, M., Celesti, A., Fazio, M., Puliafito, A.: Alljoyn lambda: an architecture for the management of smart environments in IoT. In: 2014 International Conference on Smart Computing Workshops, pp. 9\u201314, November 2014","DOI":"10.1109\/SMARTCOMP-W.2014.7046676"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72817-9_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T07:44:13Z","timestamp":1570520653000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72817-9_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,22]]},"ISBN":["9783319728162","9783319728179"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72817-9_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,22]]}}}