{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:45Z","timestamp":1740099045985,"version":"3.37.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319732039"},{"type":"electronic","value":"9783319732046"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-73204-6_57","type":"book-chapter","created":{"date-parts":[[2018,2,9]],"date-time":"2018-02-09T07:12:47Z","timestamp":1518160367000},"page":"517-525","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Proposed Lightweight Cloud Security Framework to Secure Communications Between Internet of Things Devices"],"prefix":"10.1007","author":[{"given":"Islam A. T. F.","family":"Taj-Eddin","sequence":"first","affiliation":[]},{"given":"M. Samir","family":"Abou El-Seoud","sequence":"additional","affiliation":[]},{"given":"Hosam","family":"Elsofany","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,10]]},"reference":[{"issue":"7","key":"57_CR1","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645\u20131660 (2013). Elsevier Science, Amsterdam, The Netherlands. ISSN: 0167-739X","journal-title":"Future Gener. Comput. Syst."},{"key":"57_CR2","unstructured":"IETF RFC 6749. https:\/\/tools.ietf.org\/html\/rfc6749"},{"issue":"11","key":"57_CR3","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/s10916-015-0327-y","volume":"39","author":"G Suciu","year":"2015","unstructured":"Suciu, G., Suciu, V., Martin, A.: Data, Internet of Things and cloud convergence\u2014an architecture for secure e-health applications. J. Med. Syst. 39(11), 141 (2015)","journal-title":"J. Med. Syst."},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Hassan, M.M., Song, B.,Huh E.N.: A framework of sensor cloud integration opportunities and challenges. In: Proceedings of International Conference Ubiquitous Information Management Communication, pp. 618\u2013626 (2009)","DOI":"10.1145\/1516241.1516350"},{"key":"57_CR5","doi-asserted-by":"crossref","unstructured":"Fox, G.C., Kamburugamuve, S., Hartman, R.D.: Architecture and measured characteristics of a cloud based internet of things. In: International Conference on IEEE Collaboration Technologies and Systems (CTS), pp. 6\u201312 (2012)","DOI":"10.1109\/CTS.2012.6261020"},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"Jara, A.J., Genoud, D., Bocchi, Y.: Sensors data fusion for smart cities with KNIME - a real experience in the Smart Santander Test bed. In: I.E. World Forum on Internet of Things (WF-IoT), pp. 173\u2013174 (2014)","DOI":"10.1109\/WF-IoT.2014.6803145"},{"issue":"4","key":"57_CR7","doi-asserted-by":"crossref","first-page":"263","DOI":"10.17519\/apiculture.2015.11.30.4.263","volume":"30","author":"B Kim","year":"2015","unstructured":"Kim, B., Jung, C.: Design and implementation of cloud based realtime temperature and humidity monitoring system of honey bee colony. J. Apiculture 30(4), 263\u2013267 (2015)","journal-title":"J. Apiculture"},{"key":"57_CR8","doi-asserted-by":"crossref","unstructured":"Kushalnagar, N., Montenegro, G., Schumacher, C.: IPv6 over LowPower Wireless Personal Area Networks (6LoWPANs): Overview, assumptions, problem statement, and goals. Internet Engineering Task Force (IETF), Fremont, CA, USA, RFC4919, vol. 10 (2007)","DOI":"10.17487\/rfc4919"},{"issue":"6","key":"57_CR9","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1109\/MCOM.2013.6525600","volume":"51","author":"M Hasan","year":"2013","unstructured":"Hasan, M., Hossain, E., Niyato, D.: Random access for machine-to-machine communication in LTE-Advanced networks: Issues and approaches. IEEE Commun. Mag. 51(6), 86\u201393 (2013)","journal-title":"IEEE Commun. Mag."},{"key":"57_CR10","unstructured":"Clemm, A.: Network Management Fundamentals (2007). ISBN-10: 1587201372, ISBN-13: 978-1587201370"},{"key":"57_CR11","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974","volume-title":"Information Security: Principles and Practice","author":"M Stamp","year":"2011","unstructured":"Stamp, M.: Information Security: Principles and Practice, 2nd edn. Wiley, San Jose (2011). https:\/\/doi.org\/10.1002\/9781118027974","edition":"2"},{"key":"57_CR12","doi-asserted-by":"publisher","unstructured":"Motawie, R., El-Khouly, M.M., El-Seoud, M.S.A.: Security Problems in Cloud Computing (2016). https:\/\/doi.org\/10.3991\/ijes.v4i4.6538","DOI":"10.3991\/ijes.v4i4.6538"},{"key":"57_CR13","unstructured":"Leandro, M.A.P., Nascimento, T.J., dos Santos, D.R., Westphall, C.M., Westphall, C.B.: Multitenancy authorization system with federated identity for cloud-based environments using shibboleth. In: Proceedings of the Eleventh International Conference on Networks, pp. 88\u201393 (2012)"},{"issue":"1","key":"57_CR14","doi-asserted-by":"crossref","first-page":"37","DOI":"10.3991\/ijet.v8iS1.2344","volume":"8","author":"HF El-Sofany","year":"2013","unstructured":"El-Sofany, H.F., Al Tayeb, A., Alghatani, K., El-Seoud, S.A.: The Impact of cloud computing technologies in e-learning. Int. J. Emerg. Technol. Learn. 8(1), 37\u201343 (2013). ICL2012","journal-title":"Int. J. Emerg. Technol. Learn."},{"issue":"3","key":"57_CR15","first-page":"62","volume":"3","author":"MS El-Seoud","year":"2013","unstructured":"El-Seoud, M.S., El-Sofany, H.F., Taj-Eddin, I.A.T.F., Nosseir, A.F., El-Khouly, M.M.: Implementation of web-based education in Egypt through cloud computing technologies and its effectbon higher education. High. Educ. Stud. 3(3), 62 (2013)","journal-title":"High. Educ. Stud."},{"key":"57_CR16","doi-asserted-by":"publisher","unstructured":"El-Seoud, M.S.A., Taj-Eddin, I.A.T.F.: Developing an android mobile bluetooth chat messenger as an interactive and collaborative learning aid. In: Auer M., Guralnick D., Uhomoibhi J. (eds) Interactive Collaborative Learning, ICL 2016. Intelligent Systems and Computing, vol 545, pp. 3\u201315. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-50340-0_1 . http:\/\/www.icl-conference.org\/icl2016\/","DOI":"10.1007\/978-3-319-50340-0_1"},{"key":"57_CR17","doi-asserted-by":"publisher","unstructured":"El-Seoud, M.S.A., Taj-Eddin, I.A.T.F.: Beyond android: an essential integration for better utilization In: International Conference on Interactive Mobile Communication Technologies and Learning (IMCL2016), pp. 98\u2013102. IEEE (2016). https:\/\/doi.org\/10.1109\/IMCTL.2016.7753780 . http:\/\/www.imcl-conference.org\/imcl2016\/","DOI":"10.1109\/IMCTL.2016.7753780"},{"issue":"3","key":"57_CR18","doi-asserted-by":"publisher","first-page":"42","DOI":"10.3991\/ijim.v10i3.5770","volume":"10","author":"MSA El-Seoud","year":"2016","unstructured":"El-Seoud, M.S.A., El-Sofany, H.F., Taj-Eddin, I.A.T.F.: Mobile applications and semantic-web a case study on automated course management. Int. J. Interact. Mob. Technol. (iJIM) 10(3), 42\u201353 (2016). https:\/\/doi.org\/10.3991\/ijim.v10i3.5770 . International Association of Online Engineering. http:\/\/online-journals.org\/index.php","journal-title":"Int. J. Interact. Mob. Technol. (iJIM)"},{"key":"57_CR19","doi-asserted-by":"publisher","unstructured":"El-Seoud, M.S.A., El-Khouly, M., Taj-Eddin, I.A.T.F.: Strategies to enhance learner\u2019s motivation in e-learning environment. In: Proceedings of 18th International Conference on Interactive Collaborative Learning (ICL2015), pp. 944\u2013949. IEEE (2015). https:\/\/doi.org\/10.1109\/ICL.2015.7318154 . http:\/\/www.icl-conference.org\/icl2015\/ . ISBN: 978-1-4799-8706-1\/15 \u00a92015","DOI":"10.1109\/ICL.2015.7318154"},{"key":"57_CR20","doi-asserted-by":"publisher","unstructured":"El-Seoud, M.S.A., El-Sofany, H.F., Karkar, A., Dandashi, A., Taj-Eddin, I.A.T.F., AL-Ja\u2019am, J.M.: Semantic-web automated course management and evaluation system using mobile applications. In: Proceedings of 18th International Conference on Interactive Collaborative Learning (ICL2015), pp. 271\u2013282. IEEE (2015). https:\/\/doi.org\/10.1109\/ICL.2015.7318037 . http:\/\/www.icl-conference.org\/icl2015\/ . ISBN: 978-1-4799-8706-1\/15 \u00a92015","DOI":"10.1109\/ICL.2015.7318037"},{"key":"57_CR21","unstructured":"NIST: National Institute of Standards and Technology - Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director. NIST Cloud Computing Standards Roadmap Working Group, NIST Cloud Computing Program, Information Technology Laboratory, NIST Special Publication 500-291, Version 2, July 2013. http:\/\/dx.doi.org\/:10.6028\/NIST.SP.500-291r2"},{"key":"57_CR22","unstructured":"OrBytes Website Admin: Cloud Computing (2009). http:\/\/www.orbytesolutions.com\/services\/index.php?option=com_content&view=article&id=55&Itemid=40 . Accessed 8 Nov 2010"},{"key":"57_CR23","unstructured":"Waxer, B.: The Benefits of Cloud Computing (2009). http:\/\/www.webhostingunleashed.com\/features\/cloud-computing-benefits\/ . Accessed 21 Dec 2010"},{"key":"57_CR24","unstructured":"Dans, E.: Benefits and Disadvantages of Cloud Computing (2011). http:\/\/algramrandomramblings.blogspot.com\/2011\/01\/benefits-and-disadvantages-ofcloud.html . Accessed 14 Mar 2011"},{"key":"57_CR25","unstructured":"Kynetix Technology group. Cloud Computing Strategy Guide (2009). https:\/\/sites.google.com\/site\/cloudmanual\/success-factors . Accessed 2 Dec 2010"}],"container-title":["Advances in Intelligent Systems and Computing","Teaching and Learning in a Digital World"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-73204-6_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T03:32:24Z","timestamp":1660447944000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-73204-6_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319732039","9783319732046"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-73204-6_57","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}