{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:15:29Z","timestamp":1725542129311},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642108372"},{"type":"electronic","value":"9783642108389"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10838-9_26","type":"book-chapter","created":{"date-parts":[[2009,12,16]],"date-time":"2009-12-16T02:20:05Z","timestamp":1260930005000},"page":"354-365","source":"Crossref","is-referenced-by-count":0,"title":["USN Middleware Security Model"],"prefix":"10.1007","author":[{"given":"Mijoo","family":"Kim","sequence":"first","affiliation":[]},{"given":"Mi Yeon","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Hyun Cheol","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Heung Youl","family":"Youm","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","unstructured":"ITU-T X.800, Security architecture for Open Systems Interconnection for CCITT applications"},{"key":"26_CR2","unstructured":"ITU-T X.805, Security architecture for systems providing end-to-end communications"},{"key":"26_CR3","unstructured":"ITU-T F.usn-mw, Service description and requirements for USN middleware"},{"key":"26_CR4","unstructured":"ITU-T X.usnsec-1, security framework for ubiquitous sensor network"},{"key":"26_CR5","unstructured":"ITU-T X.usnsec-2, USN middleware security guideline"},{"key":"26_CR6","unstructured":"ITU-T X.usnsec-3, Secure routing mechanisms for wireless sensor network"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Sabbah, E., Majeed, A., Kang, K.-D., Liu, K., Abu-Ghazaleh, N.: An Application-Driven Perspective on Wireless Sensor Network Security, Q2SWinet 2006 (2006)","DOI":"10.1145\/1163673.1163675"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Heinzelman, W., Murphy, A., Carvalho, H., Perillo, M.: Middleware to Support Sensor Network Applications. IEEE Network Magazine Special Issue (January 2004)","DOI":"10.1109\/MNET.2004.1265828"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1007\/3-540-36978-3_34","volume-title":"Information Processing in Sensor Networks","author":"S. Li","year":"2003","unstructured":"Li, S., Son, S.H., Stankovic, J.A.: Event detection services using data service middleware in distributed sensor networks. In: Zhao, F., Guibas, L.J. (eds.) IPSN 2003. LNCS, vol.\u00a02634, pp. 502\u2013517. Springer, Heidelberg (2003)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Liu, T., Martonosi, M.: Impala: A Middleware System for Managing Autonomic, Parallel Sensor Systems In: Proc. ACM SIGPLAN Symp. Principles and Practice of Parallel Programming, pp. 107\u2013118 (2003)","DOI":"10.1145\/781498.781516"},{"issue":"1","key":"26_CR11","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1145\/1061318.1061322","volume":"30","author":"S.R. Madden","year":"2005","unstructured":"Madden, S.R., Franklin, M.J., Hellerstein, J.M.: TinyDB: An Acquisitional Query Processing System for Sensor Networks. ACM TODS\u00a030(1), 122\u2013173 (2005)","journal-title":"ACM TODS"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Yao, Y., Gehrke, J.E.: The Cougar Approach to In-Network Query Processing in Sensor Networks. SIGMOD RECORD\u00a031(3) (2002)","DOI":"10.1145\/601858.601861"},{"issue":"2-3","key":"26_CR13","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C. Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Ad Hoc Networks\u00a01(2-3), 293\u2013315 (2003)","journal-title":"Ad Hoc Networks"},{"issue":"4","key":"26_CR14","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1080\/15501320600692044","volume":"2","author":"C. Loo","year":"2006","unstructured":"Loo, C., Ng, M., Leckie, C., Palaniswami, M.: Intrusion Detection for Routing Attacks in Sensor Networks. International Journal of Distributed Sensor Networks\u00a02(4), 313\u2013332 (2006)","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"26_CR15","unstructured":"Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Elsevier\u2019s AdHoc Networks Journal (2002)"},{"key":"26_CR16","unstructured":"Undercoffer, J., Avancha, S., Joshi, A., Pinkston, J.: Security for Sensor Networks. CADIP Research Symposium (2002)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10838-9_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:35:26Z","timestamp":1606167326000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10838-9_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642108372","9783642108389"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10838-9_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}