{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T08:25:07Z","timestamp":1747383907562,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811077951"},{"type":"electronic","value":"9789811077968"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-981-10-7796-8_7","type":"book-chapter","created":{"date-parts":[[2018,1,4]],"date-time":"2018-01-04T01:14:01Z","timestamp":1515028441000},"page":"87-96","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Security Requirements Library for the Development of Internet of Things (IoT) Applications"],"prefix":"10.1007","author":[{"given":"Massila","family":"Kamalrudin","sequence":"first","affiliation":[]},{"given":"Asma Asdayana","family":"Ibrahim","sequence":"additional","affiliation":[]},{"given":"Safiah","family":"Sidek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,5]]},"reference":[{"key":"7_CR1","unstructured":"GSM Association, IoT Security Guidelines Overview Document (2016)"},{"key":"7_CR2","unstructured":"Rose, K., Eldridge, S., Chapin, L.: The Internet of Things: An Overview Understanding the Issues of a More Connected World (2015)"},{"issue":"11","key":"7_CR3","first-page":"38","volume":"7","author":"I Maskani","year":"2016","unstructured":"Maskani, I., Boutahar, J., El Houssaini, S.E.G.: Analysis of security requirements engineering: towards a comprehensive approach. Int. J. Adv. Comput. Sci. Appl. 7(11), 38\u201345 (2016)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"7_CR4","unstructured":"Borgohain, T., Kumar, U., Sanyal, S.: Survey of security and privacy issues of Internet of Things. Cryptogr. Secur., 7 (2015)"},{"issue":"9","key":"7_CR5","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1016\/S1361-3723(15)30084-1","volume":"2015","author":"C Tankard","year":"2015","unstructured":"Tankard, C.: The security issues of the Internet of Things. Comput. Fraud Secur. 2015(9), 11\u201314 (2015)","journal-title":"Comput. Fraud Secur."},{"issue":"1","key":"7_CR6","first-page":"64","volume":"11","author":"MRR Ramesh","year":"2016","unstructured":"Ramesh, M.R.R., Reddy, C.S.: A survey on security requirement elicitation methods: classification, merits and demerits. Int. J. Appl. Eng. Res. 11(1), 64\u201370 (2016)","journal-title":"Int. J. Appl. Eng. Res."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Ikram, N., Siddiqui, S., Khan, N.F.: Security requirement elicitation techniques\u202f: the comparison of misuse cases and issue based information systems, pp. 36\u201343 (2014)","DOI":"10.1109\/EmpiRE.2014.6890114"},{"key":"7_CR8","unstructured":"Oltsik, J.: The Internet of Things: a CISO and network security perspective. ESG White Paper, October 2014"},{"key":"7_CR9","unstructured":"Russell, B., Garlati, C., Lingenfelter, D.: Security guidance for early adopters of the Internet of Things (IoT). Mob. Work. Gr. Peer Rev. Doc., April 2015"},{"key":"7_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.09.008","volume":"54","author":"E Borgia","year":"2014","unstructured":"Borgia, E.: The Internet of Things Vision: key features, applications and open issues. Comput. Commun. 54, 1\u201331 (2014)","journal-title":"Comput. Commun."},{"key":"7_CR11","unstructured":"Zolanvari, M.: IoT security: a survey, pp. 1\u201315 (2010)"},{"issue":"5","key":"7_CR12","first-page":"6122","volume":"6","author":"KL Patel","year":"2016","unstructured":"Patel, K.L., Patel, S.M.: Internet of Things-IOT : definition, characteristics, architecture, enabling technologies, application & future challenges. Int. J. Eng. Sci. Comput. 6(5), 6122\u20136131 (2016)","journal-title":"Int. J. Eng. Sci. Comput."},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Alqassem, I., Svetinovic, D.: A taxonomy of security and privacy requirements for the internet of things (IoT). In: 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), pp. 1244\u20131248 (2014)","DOI":"10.1109\/IEEM.2014.7058837"},{"key":"7_CR14","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.future.2016.02.020","volume":"64","author":"S Rahimi","year":"2016","unstructured":"Rahimi, S., Nguyen, T., Rahmani, A.M.: End-to-end security scheme for mobility enabled healthcare Internet of Things. Futur. Gener. Comput. Syst. 64, 108\u2013124 (2016)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"5","key":"7_CR15","doi-asserted-by":"crossref","first-page":"1368","DOI":"10.1109\/JSEN.2015.2502401","volume":"16","author":"P Gope","year":"2016","unstructured":"Gope, P., Hwang, T.: BSN-Care: a secure IoT-Based modern healthcare using body sensor network. IEEE Sens. J. 16(5), 1368\u20131376 (2016)","journal-title":"IEEE Sens. J."},{"key":"7_CR16","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1109\/ACCESS.2015.2437951","volume":"3","author":"SMR Islam","year":"2015","unstructured":"Islam, S.M.R., Kwak, D., Kabir, H.: The Internet of Things for health care: a comprehensive survey. IEEE Access 3, 678\u2013708 (2015)","journal-title":"IEEE Access"},{"issue":"4","key":"7_CR17","first-page":"1976","volume":"4","author":"K Dhariwal","year":"2017","unstructured":"Dhariwal, K., Mehta, A.: Architecture and plan of smart hospital based on Internet of Things (IOT). Int. Res. J. Eng. Technol. 4(4), 1976\u20131980 (2017)","journal-title":"Int. Res. J. Eng. Technol."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Khanna, A., Anand, R.: IoT based smart parking system. In: International Conference on Internet of Things and Applications (IOTA), pp. 266\u2013270 (2016)","DOI":"10.1109\/IOTA.2016.7562735"},{"issue":"4","key":"7_CR19","first-page":"1725","volume":"4","author":"V Aravindan","year":"2017","unstructured":"Aravindan, V., James, D.: Smart homes using Internet of Things. Int. Res. J. Eng. Technol. 4(4), 1725\u20131729 (2017)","journal-title":"Int. Res. J. Eng. Technol."},{"issue":"2","key":"7_CR20","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1108\/IntR-11-2014-0294","volume":"26","author":"H Lau","year":"2016","unstructured":"Lau, H., Zhu, M., Ye, S.: An intelligent tracking system based on Internet of Things for the cold chain. Internet Res. 26(2), 435\u2013445 (2016)","journal-title":"Internet Res."},{"issue":"4","key":"7_CR21","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1108\/IJPCC-01-2014-0002","volume":"10","author":"A Ukil","year":"2014","unstructured":"Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., Bose, T.: Lighweight security scheme for iot application using CoAP. Int. J. Pervasive Comput. Commun. 10(4), 372\u2013392 (2014)","journal-title":"Int. J. Pervasive Comput. Commun."},{"key":"7_CR22","unstructured":"Ibrahim, A.A., Kamalrudin, M., Abdollah, M.F.: Postgraduate research seminar 2017 (PGRS 2017). In: Proceeding of Postgraduate Research Seminar in Conjuction with ISORIS 2017, pp. 235\u2013242, July 2017"},{"issue":"12","key":"7_CR23","first-page":"360","volume":"2","author":"A Kabir","year":"2014","unstructured":"Kabir, A., Rahman, M.: A survey on security requirements elicitation and presentation in requirements engineering phase. Am. J. Eng. Res. 2(12), 360\u2013366 (2014)","journal-title":"Am. J. Eng. Res."},{"issue":"2","key":"7_CR24","doi-asserted-by":"crossref","first-page":"24","DOI":"10.4018\/ijsse.2014040102","volume":"5","author":"K Beckers","year":"2014","unstructured":"Beckers, K., Heisel, M., C\u00f4t\u00e9, I., Goeke, L., G\u00fcler, S.: A structured method for security requirements elicitation concerning the cloud computing domain. Int. J. Secur. Softw. Eng. 5(2), 24 (2014)","journal-title":"Int. J. Secur. Softw. Eng."},{"key":"7_CR25","unstructured":"Islam, G., Qureshi, M.A.: A Framework for Security Requirements Elicitation (2012)"},{"key":"7_CR26","unstructured":"Kamalrudin, M.: Automated Support for Consistency Management and Validation of Requirements (2011)"},{"issue":"1","key":"7_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10515-016-0192-z","volume":"24","author":"M Kamalrudin","year":"2016","unstructured":"Kamalrudin, M., Hosking, J., Grundy, J.: MaramaAIC: tool support for consistency management and validation of requirements. Autom. Software Eng. 24(1), 1\u201345 (2016)","journal-title":"Autom. Software Eng."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Kamalrudin, M., Grundy, J.: Generating essential user interface prototypes to validate requirements. In: Proceedings of the 2011 26th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2011, pp. 564\u2013567 (2011)","DOI":"10.1109\/ASE.2011.6100126"},{"key":"7_CR29","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-981-10-3256-1_7","volume":"671","author":"N Yusop","year":"2016","unstructured":"Yusop, N., Kamalrudin, M., Sidek, S.: Automated support to capture and validate security requirements for mobile apps. Requir. Eng. Towar. Sustain. World 671, 97\u2013112 (2016)","journal-title":"Requir. Eng. Towar. Sustain. World"}],"container-title":["Communications in Computer and Information Science","Requirements Engineering for Internet of Things"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-7796-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T20:38:28Z","timestamp":1570567108000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-7796-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9789811077951","9789811077968"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-7796-8_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}