{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:09:51Z","timestamp":1773842991851,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Singapore","isbn-type":[{"value":"9789813293427","type":"print"},{"value":"9789813293434","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-32-9343-4_21","type":"book-chapter","created":{"date-parts":[[2020,1,3]],"date-time":"2020-01-03T09:03:23Z","timestamp":1578042203000},"page":"267-282","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Securing Manufacturing Intelligence for the Industrial Internet of Things"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-7418","authenticated-orcid":false,"given":"Hussain","family":"Al-Aqrabi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0105-7730","authenticated-orcid":false,"given":"Richard","family":"Hill","sequence":"additional","affiliation":[]},{"given":"Phil","family":"Lane","sequence":"additional","affiliation":[]},{"given":"Hamza","family":"Aagela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,3]]},"reference":[{"key":"21_CR1","unstructured":"Ashton, K.: That \u201cInternet of Things\u201d thing. RFiD J. (2009)"},{"issue":"7","key":"21_CR2","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A., Rong, X.: Data mining for the Internet of things: literature review and challenges. Int. J. Distrib. Sens. Netw. 11(8) (2015)","DOI":"10.1155\/2015\/431047"},{"key":"21_CR4","unstructured":"Gartner: Gartner Says 6.4 Billion Connected Things? Will Be in Use in 2016, Up 30 Percent From 2015?, Gartner website. http:\/\/www.gartner.com\/newsroom\/id\/3165317 . 10th Nov (2015)"},{"issue":"8","key":"21_CR5","doi-asserted-by":"publisher","first-page":"1966","DOI":"10.1002\/cpe.3131","volume":"27","author":"A Ikram","year":"2015","unstructured":"Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., Sotiriadis, S.: Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency Comput. Pract. Experience 27(8), 1966\u20131984 (2015)","journal-title":"Concurrency Comput. Pract. Experience"},{"key":"21_CR6","unstructured":"Sundmaeker, H., Guillemin, P., Friess, P., Woelffl\u00e9, S.: Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, CERP IoT (2010)"},{"key":"21_CR7","unstructured":"PWC: Industry 4.0: building the digital enterprise. http:\/\/www.pwc.com\/industry40 (2016)"},{"key":"21_CR8","unstructured":"Wang, S., Wan, J., Zhang, D., Li, D. Zhang, C.: Towards the smart factory for Industrie 4.0: a self-organized multi-agent system assisted with big data based feedback and coordination, Comput. Netw. 101, 158\u2013168 (2016)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Wang, S., Wan, J., Li, D., Zhang, C.: Implementing smart factory of industrie 4.0: an outlook. Int. J. Distrib. Sens. Netw. 12, 1 (2016)","DOI":"10.1155\/2016\/3159805"},{"issue":"3","key":"21_CR10","first-page":"373","volume":"15","author":"Q Liu","year":"2014","unstructured":"Liu, Q., Wan, J., Zhou, K.: Cloud manufacturing service system for industrial-cluster-oriented application. J. Internet Technol. 15(3), 373\u2013380 (2014)","journal-title":"J. Internet Technol."},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Hill, M., Devitt, J., Anjum, A., Ali, M.: Towards In-Transit Analytics for Industry 4.0. FCST2017. IEEE Computer Society (2017)","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.124"},{"key":"21_CR12","unstructured":"Katic, N., Quirchmayr, G., Schiefer, J., Stolba, M., Tjoa, A.M.: A Prototype Model for Data Warehouse Security Based on Metadata. University of Vienna, pp. 1\u20139 (2006)"},{"key":"21_CR13","unstructured":"Rosenthal, R., Sciore, E.: View security as the basis for data warehouse security. In: Jeusfeld, M., Shu, H., Staudt, M., Vossen, G. (eds.) Proceedings of the International Workshop on Design and Management of Data Warehouses (DMDW\u20192000), pp. 1\u20138. Stockholm, Sweden, June 5\u20136 (2000)"},{"key":"21_CR14","unstructured":"Kadan, A.: Security Management of Intelligent Technologies in Business Intelligence Systems. Yanka Kupala State University of Grodno, pp. 1\u20133 (2012)"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1016\/j.is.2006.07.003","volume":"32","author":"E Fernandez-Medinaa","year":"2007","unstructured":"Fernandez-Medinaa, E., Trujillo, J., Villarroel, R., Piattini, M.: Developing secure data warehouses with a UML extension. Inform. Syst. 32, 826\u2013856 (2007)","journal-title":"Inform. Syst."},{"key":"21_CR16","unstructured":"Ahmad, S., Ahmad, R.: An Improved Security Framework for Data Warehouse: A Hybrid Approach. IEEE, pp. 1586\u20131590"},{"key":"21_CR17","unstructured":"Brankovic, L., Estivill-Castro, V.: Privacy issues in knowledge discovery and data mining. Department of Computer Science and Software Engineering, The University of Newcastle, Australia, pp. 1\u201312 (2000)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Al-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: Taking the business intelligence to the clouds. In: 9th International Conference on Embedded Software and Systems (HPCC-ICESS), pp. 953\u2013958. IEEE Computer Society, Liverpool (2012)","DOI":"10.1109\/HPCC.2012.138"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Blanco, C., Prez-Castillo, R., Hernndez, A., Fernndez-Medina, E., Trujillo, J.: Towards a modernization process for secure data warehouses. In: Pedersen, T.B., Mohania, M.K., Tjoa, A.M. (eds.) LNCS, vol. 5691, pp. 24\u201335. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-03730-6_3"},{"key":"21_CR20","unstructured":"Stobla, N., Banek, M., Tjoa, A. M.: The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. Vienna University of Technology and University of Zagreb, pp. 1\u201311"},{"key":"21_CR21","unstructured":"Abadi, D. J.: Data management in the cloud: limitations and opportunities. Data Eng. 32(1), 3\u201311 (IEEE Computer Society) (2009)"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Fienberg, S.E.: Privacy and confidentiality in an e-Commerce world: data mining, data warehousing, matching and disclosure limitation. Statistical Sci. 21(2), 143\u2013154 (Institute of mathematical Statistics) (2006)","DOI":"10.1214\/088342306000000240"},{"key":"21_CR23","unstructured":"Al-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service. In: Proceedings of (CSS) and (ICESS), pp. 137\u2013144. IEEE, France, Paris (2014)"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Al-Aqrabi, H., Liu, L., Hill, H., Cui, L., Li, J.: Faceted search in business intelligence on the cloud. In: Proceedings of GREENCOM-ITHINGS-CPSCOM, pp. 842\u2013849. IEEE, China, Beijing (2013)","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.148"},{"key":"21_CR25","unstructured":"Beer, M., Huang, W., Hill, R.: Designing community care systems with AUML. In: Proceedings of the International Conference on Computer, Communication and Control Technologies (CCCT \u201803) and the 9th International Conference on Information Systems Analysis and Synthesis (ISAS \u201803), Orlando, USA, July 31\u2013August 2, IEEE Computer Society, pp. 247\u2013253 (2003)"},{"issue":"3","key":"21_CR26","first-page":"115","volume":"3","author":"MS Farhan","year":"2012","unstructured":"Farhan, M.S., Marie, M.E., El-Fangary, L.M., Helmy, Y.K.: Transforming conceptual model into logical model for temporal data warehouse security: a case study. Int. J. Adv. Comput. Sci. Appl. 3(3), 115\u2013122 (2012)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Priebe, T., Pernul, G.: Towards OLAP security design survey and research issues. In: Proceedings of Third ACM International Workshop on Data Warehousing and OLAP (DOLAP 2000), pp. 33\u201340, 10 Nov 2000. ACM, McLean, VA, USA (2000)","DOI":"10.1145\/355068.355313"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Cuzzocrea, A., Bertino, E., Sacca, D.: Towards a theory for privacy preserving distributed OLAP. In: PAIS12, pp. 1-6, 30 March 2012. ACM, Berlin, Germany (2012)","DOI":"10.1145\/2320765.2320826"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving OLAP. In: SIGMOD 2005, pp. 1\u201312, 14\u201316 June 2005. ACM, Baltimore, Maryland, USA (2005)","DOI":"10.1145\/1066157.1066187"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Shu, Z., Wan, J., Zhang, D., Li, D.: Cloud-integrated cyber-physical systems for complex industrial applications. Mobile Netw. Appl., 1\u201314 (2015)","DOI":"10.1007\/s11036-015-0664-6"},{"key":"21_CR31","doi-asserted-by":"crossref","unstructured":"Li, X., Li, D., Wan, J., Vasilakos, A., Lai, C., Wang, S.: A review of industrial wireless networks in the context of industry 4.0. Wireless Netw., 1\u201319 (2015)","DOI":"10.1007\/s11276-015-1133-7"},{"key":"21_CR32","doi-asserted-by":"crossref","unstructured":"Baker, C., Anjum, A., Hill, R., Bessis, N., Liaquat Kiani, S.: Improving cloud datacentre scalability, agility and performance using OpenFlow. In: Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE Computer Society (2012)","DOI":"10.1109\/iNCoS.2012.118"},{"key":"21_CR33","unstructured":"Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P04), pp. 1\u201315. IEEE Computer Society (2004)"},{"key":"21_CR34","doi-asserted-by":"publisher","unstructured":"Shadija, D., Rezai, M., Hill, R.: Towards an understanding of microservices. In: 23rd International Conference on Automation and Computing (ICAC). IEEE Computer Society, Huddersfield, UK (2017). https:\/\/doi.org\/10.23919\/IConAC.2017.8082018","DOI":"10.23919\/IConAC.2017.8082018"},{"key":"21_CR35","doi-asserted-by":"publisher","unstructured":"Garcia-Campos, J.M., Reina, D.G., Toral, S.L., Bessis, N., Barrero, F., Asimakopoulou, E., Hill, R.: Performance evaluation of reactive routing protocols for VANETs in urban scenarios following good simulation practices, In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Santa Cantarina, Brazil, 8\u201310 July, pp. 1\u20138. ISBN: 978-1-4799-8872-3 (2015). https:\/\/doi.org\/10.1109\/IMIS.2015.5","DOI":"10.1109\/IMIS.2015.5"},{"key":"21_CR36","doi-asserted-by":"crossref","unstructured":"A1-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: Business intelligence security on the clouds: challenges solutions and future directions. In: Proceedings of 7th International Symposium on Service Oriented System Engineering, pp. 137\u2013144. 25\u201328 March 2013","DOI":"10.1109\/SOSE.2013.36"},{"issue":"2","key":"21_CR37","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1504\/IJHPCN.2013.056518","volume":"7","author":"S Sotiriadis","year":"2013","unstructured":"Sotiriadis, S., Bessis, N., Antonopoulos, N., Hill, R.: Meta-scheduling algorithms for managing inter-cloud interoperability. Int. J. High Perform. Comput. Netw. 7(2), 156\u2013172 (2013)","journal-title":"Int. J. High Perform. Comput. Netw."},{"key":"21_CR38","unstructured":"Sotiriadis, S., Bessis, N., Anjum, A., Buyya, R.: An inter-cloud meta-scheduling (icms) simulation framework: Architecture and evaluation. IEEE Trans. Serv. Comput. (2015)"}],"container-title":["Advances in Intelligent Systems and Computing","Fourth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-32-9343-4_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,9]],"date-time":"2022-10-09T20:51:26Z","timestamp":1665348686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-32-9343-4_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813293427","9789813293434"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-32-9343-4_21","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}