{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:04:53Z","timestamp":1740175493388,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T00:00:00Z","timestamp":1552089600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003141","name":"Consejo Nacional de Ciencia y Tecnolog\u00eda","doi-asserted-by":"publisher","award":["411640"],"award-info":[{"award-number":["411640"]}],"id":[{"id":"10.13039\/501100003141","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["TEC2015-66220-R (MINECO\/FEDER)"],"award-info":[{"award-number":["TEC2015-66220-R (MINECO\/FEDER)"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003329","name":"Ministerio de Economia Y Competitividad","doi-asserted-by":"publisher","award":["TEC2015-66220-R (MINECO\/FEDER)"],"award-info":[{"award-number":["TEC2015-66220-R (MINECO\/FEDER)"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["730929"],"award-info":[{"award-number":["730929"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s40860-019-00074-1","type":"journal-article","created":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T11:57:42Z","timestamp":1552132662000},"page":"29-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Resource identification in fog-to-cloud systems: toward an identity management strategy"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9379-2697","authenticated-orcid":false,"given":"Alejandro","family":"G\u00f3mez-C\u00e1rdenas","sequence":"first","affiliation":[]},{"given":"Xavi","family":"Masip-Bruin","sequence":"additional","affiliation":[]},{"given":"Eva","family":"Mar\u00edn-Tordera","sequence":"additional","affiliation":[]},{"given":"Sarang","family":"Kahvazadeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,9]]},"reference":[{"key":"74_CR1","unstructured":"Evans D (2011) The Internet of Things: how the next evolution of the internet is changing everything. CISCO White Paper. Cisco Internet Business Solutions Group (IBSG). \n                    https:\/\/www.cisco.com\/c\/dam\/en_us\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf"},{"key":"74_CR2","doi-asserted-by":"crossref","unstructured":"Datta SK, Da Costa RPF, Bonnet C (2015) Resource discovery in Internet of Things: current trends and future standardization aspects. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). pp\u00a0542\u2013547","DOI":"10.1109\/WF-IoT.2015.7389112"},{"key":"74_CR3","doi-asserted-by":"publisher","first-page":"714","DOI":"10.23919\/TST.2017.8195353","volume":"22","author":"Y Zhou","year":"2017","unstructured":"Zhou Y, Zhang D, Xiong N (2017) Post-cloud computing paradigms: a survey and comparison. Tsinghua Sci Technol 22:714\u2013732","journal-title":"Tsinghua Sci Technol"},{"key":"74_CR4","unstructured":"Firdhous M, Ghazali O, Hassan S (2014) Fog computing: will it be the future of cloud computing? Presented at the proceedings of the third international conference on informatics and applications, Kuala Terengganu, Malaysia"},{"key":"74_CR5","doi-asserted-by":"crossref","unstructured":"Hong K, Lillethun D, Ramachandran U, Ottenw\u00e4lder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the second ACM SIGCOMM workshop on mobile cloud computing. pp\u00a015\u201320. ACM, New York, NY, USA","DOI":"10.1145\/2491266.2491270"},{"key":"74_CR6","doi-asserted-by":"crossref","unstructured":"Hong H (2017) From cloud computing to fog computing: unleash the power of edge and end devices. In: 2017 IEEE international conference on cloud computing technology and science (CloudCom). pp\u00a0331\u2013334","DOI":"10.1109\/CloudCom.2017.53"},{"key":"74_CR7","unstructured":"OpenFog Consortium: OpenFog reference architecture for fog computing (2017)"},{"key":"74_CR8","unstructured":"mF2C Consortium: mF2C project overview. \n                    http:\/\/www.mf2c-project.eu\/project-overview\/"},{"key":"74_CR9","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/MWC.2016.7721750","volume":"23","author":"X Masip-Bruin","year":"2016","unstructured":"Masip-Bruin X, Mar\u00edn-Tordera E, Tashakor G, Jukan A, Ren GJ (2016) Foggy clouds and cloudy fogs: a real need for coordinated management of fog-to-cloud computing systems. IEEE Wirel Commun 23:120\u2013128","journal-title":"IEEE Wirel Commun"},{"key":"74_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.comcom.2017.09.011","volume":"113","author":"W Ramirez","year":"2017","unstructured":"Ramirez W, Masip-Bruin X, Marin-Tordera E, Souza VBC, Jukan A, Ren G-J, de Dios OG (2017) Evaluating the benefits of combined and continuous Fog-to-Cloud architectures. Comput Commun 113:43\u201352","journal-title":"Comput Commun"},{"key":"74_CR11","doi-asserted-by":"publisher","first-page":"25445","DOI":"10.1109\/ACCESS.2017.2766923","volume":"5","author":"Y Liu","year":"2017","unstructured":"Liu Y, Fieldsend JE, Min G (2017) A framework of fog computing: architecture, challenges, and optimization. IEEE Access 5:25445\u201325454","journal-title":"IEEE Access"},{"key":"74_CR12","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3:637\u2013646","journal-title":"IEEE Internet Things J"},{"key":"74_CR13","doi-asserted-by":"crossref","unstructured":"Leskinen J (2012) Evaluation criteria for future identity management. In: 2012 IEEE 11th international conference on trust, security and privacy in computing and communications. pp\u00a0801\u2013806","DOI":"10.1109\/TrustCom.2012.153"},{"key":"74_CR14","doi-asserted-by":"crossref","unstructured":"Cao J, Xu L, Abdallah R, Shi W (2017) EdgeOS_H: a home operating system for internet of everything. In: 2017 IEEE 37th international conference on distributed computing systems (ICDCS). pp\u00a01756\u20131764","DOI":"10.1109\/ICDCS.2017.325"},{"key":"74_CR15","doi-asserted-by":"publisher","first-page":"2971","DOI":"10.1109\/JIOT.2017.2765699","volume":"5","author":"W Feng","year":"2018","unstructured":"Feng W, Yan Z, Zhang H, Zeng K, Xiao Y, Hou YT (2018) A survey on security, privacy, and trust in mobile crowdsourcing. IEEE Internet Things J 5:2971\u20132992","journal-title":"IEEE Internet Things J"},{"key":"74_CR16","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/JIOT.2014.2344013","volume":"1","author":"K Zhang","year":"2014","unstructured":"Zhang K, Liang X, Lu R, Shen X (2014) Sybil attacks and their defenses in the internet of things. IEEE Internet Things J 1:372\u2013383","journal-title":"IEEE Internet Things J"},{"key":"74_CR17","unstructured":"ETSI: human factors (HF): user identification solutions in converging networks (2001)"},{"key":"74_CR18","unstructured":"Craig Webster: WebNS: model for a peer-to-peer name service (2011). \n                    http:\/\/darq.co.za\/project\/webns\/CraigWebster-JacquesSteyn-Thesis.pdf"},{"key":"74_CR19","unstructured":"Unify Solutions Community (2016) Identity and access: about\u2014identity and access. \n                    https:\/\/www.identityandaccess.org\/about\/"},{"key":"74_CR20","doi-asserted-by":"crossref","unstructured":"Balasubramaniam S, Lewis GA, Morris E, Simanta S, Smith DB (2009) Identity management and its impact on federation in a system-of-systems context. In: 2009 3rd annual IEEE systems conference. pp\u00a0179\u2013182","DOI":"10.1109\/SYSTEMS.2009.4815794"},{"key":"74_CR21","doi-asserted-by":"crossref","unstructured":"Kaffel-Ben Ayed H, Boujezza H, Riabi I (2017) An IDMS approach towards privacy and new requirements in IoT. In: 2017 13th international wireless communications and mobile computing conference (IWCMC). pp\u00a0429\u2013434","DOI":"10.1109\/IWCMC.2017.7986324"},{"key":"74_CR22","unstructured":"OpenID: What is OpenID? \n                    https:\/\/openid.net\/what-is-openid\/"},{"key":"74_CR23","doi-asserted-by":"crossref","unstructured":"Tapiador A, Mendo A (2011) A survey on OpenID identifiers. In: 2011 7th international conference on next generation web services practices. pp\u00a0357\u2013362","DOI":"10.1109\/NWeSP.2011.6088205"},{"key":"74_CR24","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s40860-016-0025-7","volume":"2","author":"A Jain","year":"2016","unstructured":"Jain A, Prasad MVNK (2016) A novel fingerprint indexing scheme using dynamic clustering. J Reliab Intell Environ 2:159\u2013171","journal-title":"J Reliab Intell Environ"},{"key":"74_CR25","doi-asserted-by":"crossref","unstructured":"Jaafar F (2017) An integrated architecture for IoT fingerprinting. In: 2017 IEEE international conference on software quality, reliability and security companion (QRS-C). pp\u00a0601\u2013602","DOI":"10.1109\/QRS-C.2017.112"},{"key":"74_CR26","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s40860-016-0027-5","volume":"2","author":"G Banda","year":"2016","unstructured":"Banda G, Bommakanti CK, Mohan H (2016) One IoT: an IoT protocol and framework for OEMs to make IoT-enabled devices forward compatible. J Reliab Intell Environ 2:131\u2013144","journal-title":"J Reliab Intell Environ"},{"key":"74_CR27","unstructured":"Balakrichenan S (2016) Why DNS should be the naming service for Internet of Things?"},{"key":"74_CR28","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s40860-017-0046-x","volume":"3","author":"G Sharma","year":"2017","unstructured":"Sharma G, Kalra S (2017) A secure remote user authentication scheme for smart cities e-governance applications. J Reliab Intell Environ 3:177\u2013188","journal-title":"J Reliab Intell Environ"},{"key":"74_CR29","doi-asserted-by":"crossref","unstructured":"Suguna M, Anusia R, Shalinie SM, Deepti S (2017) Secure identity management in mobile cloud computing. In: 2017 international conference on nextgen electronic technologies: silicon to software (ICNETS2). pp\u00a042\u201345","DOI":"10.1109\/ICNETS2.2017.8067894"},{"key":"74_CR30","doi-asserted-by":"crossref","unstructured":"Moskowitz R, Heer T, Jokela P, Henderson T (2015) Host identity protocol version 2 (HIPv2). \n                    https:\/\/www.rfc-editor.org\/info\/rfc7401","DOI":"10.17487\/rfc7401"},{"key":"74_CR31","doi-asserted-by":"crossref","unstructured":"Yang X, Ji X (2008) Host identity protocol\u2014realizing the separation of the location and host identity. In: 2008 international conference on information and automation. pp\u00a0749\u2013752","DOI":"10.1109\/ICINFA.2008.4608098"},{"key":"74_CR32","doi-asserted-by":"crossref","unstructured":"Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y (2017) ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing. pp\u00a0506\u2013509. ACM, Marrakech, Morocco","DOI":"10.1145\/3019612.3019878"},{"key":"74_CR33","doi-asserted-by":"crossref","unstructured":"Zhang P, Sun H, Yan Z (2011) Building up trusted identity management in mobile heterogeneous environment. In: 2011 IEEE 10th international conference on trust, security and privacy in computing and communications. pp\u00a0873\u2013877","DOI":"10.1109\/TrustCom.2011.117"},{"key":"74_CR34","doi-asserted-by":"crossref","unstructured":"Trnka M, Cerny T (2016) Identity management of devices in internet of things environment. In: 2016 6th international conference on it convergence and security (ICITCS). pp\u00a01\u20134","DOI":"10.1109\/ICITCS.2016.7740343"},{"key":"74_CR35","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-319-75178-8_26","volume-title":"Euro-Par 2017: parallel processing workshops","author":"A G\u00f3mez-C\u00e1rdenas","year":"2018","unstructured":"G\u00f3mez-C\u00e1rdenas A, Masip-Bruin X, Mar\u00edn-Tordera E, Kahvazadeh S, Garcia J (2018) A hash-based naming strategy for the fog-to-cloud computing paradigm. In: Heras DB, Boug\u00e9 L, Mencagli G, Jeannot E, Sakellariou R, Badia RM, Barbosa JG, Ricci L, Scott SL, Lankes S, Weidendorfer J (eds) Euro-Par 2017: parallel processing workshops. Springer International Publishing, New York, pp 316\u2013324"},{"key":"74_CR36","unstructured":"(2015) National Institute of Standards and Technology: SHA-3 standard: permutation-based hash and extendable-output functions. \n                    https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.202.pdf"},{"key":"74_CR37","doi-asserted-by":"crossref","unstructured":"Gomez-C\u00e1rdenas A, Masip-Bruin X, Marin-Tordera E, Kahvazadeh S, Garcia J (2018) A resource identity management strategy for combined fog-to-cloud systems. In: 2018 IEEE 19th international symposium on \u201ca world of wireless, mobile and multimedia networks\u201d (WoWMoM). pp\u00a001\u201306","DOI":"10.1109\/WoWMoM.2018.8449762"},{"key":"74_CR38","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1049\/iet-net.2015.0034","volume":"5","author":"S Sarkar","year":"2016","unstructured":"Sarkar S, Misra S (2016) Theoretical modelling of fog computing: a green computing paradigm to support IoT applications. IET Netw 5:23\u201329","journal-title":"IET Netw"},{"key":"74_CR39","doi-asserted-by":"crossref","unstructured":"Farrell, S., Dannewitz, C., Ohlman, B., Kutscher, D., Hallam-Baker, P., Ker\u00e4nen, A.: Naming Things with Hashes. RFC Editor (2013)","DOI":"10.17487\/rfc6920"},{"key":"74_CR40","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.comcom.2015.09.014","volume":"71","author":"SH Bouk","year":"2015","unstructured":"Bouk SH, Ahmed SH, Kim D (2015) Hierarchical and hash based naming with compact trie name management scheme for vehicular content centric networks. Comput Commun 71:73\u201383","journal-title":"Comput Commun"},{"key":"74_CR41","doi-asserted-by":"publisher","first-page":"3511","DOI":"10.1109\/JSEN.2013.2259691","volume":"13","author":"T Savolainen","year":"2013","unstructured":"Savolainen T, Soininen J, Silverajan B (2013) IPv6 addressing strategies for IoT. IEEE Sens J 13:3511\u20133519","journal-title":"IEEE Sens J"},{"key":"74_CR42","unstructured":"Arduino: Arduino UNO WiFi Rev2. \n                    https:\/\/store.arduino.cc\/arduino-uno-wiFi-rev2"},{"key":"74_CR43","unstructured":"(2016) Raspberry Pi foundation: raspberry Pi 3 model B, \n                    https:\/\/www.raspberrypi.org\/products\/raspberry-pi-3-model-b\/"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00074-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-019-00074-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00074-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,8]],"date-time":"2020-03-08T00:08:26Z","timestamp":1583626106000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-019-00074-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,9]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["74"],"URL":"https:\/\/doi.org\/10.1007\/s40860-019-00074-1","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"type":"print","value":"2199-4668"},{"type":"electronic","value":"2199-4676"}],"subject":[],"published":{"date-parts":[[2019,3,9]]},"assertion":[{"value":"1 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}