{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T12:15:47Z","timestamp":1765196147477,"version":"3.46.0"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031948541"},{"type":"electronic","value":"9783031948558"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94855-8_12","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:51:33Z","timestamp":1749793893000},"page":"182-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Framework and\u00a0Roadmap for\u00a0Secure Design and\u00a0Development of\u00a0Applications in\u00a0the\u00a0Cloud and\u00a0Mobile Ecosystem"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1006-381X","authenticated-orcid":false,"given":"Francisco T.","family":"Chimuco","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7206-7771","authenticated-orcid":false,"given":"Jo\u00e3o B. F.","family":"Sequeiros","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9017-5001","authenticated-orcid":false,"given":"M\u00e1rio M.","family":"Freire","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8221-0666","authenticated-orcid":false,"given":"Pedro R. M.","family":"In\u00e1cio","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Aaron\u00a0Bangor, P.T.K., Miller, J.T.: An empirical evaluation of the system usability scale. Int. J. Hum.-Comput. Interact. 24(6), 574\u2013594 (2008). https:\/\/doi.org\/10.1080\/10447310802205776","key":"12_CR1","DOI":"10.1080\/10447310802205776"},{"doi-asserted-by":"publisher","unstructured":"Al-Omary, A.: A secure framework for mobile cloud computing. In: 2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT), pp.\u00a01\u20136. IEEE, Sakhier (2019). https:\/\/doi.org\/10.1109\/3ICT.2019.8910294","key":"12_CR2","DOI":"10.1109\/3ICT.2019.8910294"},{"doi-asserted-by":"publisher","unstructured":"Arora, C., Grundy, J., Abdelrazek, M.: Advancing Requirements Engineering Through Generative AI: Assessing the Role of LLMs, pp. 129\u2013148. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-55642-5_6","key":"12_CR3","DOI":"10.1007\/978-3-031-55642-5_6"},{"issue":"7","key":"12_CR4","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton, K., et al.: That \u2018internet of things\u2019 thing. RFID J. 22(7), 97\u2013114 (2009)","journal-title":"RFID J."},{"issue":"6","key":"12_CR5","doi-asserted-by":"publisher","first-page":"3676","DOI":"10.1109\/TEM.2020.3045661","volume":"69","author":"FM Awaysheh","year":"2022","unstructured":"Awaysheh, F.M., et al.: Security by design for big data frameworks over cloud computing. IEEE Trans. Eng. Manag. 69(6), 3676\u20133693 (2022). https:\/\/doi.org\/10.1109\/TEM.2020.3045661","journal-title":"IEEE Trans. Eng. Manag."},{"issue":"3","key":"12_CR6","first-page":"114","volume":"4","author":"A Bangor","year":"2009","unstructured":"Bangor, A., et al.: Determining what individual sus scores mean: adding an adjective rating scale. J. Usabil. Studies 4(3), 114\u2013123 (2009)","journal-title":"J. Usabil. Studies"},{"unstructured":"Batista, P.M.M.: Applying and Testing Mult-Iclass and Multi-Output Algorithms in the Mapping of Security Requirements with Technologies and Best Practices. Master\u2019s thesis, Universidade da Beira Interior (Portugal) (2022)","key":"12_CR7"},{"doi-asserted-by":"publisher","unstructured":"Blattgerste, o.: A web-based analysis toolkit for the system usability scale. In: Proceedings of the 15th International Conference on PErvasive Technologies Related to Assistive Environments, PETRA \u201922, pp. 237\u2013246. Association for Computing Machinery, New York (2022). https:\/\/doi.org\/10.1145\/3529190.3529216","key":"12_CR8","DOI":"10.1145\/3529190.3529216"},{"key":"12_CR9","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-319-05029-4_7","volume-title":"Big Data and Internet of Things: A Roadmap for Smart Environments","author":"F Bonomi","year":"2014","unstructured":"Bonomi, F., Milito, R., Natarajan, P., Zhu, J.: Fog computing: a platform for internet of things and analytics. In: Bessis, N., Dobre, C. (eds.) Big Data and Internet of Things: A Roadmap for Smart Environments. SCI, vol. 546, pp. 169\u2013186. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05029-4_7"},{"doi-asserted-by":"publisher","unstructured":"Bonomi, F., et\u00a0al.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, MCC \u201912, pp. 13\u201316. Association for Computing Machinery, New York (2012).https:\/\/doi.org\/10.1145\/2342509.2342513","key":"12_CR10","DOI":"10.1145\/2342509.2342513"},{"issue":"194","key":"12_CR11","first-page":"4","volume":"189","author":"J Brooke","year":"1996","unstructured":"Brooke, J., et al.: Sus-a quick and dirty usability scale. Usabil. Eval. Ind. 189(194), 4\u20137 (1996)","journal-title":"Usabil. Eval. Ind."},{"issue":"6","key":"12_CR12","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Futur. Gener. Comput. Syst. 25(6), 599\u2013616 (2009). https:\/\/doi.org\/10.1016\/j.future.2008.12.001","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"12_CR13","doi-asserted-by":"publisher","first-page":"3043","DOI":"10.1007\/s10207-024-00880-6","volume":"23","author":"FT Chimuco","year":"2024","unstructured":"Chimuco, F.T., Sequeiros, J.B., Sim\u014des, T.M., Freire, M.M., In\u00e1cio, P.R.: Expediting the design and development of secure cloud-based mobile apps. Int. J. Inf. Secur. 23(4), 3043\u20133064 (2024). https:\/\/doi.org\/10.1007\/s10207-024-00880-6","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"12_CR14","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1007\/s10207-023-00669-z","volume":"22","author":"FT Chimuco","year":"2023","unstructured":"Chimuco, F.T., et al.: Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation. Int. J. Inf. Secur. 22(4), 833\u2013867 (2023). https:\/\/doi.org\/10.1007\/s10207-023-00669-z","journal-title":"Int. J. Inf. Secur."},{"unstructured":"da\u00a0Costa, J.C.A.N.: Threat Modeling Solution for Internet of Things in a WebBased Security Framework. Master\u2019s thesis, Universidade da Beira Interior (Portugal) (2021). http:\/\/hdl.handle.net\/10400.6\/11849","key":"12_CR15"},{"issue":"5","key":"12_CR16","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/MCSE.2017.3421554","volume":"19","author":"M Di Pierro","year":"2017","unstructured":"Di Pierro, M.: What is the blockchain? Comput. Sci. Eng. 19(5), 92\u201395 (2017). https:\/\/doi.org\/10.1109\/MCSE.2017.3421554","journal-title":"Comput. Sci. Eng."},{"doi-asserted-by":"publisher","unstructured":"Dong, Y., Jiang, X., Jin, Z., Li, G.: Self-collaboration code generation via chatgpt. ACM Trans. Softw. Eng. Methodol. 33(7) (2024). https:\/\/doi.org\/10.1145\/3672459","key":"12_CR17","DOI":"10.1145\/3672459"},{"key":"12_CR18","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.jnca.2018.10.021","volume":"128","author":"H Elazhary","year":"2019","unstructured":"Elazhary, H.: Internet of things (iot), mobile cloud, cloudlet, mobile iot, iot cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions. J. Netw. Comput. Appl. 128, 105\u2013140 (2019). https:\/\/doi.org\/10.1016\/j.jnca.2018.10.021","journal-title":"J. Netw. Comput. Appl."},{"unstructured":"Gupta, S.S.: Blockchain. IBM Onlone (http:\/\/www. IBM. COM) (2017). https:\/\/www.isical.ac.in\/~debrup\/slides\/Bitcoin.pdf","key":"12_CR19"},{"issue":"5","key":"12_CR20","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1016\/j.tele.2018.03.005","volume":"35","author":"M Hussain","year":"2018","unstructured":"Hussain, M., et al.: Conceptual framework for the security of mobile health applications on android platform. Telematics Inform. 35(5), 1335\u20131354 (2018). https:\/\/doi.org\/10.1016\/j.tele.2018.03.005","journal-title":"Telematics Inform."},{"doi-asserted-by":"crossref","unstructured":"Imielinski, T., Korth, H.F.: Mobile computing, vol.\u00a0353. Springer, Heidelberg (1996)","key":"12_CR21","DOI":"10.1007\/b102605"},{"issue":"7","key":"12_CR22","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1080\/10447318.2018.1455307","volume":"34","author":"JR Lewis","year":"2018","unstructured":"Lewis, J.R.: The system usability scale: past, present, and future. Int. J. Human-Comput. Interact. 34(7), 577\u2013590 (2018). https:\/\/doi.org\/10.1080\/10447318.2018.1455307","journal-title":"Int. J. Human-Comput. Interact."},{"unstructured":"Lopes, C.G.: SemiAutomatic Generation of Tests for Assessing Correct Integration of Security Mechanisms in the Internet of Things. Master\u2019s thesis, Universidade da Beira Interior (Portugal) (2021). http:\/\/hdl.handle.net\/10400.6\/11844","key":"12_CR23"},{"doi-asserted-by":"crossref","unstructured":"Mell, P., Grance, T., et\u00a0al.: The nist definition of cloud computing. National institute of science and technology, special publication (2011)","key":"12_CR24","DOI":"10.6028\/NIST.SP.800-145"},{"doi-asserted-by":"publisher","unstructured":"Nofer, M., et\u00a0al.: Blockchain. Bus. Inf. Syst. Eng. 59(3), 183\u2013187 (2017). https:\/\/doi.org\/10.1007\/s12599-017-0467-3","key":"12_CR25","DOI":"10.1007\/s12599-017-0467-3"},{"issue":"5","key":"12_CR26","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/S1007-0214(11)70070-0","volume":"16","author":"W Ren","year":"2011","unstructured":"Ren, W., et al.: Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing. Tsinghua Sci. Technol. 16(5), 520\u2013528 (2011). https:\/\/doi.org\/10.1016\/S1007-0214(11)70070-0","journal-title":"Tsinghua Sci. Technol."},{"doi-asserted-by":"crossref","unstructured":"Samaila, M.G., et\u00a0al.: A quick perspective on the current state of iot security: a survey. In: Networks of the Future, pp. 431\u2013464. Chapman and Hall\/CRC (2017)","key":"12_CR27","DOI":"10.1201\/9781315155517-21"},{"issue":"2","key":"12_CR28","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.20","volume":"1","author":"MG Samaila","year":"2018","unstructured":"Samaila, M.G., et al.: Challenges of securing internet of things devices: a survey. Secur. Priv. 1(2), e20 (2018). https:\/\/doi.org\/10.1002\/spy2.20","journal-title":"Secur. Priv."},{"doi-asserted-by":"publisher","unstructured":"Samaila, M.G., et\u00a0al.: Security threats and possible countermeasures in iot applications covering different industry domains. In: Proceedings of the 13th International Conference on Availability, Reliability and Security. ARES \u201918. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3230833.3232800","key":"12_CR29","DOI":"10.1145\/3230833.3232800"},{"doi-asserted-by":"publisher","unstructured":"Samaila, M.G., et\u00a0al.: \u201ciot-harpseca: A framework for facilitating the design and development of secure iot devices\u201d. In: Proceedings of the 14th International Conference on Availability, Reliability and Security. ARES \u201919. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3339252.3340514","key":"12_CR30","DOI":"10.1145\/3339252.3340514"},{"key":"12_CR31","doi-asserted-by":"publisher","first-page":"16462","DOI":"10.1109\/ACCESS.2020.2965925","volume":"8","author":"MG Samaila","year":"2020","unstructured":"Samaila, M.G., et al.: Iot-harpseca: a framework and roadmap for secure design and development of devices and applications in the iot space. IEEE Access 8, 16462\u201316494 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2965925","journal-title":"IEEE Access"},{"doi-asserted-by":"publisher","unstructured":"Samaila, M.G., et\u00a0al.: A preliminary evaluation of the sre and sbpg components of the iot-harpseca framework. In: 2020 Global Internet of Things Summit (GIoTS), pp.\u00a01\u20137. IEEE, Dublin (2020). https:\/\/doi.org\/10.1109\/GIOTS49054.2020.9119590","key":"12_CR32","DOI":"10.1109\/GIOTS49054.2020.9119590"},{"key":"12_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108496","volume":"199","author":"MG Samaila","year":"2021","unstructured":"Samaila, M.G., et al.: Performance evaluation of the sre and sbpg components of the iot hardware platform security advisor framework. Comput. Netw. 199, 108496 (2021). https:\/\/doi.org\/10.1016\/j.comnet.2021.108496","journal-title":"Comput. Netw."},{"unstructured":"Sauro, J.: Predicting net promoter scores from system usability scale scores. MeasuringU 16, 2022 (2012)","key":"12_CR34"},{"key":"12_CR35","volume-title":"Quantifying the User Experience, Second Edition: Practical Statistics for User Research","author":"J Sauro","year":"2016","unstructured":"Sauro, J., Lewis, J.R.: Quantifying the User Experience, Second Edition: Practical Statistics for User Research, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2016)","edition":"2"},{"unstructured":"Sauro, J., Lewis, J.: 5 ways to interpret a sus score (2018). https:\/\/measuringu.com\/interpret-sus-score\/","key":"12_CR36"},{"doi-asserted-by":"crossref","unstructured":"Senyo, P.K., Effah, J., Addae, E.: Preliminary insight into cloud computing adoption in a developing country. J. Enterp. Inf. Manag. (2016)","key":"12_CR37","DOI":"10.1108\/JEIM-09-2014-0094"},{"unstructured":"Sequeiros, J., et\u00a0al.: Secure design and development of applications in the cloud and mobile ecosystem. In: Inforum - Simp\u00f3sio de Inform\u00e1tica (2023)","key":"12_CR38"},{"doi-asserted-by":"publisher","unstructured":"Sequeiros, J.B.F., et\u00a0al.: Attack and system modeling applied to iot, cloud, and mobile ecosystems: embedding security by design. ACM Comput. Surv. 53(2) (2020). https:\/\/doi.org\/10.1145\/3376123","key":"12_CR39","DOI":"10.1145\/3376123"},{"doi-asserted-by":"publisher","unstructured":"Sherman, M.: Attack surfaces for mobile devices. In: Proceedings of the 2nd International Workshop on Software Development Lifecycle for Mobile. DeMobile 2014, pp. 5\u20138. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2661694.2661696","key":"12_CR40","DOI":"10.1145\/2661694.2661696"},{"doi-asserted-by":"publisher","unstructured":"Srivastava, M., Thamilarasu, G.: Msf: A comprehensive security framework for mhealth applications. In: 2019 7th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), pp. 70\u201375. IEEE, Istanbul (2019). https:\/\/doi.org\/10.1109\/FiCloudW.2019.00026","key":"12_CR41","DOI":"10.1109\/FiCloudW.2019.00026"},{"doi-asserted-by":"publisher","unstructured":"Tan, L., Wang, N.: Future internet: the internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), vol.\u00a05, pp. V5-376\u2013V5-380 (2010). https:\/\/doi.org\/10.1109\/ICACTE.2010.5579543","key":"12_CR42","DOI":"10.1109\/ICACTE.2010.5579543"},{"unstructured":"Tullis, T.S., Stetson, J.N.: A comparison of questionnaires for assessing website usability. In: Usability Professional Association Conference, vol.\u00a01, pp. 1\u201312 (2004)","key":"12_CR43"},{"doi-asserted-by":"crossref","unstructured":"Zkik, K., et\u00a0al.: A new secure framework in mcc using homomorphic signature: application in banking data. In: Transactions on Engineering Technologies, pp. 413\u2013427. Springer, Singapore (2016)","key":"12_CR44","DOI":"10.1007\/978-981-10-1088-0_31"}],"container-title":["Communications in Computer and Information Science","Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94855-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T12:13:41Z","timestamp":1765196021000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94855-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031948541","9783031948558"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94855-8_12","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors\u00a0have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"EICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Interdisciplinary Cybersecurity Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rennes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eicc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fvv.um.si\/eicc2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}