{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T08:15:34Z","timestamp":1742976934605,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319196947"},{"type":"electronic","value":"9783319196954"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19695-4_18","type":"book-chapter","created":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T08:36:13Z","timestamp":1431938173000},"page":"175-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Framework for the Secure Storage of Data Generated in the IoT"],"prefix":"10.1007","author":[{"given":"Ricardo","family":"Costa","sequence":"first","affiliation":[]},{"given":"Ant\u00f3nio","family":"Pinto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,19]]},"reference":[{"key":"18_CR1","unstructured":"Gartner, Gartner\u2019s 2014 hype cycle for emerging technologies maps the journey to digital business (2014)"},{"key":"18_CR2","unstructured":"G. Press, It\u2019s official: the internet of things takes over big data as the most hyped technology (2014)"},{"key":"18_CR3","unstructured":"ABIresearch: the internet of things will drive wireless connected devices to 40.9 billion in 2020 (2014)"},{"key":"18_CR4","unstructured":"G. Press, Internet of things by the numbers: market estimates and forecasts (2014)"},{"issue":"1","key":"18_CR5","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"RH Weber","year":"2010","unstructured":"R.H. Weber, Internet of things-new security and privacy challenges. Comput. Law Secur. Rev. 26(1), 23\u201330 (2010)","journal-title":"Comput. Law Secur. Rev."},{"issue":"9","key":"18_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1109\/MC.2011.291","volume":"44","author":"R Roman","year":"2011","unstructured":"R. Roman, P. Najera, J. Lopez, Securing the internet of things. Computer 44(9), 51\u201358 (2011)","journal-title":"Computer"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"P. Spiess, S. Karnouskos, D. Guinard, D. Savio, O. Baecker, L. Souza, V. Trifa, SOA-based integration of the internet of things in enterprise services, in IEEE International Conference on Web Services ICWS 2009 (IEEE, , 2009), pp. 968\u2013975","DOI":"10.1109\/ICWS.2009.98"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"M. Blackstock, N. Kaviani, R. Lea, A. Friday, MAGIC Broker 2: an open and extensible platform for the internet of things, in Internet of Things (IOT) (IEEE, 2010), pp. 1\u20138","DOI":"10.1109\/IOT.2010.5678443"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"M. Collina, G.E. Corazza, A. Vanelli-Coralli, Introducing the QEST broker: scaling the IoT by bridging MQTT and REST, in 2012 IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC) (IEEE, 2012), pp. 36\u201341","DOI":"10.1109\/PIMRC.2012.6362813"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"A. Elmangoush, T. Magedanz, A. Blotny, N. Blum, Design of RESTful APIs for M2M services, in 2012 16th International Conference on Intelligence in Next Generation Networks (ICIN) (IEEE, 2012), pp. 50\u201356","DOI":"10.1109\/ICIN.2012.6376033"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Y.S. Chen, Y.R. Chen, Context-oriented data acquisition and integration platform for internet of things. in 2012 Conference on Technologies and Applications of Artificial Intelligence (TAAI) (IEEE, 2012), pp. 103\u2013108","DOI":"10.1109\/TAAI.2012.64"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"M. Mun, S. Hao, N. Mishra, K. Shilton, J. Burke, D. Estrin, M. Hansen, R. Govindan, Personal data vaults: a locus of control for personal data streams, in Proceedings of the 6th International COnference (ACM, 2010), p. 17","DOI":"10.1145\/1921168.1921191"},{"issue":"3","key":"18_CR13","doi-asserted-by":"crossref","first-page":"149","DOI":"10.3233\/AIS-2012-0150","volume":"4","author":"D Preuveneers","year":"2012","unstructured":"D. Preuveneers, P. Novais, A survey of software engineering best practices for the development of smart applications in ambient intelligence. J. Ambient Intell. Smart Environ. 4(3), 149\u2013162 (2012)","journal-title":"J. Ambient Intell. Smart Environ."},{"issue":"2","key":"18_CR14","doi-asserted-by":"crossref","first-page":"179","DOI":"10.3233\/AIS-2010-0059","volume":"2","author":"P Novais","year":"2010","unstructured":"P. Novais, R. Costa, D. Carneiro, J. Neves, Inter-organization cooperation for ambient assisted living. J. Ambient Intell. Smart Environ. 2(2), 179\u2013195 (2010)","journal-title":"J. Ambient Intell. Smart Environ."},{"key":"18_CR15","unstructured":"OASIS Standard, MQTT Version 3.1.1. (2014)"},{"key":"18_CR16","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2 edition edn. Wiley (1995)"}],"container-title":["Advances in Intelligent Systems and Computing","Ambient Intelligence - Software and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19695-4_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T18:05:21Z","timestamp":1710785121000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19695-4_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319196947","9783319196954"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19695-4_18","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}