{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T18:10:10Z","timestamp":1750875010378,"version":"3.41.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319663012"},{"type":"electronic","value":"9783319663029"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66302-9_10","type":"book-chapter","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T13:33:55Z","timestamp":1505136835000},"page":"194-215","source":"Crossref","is-referenced-by-count":1,"title":["A Model-Driven Adaptive Approach for IoT Security"],"prefix":"10.1007","author":[{"given":"Bruno A.","family":"Mozzaquatro","sequence":"first","affiliation":[]},{"given":"Carlos","family":"Agostinho","sequence":"additional","affiliation":[]},{"given":"Raquel","family":"Melo","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Jardim-Goncalves","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,10]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1109\/TII.2014.2300338","volume":"10","author":"Z Bi","year":"2014","unstructured":"Bi, Z., Xu, L.D., Wang, C.: Internet of things for enterprise systems of modern manufacturing. IEEE Trans. Industr. Inf. 10, 1537\u20131546 (2014)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"10_CR2","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"LD Xu","year":"2014","unstructured":"Xu, L.D., He, W., Li, S.: Internet of things in industries: a survey. IEEE Trans. Industr. Inf. 10, 2233\u20132243 (2014)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"10_CR3","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2014","unstructured":"Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146\u2013164 (2014)","journal-title":"Comput. Netw."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Evesti, A., Ovaska, E.: Comparison of adaptive information security approaches. ISRN Artificial Intelligence (2013)","DOI":"10.1155\/2013\/482949"},{"key":"10_CR5","unstructured":"Habib, K., Leister, W.: Adaptive security for the internet of things reference model. Norsk informasjonssikkerhetskonferanse (NISK) 13\u201325 (2013)"},{"key":"10_CR6","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57, 2266\u20132279 (2013)","journal-title":"Comput. Netw."},{"key":"10_CR7","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"10_CR8","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.adhoc.2014.08.001","volume":"24","author":"J Granjal","year":"2014","unstructured":"Granjal, J., Monteiro, E., Silva, J.S.: Security in the integration of low-power wireless sensor networks with the internet: a survey. Ad Hoc Netw. 24, 264\u2013287 (2014)","journal-title":"Ad Hoc Netw."},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Mozzaquatro, B.A., Jardim-goncalves, R., Agostinho, C.: Towards a reference ontology for security in the internet of things. In: IEEE International Workshop on Measurement and Networking, pp. 1\u20136 (2015)","DOI":"10.1109\/IWMN.2015.7322984"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Soylu, A., De Causmaecker, P.: Merging model driven and ontology driven system development approaches pervasive computing perspective. In: 2009 24th International Symposium on Computer and Information Sciences, ISCIS 2009, pp. 730\u2013735. IEEE (2009)","DOI":"10.1109\/ISCIS.2009.5291915"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/978-3-540-45248-5_7","volume-title":"Recent Advances in Intrusion Detection","author":"J Undercoffer","year":"2003","unstructured":"Undercoffer, J., Joshi, A., Pinkston, J.: Modeling computer attacks: an ontology for intrusion detection. In: Vigna, G., Kruegel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 113\u2013135. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45248-5_7"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Xu, H., Xiao, D., Wu, Z.: Application of security ontology to context-aware alert analysis. In: 2009 Eighth IEEE\/ACIS International Conference on Computer and Information Science, ICIS 2009, pp. 171\u2013176 (2009)","DOI":"10.1109\/ICIS.2009.199"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Frye, L., Cheng, L., Heflin, J.: An ontology-based system to identify complex network attacks. In: 2012 IEEE International Conference on Communications (ICC), pp. 6683\u20136688 (2012)","DOI":"10.1109\/ICC.2012.6364689"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11877028_2","volume-title":"Generative and Transformational Techniques in Software Engineering","author":"J B\u00e9zivin","year":"2006","unstructured":"B\u00e9zivin, J.: Model driven engineering: an emerging technical space. In: L\u00e4mmel, R., Saraiva, J., Visser, J. (eds.) GTTSE 2005. LNCS, vol. 4143, pp. 36\u201364. Springer, Heidelberg (2006). doi: 10.1007\/11877028_2"},{"key":"10_CR15","first-page":"1","volume":"1","author":"A Herzog","year":"2007","unstructured":"Herzog, A., Shahmehri, N., Duma, C.: An ontology of information security. J. Inform. Secur. 1, 1\u201323 (2007)","journal-title":"J. Inform. Secur."},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS 2009, pp. 183\u2013194. ACM, New York (2009)","DOI":"10.1145\/1533057.1533084"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1007\/11575801_34","volume-title":"On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE","author":"A Kim","year":"2005","unstructured":"Kim, A., Luo, J., Kang, M.: Security ontology for annotating resources. In: Meersman, R., Tari, Z. (eds.) OTM 2005. LNCS, vol. 3761, pp. 1483\u20131499. Springer, Heidelberg (2005). doi: 10.1007\/11575801_34"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/978-3-540-39718-2_22","volume-title":"The Semantic Web - ISWC 2003","author":"G Denker","year":"2003","unstructured":"Denker, G., Kagal, L., Finin, T., Paolucci, M., Sycara, K.: Security for DAML web services: annotation and matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 335\u2013350. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-39718-2_22"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Gyrard, A., Bonnet, C., Boudaoud, K.: An ontology-based approach for helping to secure the ETSI machine-to-machine architecture. In: 2014 IEEE International Conference on Internet of Things (iThings), and Green Computing and Communications (GreenCom), and Cyber, Physical and Social Computing(CPSCom), pp. 109\u2013116. IEEE (2014)","DOI":"10.1109\/iThings.2014.25"},{"key":"10_CR20","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.csi.2009.10.003","volume":"33","author":"\u00c1 Garc\u00eda-Crespo","year":"2011","unstructured":"Garc\u00eda-Crespo, \u00c1., G\u00f3mez-Berb\u00eds, J.M., Colomo-Palacios, R., Alor-Hern\u00e1ndez, G.: Securontology: a semantic web access control framework. Comput. Stand. Interfaces 33, 42\u201349 (2011)","journal-title":"Comput. Stand. Interfaces"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A.Y., Feringa, A.: Spp. 800\u201330. Risk management guide for information technology systems (2002)","DOI":"10.6028\/NIST.SP.800-30"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Abie, H.: Adaptive security and trust management for autonomic message-oriented middleware. In: 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, pp. 810\u2013817 (2009)","DOI":"10.1109\/MOBHOC.2009.5336915"},{"key":"10_CR23","unstructured":"Shnitko, A.: Adaptive security in complex information systems. In: Proceedings of 2003 the 7th Korea-Russia International Symposium on Science and Technology, KORUS 2003, pp. 206\u2013210 (2003)"},{"key":"10_CR24","unstructured":"Laddaga, R., Robertson, P.: Self adaptive software: a position paper. In: SELF-STAR: International Workshop on Self-* Properties in Complex Information Systems, vol. 31, p. 19 (2004)"},{"key":"10_CR25","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.arcontrol.2015.03.012","volume":"39","author":"C Agostinho","year":"2015","unstructured":"Agostinho, C., Jardim-Goncalves, R.: Sustaining interoperability of networked liquid-sensing enterprises: a complex systems perspective. Ann. Rev. Control 39, 128\u2013143 (2015)","journal-title":"Ann. Rev. Control"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Dobson, S., Zambonelli, F., Denazis, S., Fern\u00e1ndez, A., Ga\u00efti, D., Gelenbe, E., Massacci, F., Nixon, P., Saffre, F., Schmidt, N.: A survey of autonomic communications. ACM Trans. Autonom. Adapt. Syst. 1, 223\u2013259 (2006)","DOI":"10.1145\/1186778.1186782"},{"key":"10_CR27","first-page":"407","volume":"7","author":"R Picek","year":"2007","unstructured":"Picek, R., Strahonja, V.: Model driven development-future or failure of software development. IIS 7, 407\u2013413 (2007)","journal-title":"IIS"},{"key":"10_CR28","unstructured":"Aman, W., Snekkenes, E.: Event driven adaptive security in internet of things. In: UBICOMM 2014: The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies, pp. 7\u201315 (2014)"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Ouedraogo, W.F., Biennier, F., Merle, P.: Optimizing service protection with model driven security@ run. time. In: 2015 IEEE Symposium on Service-Oriented System Engineering (SOSE), pp. 50\u201358. IEEE (2015)","DOI":"10.1109\/SOSE.2015.50"},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-319-26138-6_5","volume-title":"On the Move to Meaningful Internet Systems: OTM 2015 Workshops","author":"S Ghimire","year":"2015","unstructured":"Ghimire, S., Melo, R., Ferreira, J., Agostinho, C., Goncalves, R.: Continuous data collection framework for manufacturing industries. In: Ciuciu, I., Panetto, H., Debruyne, C., Aubry, A., Bollen, P., Valencia-Garc\u00eda, R., Mishra, A., Fensel, A., Ferri, F. (eds.) OTM 2015. LNCS, vol. 9416, pp. 29\u201340. Springer, Cham (2015). doi: 10.1007\/978-3-319-26138-6_5"},{"key":"10_CR31","first-page":"2916","volume":"15","author":"M Hafner","year":"2009","unstructured":"Hafner, M., Memon, M., Breu, R.: Seaas-a reference architecture for security services in SOA. J. Univ. Comput. Sci. (J.UCS) 15, 2916\u20132936 (2009)","journal-title":"J. Univ. Comput. Sci. (J.UCS)"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"B\u00e9zivin, J., Gerb\u00e9, O.: Towards a precise definition of the OMG\/MDA framework. In: 2001 Proceedings of the 16th Annual International Conference on Automated Software Engineering, (ASE 2001), pp. 273\u2013280. IEEE (2001)","DOI":"10.1109\/ASE.2001.989813"},{"key":"10_CR33","volume-title":"MDA Explained: The Model Driven Architecture: Practice and Promise","author":"AG Kleppe","year":"2003","unstructured":"Kleppe, A.G., Warmer, J., Bast, W.: MDA Explained: The Model Driven Architecture: Practice and Promise. Addison-Wesley Longman Publishing Co. Inc., Boston (2003)"},{"key":"10_CR34","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/B978-0-12-800162-2.00003-8","volume":"93","author":"L L\u00facio","year":"2014","unstructured":"L\u00facio, L., Zhang, Q., Nguyen, P.H., Amrani, M., Klein, J., Vangheluwe, H., Traon, Y.L.: Advances in model-driven security. Adv. Comput. 93, 103\u2013152 (2014)","journal-title":"Adv. Comput."},{"key":"10_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-69100-6_22","volume-title":"Model Driven Architecture \u2013 Foundations and Applications","author":"M Clavel","year":"2008","unstructured":"Clavel, M., Silva, V., Braga, C., Egea, M.: Model-driven security in practice: an industrial experience. In: Schieferdecker, I., Hartman, A. (eds.) ECMDA-FA 2008. LNCS, vol. 5095, pp. 326\u2013337. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-69100-6_22"},{"key":"10_CR36","doi-asserted-by":"crossref","unstructured":"Basin, D., Doser, J., Lodderstedt, T.: Model driven security for process-oriented systems. In: Proceedings of the Eighth ACM symposium on Access control models and technologies, pp. 100\u2013109. ACM (2003)","DOI":"10.1145\/775412.775425"},{"key":"10_CR37","unstructured":"Lang, U., Schreiner, R.: Model driven security management: making security management manageable in complex distributed systems. In: Workshop on Modeling Security (MODSEC08)-International Conference on Model Driven Engineering Languages and Systems (MODELS) (2009)"},{"key":"10_CR38","first-page":"178","volume":"11","author":"WF Ouedraogo","year":"2013","unstructured":"Ouedraogo, W.F., Biennier, F., Ghodous, P.: Model driven security in a multi-cloud context. Int. J. Electron. Bus. Manage. 11, 178 (2013)","journal-title":"Int. J. Electron. Bus. Manage."},{"key":"10_CR39","unstructured":"C2NET, P.: Deliverable D1.3: C2NET platform validation scenarios. Version R0.1 (2015)"}],"container-title":["Communications in Computer and Information Science","Model-Driven Engineering and Software Development"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66302-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T17:37:44Z","timestamp":1750873064000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66302-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319663012","9783319663029"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66302-9_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}