{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,4]],"date-time":"2025-10-04T18:30:52Z","timestamp":1759602652018},"reference-count":32,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/csr61664.2024.10679405","type":"proceedings-article","created":{"date-parts":[[2024,9,24]],"date-time":"2024-09-24T17:21:51Z","timestamp":1727198511000},"page":"670-675","source":"Crossref","is-referenced-by-count":1,"title":["Secure and Transparent Data Sharing Among Connected Devices: Integrating Data Spaces and Provenance"],"prefix":"10.1109","author":[{"given":"Roberto","family":"Nardone","sequence":"first","affiliation":[{"name":"University of Naples &#x2018;Parthenope&#x2019; Centro Direzionale,Napoli,Italy,80133"}]},{"given":"Alfredo","family":"Petruolo","sequence":"additional","affiliation":[{"name":"University of Naples &#x2018;Parthenope&#x2019; Centro Direzionale,Napoli,Italy,80133"}]},{"given":"Federica","family":"Uccello","sequence":"additional","affiliation":[{"name":"University of Naples &#x2018;Parthenope&#x2019; Centro Direzionale,Napoli,Italy,80133"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData52589.2021.9671674"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-024-18181-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-021-09573-y"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/app10124102"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488030"},{"journal-title":"Exploring the opportunities and limitations of current threat intelligence platforms","year":"2018","key":"ref6"},{"volume-title":"Specification: Ids clearing house","year":"2021","author":"Bastiaansen","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.06.036"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101653"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.011599"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3101842"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2021.3117998"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2980802"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103397"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2020.104197"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103768"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.36222\/ejt.1402149"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI54926.2021.00060"},{"key":"ref19","article-title":"A framework for fine-grained data integration and curation, with provenance, in a dataspace","volume-title":"Workshop on the Theory and Practice of Provenance","author":"Archer","year":"2009"},{"volume-title":"White paper: What is a data space?","year":"2022","author":"Hub","key":"ref20"},{"volume-title":"Position paper: Design principles for data spaces","year":"2022","key":"ref21"},{"article-title":"Title of the publication,\u201d Publications Office of the European Union","volume-title":"Tech. Rep.","year":"2023","key":"ref22"},{"volume-title":"Data spaces","year":"2024","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3334516"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA230231"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_20"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1559\/152304091783786718"},{"key":"ref28","article-title":"Provenance of e-science experiments-experience from bioinformatics","author":"Greenwood","year":"2003","journal-title":"The UK OST e-Science second All Hands Meeting 2003 (AHM03), Nottingham, United Kingdom, 2003"},{"volume-title":"Gaia-x and ids","author":"Otto","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5753\/sbbd.2020.13621"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605043"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/app132413060"}],"event":{"name":"2024 IEEE International Conference on Cyber Security and Resilience (CSR)","start":{"date-parts":[[2024,9,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2024,9,4]]}},"container-title":["2024 IEEE International Conference on Cyber Security and Resilience (CSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10679369\/10679342\/10679405.pdf?arnumber=10679405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T05:21:12Z","timestamp":1727241672000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10679405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/csr61664.2024.10679405","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}