{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T08:28:09Z","timestamp":1743323289366,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/giots.2019.8766425","type":"proceedings-article","created":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T19:46:38Z","timestamp":1563824798000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Architectural Patterns for Secure IoT Orchestrations"],"prefix":"10.1109","author":[{"given":"Konstantinos","family":"Fysarakis","sequence":"first","affiliation":[]},{"given":"George","family":"Spanoudakis","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Petroulakis","sequence":"additional","affiliation":[]},{"given":"Othonas","family":"Soultatos","sequence":"additional","affiliation":[]},{"given":"Arne","family":"Broring","sequence":"additional","affiliation":[]},{"given":"Tobias","family":"Marktscheffel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2012.6208741"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.36"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.10.001"},{"key":"ref12","first-page":"95","article-title":"A UML-Based Static Verification Framework for Security, Requirements","volume":"15","author":"siveroni","year":"2010","journal-title":"Engineering Journal"},{"key":"ref13","article-title":"Model checking adaptive multilevel service compositions","author":"rossi","year":"2010","journal-title":"Proc Int'l Workshop Formal Aspects of Component Software"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10383-4_27"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45391-9_48"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2690430"},{"key":"ref17","article-title":"Extensions to Pattern Formats for Cyber Physical Systems","author":"ma\u00f1a","year":"2014","journal-title":"Proceedings of the 31st Conference on Pattern Languages of Programs (PLoP&#x2019;14"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.028"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2017.8254082"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1011"},{"key":"ref4","article-title":"Discovering Secure Service Compositions","author":"pino","year":"2014","journal-title":"4th International Conference on Cloud Computing and Services Sciences (CLOSER 2014)"},{"key":"ref27","article-title":"WS-DIAMOND: an approach to Web Services - DIAgnosability, MONitoring and Diagnosis","author":"console","year":"2007","journal-title":"e-Challenges Conf 2007"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.021"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2018.8534570"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2012.6207773"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3131542.3131553"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70740"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-74947-1_17"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024687"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1035167.1035185"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2018.02.007"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.2533321"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/01639269.2014.964593"},{"key":"ref21","first-page":"58","article-title":"SOA4All: An innovative integrated approach to services composition","author":"l\u00e9cu\u00e9","year":"2010","journal-title":"IEEE International Conference on Web Services (ICWS"},{"journal-title":"Network Monitoring Tools","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858556"},{"journal-title":"Amazon CloudWatch","year":"0","key":"ref26"},{"journal-title":"Nagios","year":"0","key":"ref25"}],"event":{"name":"2019 Global IoT Summit (GIoTS)","start":{"date-parts":[[2019,6,17]]},"location":"Aarhus, Denmark","end":{"date-parts":[[2019,6,21]]}},"container-title":["2019 Global IoT Summit (GIoTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8764050\/8766345\/08766425.pdf?arnumber=8766425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:25:13Z","timestamp":1658247913000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8766425\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/giots.2019.8766425","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}