{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:53:34Z","timestamp":1766451214368,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/icsenst.2018.8603595","type":"proceedings-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T02:49:59Z","timestamp":1548298199000},"page":"45-51","source":"Crossref","is-referenced-by-count":19,"title":["Modeling Identity for the Internet of Things: Survey, Classification and Trends"],"prefix":"10.1109","author":[{"given":"Shantanu","family":"Pal","sequence":"first","affiliation":[]},{"given":"Michael","family":"Hitchens","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Varadharajan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"article-title":"IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT","year":"2016","author":"miettinen","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9697-0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2012.15"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3007204"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.072412.00129"},{"article-title":"IoTSense: Behavioral Fingerprinting of IoT Devices","year":"2018","author":"bezawada","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3185089.3185132"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2016.7740343"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICITCS.2014.7021724"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1325-8_6"},{"article-title":"Internet of Things: Survey on Security and Privacy","year":"2017","author":"mendez","key":"ref40"},{"key":"ref11","first-page":"604","article-title":"Capability-based access control delegation model on the federated IoT network","author":"anggorojati","year":"0","journal-title":"Proc WPMC"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1102486.1102491"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00217-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2011.06.008"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906948"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1866855.1866866"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCO.2016.7831324"},{"article-title":"Credential Design in Attribute-Based Identity Management","year":"2013","author":"alp\u00e1r","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2010.20"},{"article-title":"Gartner says 6.4 billion connected &#x201C;things&#x201D; will be in use in 2016","year":"0","author":"meulen","key":"ref4"},{"key":"ref27","first-page":"66","article-title":"Architecture patterns for a ubiquitous identity management system","author":"fongen","year":"0","journal-title":"Proc of ICON"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58424-9_9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2004.1337889"},{"key":"ref29","first-page":"287","article-title":"A survey of Identity Management technology","author":"cao","year":"0","journal-title":"IEEE International Conference on Information Theory and Information Security"},{"article-title":"User Centric Identity Management","year":"2005","author":"j?sang","key":"ref5"},{"key":"ref8","first-page":"461","article-title":"New Directions in IoT Privacy Using Attribute-based Authentication","author":"alp\u00e1r","year":"0","journal-title":"Proc CF"},{"key":"ref7","first-page":"99","article-title":"Trust Requirements in Identity Management","volume":"44","author":"j?sang","year":"0","journal-title":"Proc ACS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref9","article-title":"The Laws of Identity","author":"cameron","year":"2005","journal-title":"Tech Rep"},{"key":"ref1","article-title":"That &#x2018;Internet of Things&#x2019; Thing","author":"ashton","year":"2009","journal-title":"RFID Journal"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14439-9_2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2015.67"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SECUREWARE.2007.4385303"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2016.7804984"},{"article-title":"A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services","year":"2007","author":"jorns","key":"ref23"},{"article-title":"The Identity Crisis. Security, Privacy and Usability Issues in Identity Management","year":"2011","author":"alp\u00e1r","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2010.28"}],"event":{"name":"2018 12th International Conference on Sensing Technology (ICST)","start":{"date-parts":[[2018,12,4]]},"location":"Limerick","end":{"date-parts":[[2018,12,6]]}},"container-title":["2018 12th International Conference on Sensing Technology (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8589964\/8603546\/08603595.pdf?arnumber=8603595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T03:34:20Z","timestamp":1598240060000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8603595\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icsenst.2018.8603595","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}