{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:20:05Z","timestamp":1774365605494,"version":"3.50.1"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/percomw.2017.7917633","type":"proceedings-article","created":{"date-parts":[[2017,5,4]],"date-time":"2017-05-04T20:32:54Z","timestamp":1493929974000},"page":"612-617","source":"Crossref","is-referenced-by-count":8,"title":["Toward consumer-friendly security in smart environments"],"prefix":"10.1109","author":[{"given":"Ruth M.","family":"Ogunnaike","sequence":"first","affiliation":[]},{"given":"Brent","family":"Lagesse","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CCIS.2012.6664544"},{"key":"ref11","first-page":"604","article-title":"Capability-based access control delegation model on the federated IoT network","author":"anggorojati","year":"2012","journal-title":"2012 15th International Symposium on Wireless Personal Multimedia Communications (WPMC)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/EMTC.2014.6996632"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2513672"},{"key":"ref14","author":"shue","year":"2015","journal-title":"United States Patent 9081960 - Architecture for removable media USB-ARM"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2015.7405613"},{"key":"ref4","first-page":"800","article-title":"Systems security engineering: Considerations for a multidisciplinary approach in the engineering of trustworthy secure systems","author":"abomhara","year":"2016","journal-title":"NIST Special Publication"},{"key":"ref3","author":"gallagher","year":"0","journal-title":"Double-dip Internet-of-Things botnet attack felt across the Internet | Ars Technica"},{"key":"ref6","year":"0","journal-title":"A Clustering Approach for Web Vulnerabilities Detection"},{"key":"ref5","first-page":"1","author":"stanislav","year":"2015","journal-title":"Hacking iot A case study on baby monitor exposures and vulnerabilities"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2015.9"},{"key":"ref7","year":"0","journal-title":"lot security guidance"},{"key":"ref2","year":"0","journal-title":"Security testing the internet of things iot"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412116"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DT.2014.6868693"}],"event":{"name":"2017 IEEE International Conference on Pervasive Computing and Communications: Workshops (PerCom Workshops)","location":"Kona, HI","start":{"date-parts":[[2017,3,13]]},"end":{"date-parts":[[2017,3,17]]}},"container-title":["2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7911894\/7917470\/07917633.pdf?arnumber=7917633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T03:50:54Z","timestamp":1556250654000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7917633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/percomw.2017.7917633","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}