{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:18:19Z","timestamp":1761401899012,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/sera.2017.7965758","type":"proceedings-article","created":{"date-parts":[[2017,7,3]],"date-time":"2017-07-03T16:42:12Z","timestamp":1499100132000},"page":"401-406","source":"Crossref","is-referenced-by-count":11,"title":["Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle"],"prefix":"10.1109","author":[{"given":"Florian","family":"Kammuller","sequence":"first","affiliation":[]},{"given":"Juan C.","family":"Augusto","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Jones","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-014-9358-1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/2192-1962-3-12"},{"journal-title":"Secrets and Lies Digital Security in a Networked World","year":"2004","author":"schneier","key":"ref12"},{"journal-title":"Bluetooth","year":"0","key":"ref13"},{"journal-title":"ECMA-404 The JSON Data Interchange Standard","year":"2017","key":"ref14"},{"journal-title":"Web services security Soap message security working draft 13 document identifier Wss Soap message security-13","year":"2002","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/ijsi.2013070105"},{"key":"ref17","article-title":"Energy-efficient computing solutions for internet of things with zigbee reconfigurable devices","volume":"4","author":"chmai","year":"2016","journal-title":"International Journal of Software Innovation (IJSI)"},{"key":"ref4","article-title":"Modeling and verification of insider threats using logical analysis","author":"kamm\u00fcller","year":"2016","journal-title":"IEEE Systems Journal Special issue on Insider Threats to Information Security Digital Espionage and Counter Intelligence"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54792-8_16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_24"},{"key":"ref5","first-page":"1","author":"said","year":"2014","journal-title":"Model-driven information flow security for component-based systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IE.2014.47"},{"key":"ref7","article-title":"Human centric security and privacy for the iot using formal techniques","author":"kamm\u00fcller","year":"2017","journal-title":"3d Int Conf on Human Factors in Cybersecurity"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.27"},{"journal-title":"Success Secure accessibility for the internet of things","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-016-0514-8"}],"event":{"name":"2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA)","start":{"date-parts":[[2017,6,7]]},"location":"London, United Kingdom","end":{"date-parts":[[2017,6,9]]}},"container-title":["2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7956014\/7965690\/07965758.pdf?arnumber=7965758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T00:00:00Z","timestamp":1506988800000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7965758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/sera.2017.7965758","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}