{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T06:38:16Z","timestamp":1759991896749,"version":"3.44.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845514","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:42:54Z","timestamp":1486658574000},"page":"627-632","source":"Crossref","is-referenced-by-count":19,"title":["Security certification and labelling in Internet of Things"],"prefix":"10.1109","author":[{"given":"Gianmarco","family":"Baldini","sequence":"first","affiliation":[{"name":"European Commission - Joint Research Centre, Ispra, Italy"}]},{"given":"Antonio","family":"Skarmeta","sequence":"additional","affiliation":[{"name":"University of Murcia, Murcia, Spain"}]},{"given":"Elizabeta","family":"Fourneret","sequence":"additional","affiliation":[{"name":"Smartesting Solutions &amp; Services, Besancon, France"}]},{"given":"Ricardo","family":"Neisse","sequence":"additional","affiliation":[{"name":"European Commission - Joint Research Centre, Ispra, Italy"}]},{"given":"Bruno","family":"Legeard","sequence":"additional","affiliation":[{"name":"Smartesting Solutions &amp; Services, Besancon, France"}]},{"given":"Franck","family":"Le Gall","sequence":"additional","affiliation":[{"name":"Easy Global Marker, Sophia Antipolis, France"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.35"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-09770-1_12"},{"year":"2011","key":"ref12","article-title":"Security regulation, conformity assessment and certification final report volume 1: Main report"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264857"},{"key":"ref14","first-page":"47","article-title":"Towards agile security assurance","author":"beznosov","year":"2004","journal-title":"Proceedings of the 2004 Workshop on New Security Paradigms"},{"journal-title":"Common criteria reforms Better security products through increased cooperation with industry","year":"2011","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2014.91"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.42"},{"journal-title":"An Introduction to TTCN-3","year":"2011","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(03)00249-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2014.91"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2009.5347129"},{"key":"ref5","article-title":"800&#x2013;37","author":"nist","year":"2004","journal-title":"Guide for the Security Certification and Accreditation of Federal Information Systems"},{"journal-title":"Introduction to the common criteria for it security (iso 15408)","year":"1999","author":"troy","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2015.27"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.51"},{"year":"0","key":"ref9","article-title":"Common criteria"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1291535.1291545"},{"key":"ref21","article-title":"Mbeetle - un outil pour la generation de tests a-la-volee a l'aide de modeles","author":"lorrain","year":"2016","journal-title":"15th edition of Approches Formelles dans l'Assistance au Developpement Logiciels (AFADL) GDR-GPL"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2016,12,12]]},"location":"Reston, VA, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845514.pdf?arnumber=7845514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:43:39Z","timestamp":1755197019000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7845514\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845514","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}