{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:10Z","timestamp":1750306690134,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2591062.2591201","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"739-741","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Privacy and security requirements framework for the internet of things (IoT)"],"prefix":"10.1145","author":[{"given":"Israa","family":"Alqassem","sequence":"first","affiliation":[{"name":"Masdar Institute of Science and Technology, United Arab Emirates"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. 7th ACM Workshop on Hot Topics in Networks (Hotnets-VII)","author":"Buettner M.","year":"2008","unstructured":"M. Buettner , B. Greenstein , A. Sample , J. R. Smith , and D. Wetherall . Revisiting smart dust with RFID sensor networks . In Proc. 7th ACM Workshop on Hot Topics in Networks (Hotnets-VII) , Calgary, Alberta, Canada , 2008 . M. Buettner, B. Greenstein, A. Sample, J. R. Smith, and D. Wetherall. Revisiting smart dust with RFID sensor networks. In Proc. 7th ACM Workshop on Hot Topics in Networks (Hotnets-VII), Calgary, Alberta, Canada, 2008."},{"key":"e_1_3_2_1_4_1","first-page":"3","volume-title":"Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on","author":"Franch X.","year":"2012","unstructured":"X. Franch . The i* framework : The way ahead . In Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on , pages 1\u2013 3 , May 2012 . X. Franch. The i* framework: The way ahead. In Research Challenges in Information Science (RCIS), 2012 Sixth International Conference on, pages 1\u20133, May 2012."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/942807.943910"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.44"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2013.6636709"},{"key":"e_1_3_2_1_10_1","first-page":"249","volume-title":"The Internet of Things","author":"Tedjini S.","unstructured":"S. Tedjini , E. Perret , V. Deepu , and M. Bernier . Chipless tags, the next rfid frontier . In D. Giusto, A. Iera, G. Morabito, and L. Atzori, editors, The Internet of Things , pages 239\u2013 249 . Springer New York, 2010. S. Tedjini, E. Perret, V. Deepu, and M. Bernier. Chipless tags, the next rfid frontier. In D. Giusto, A. Iera, G. Morabito, and L. Atzori, editors, The Internet of Things, pages 239\u2013249. Springer New York, 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2835417.2835422"},{"key":"e_1_3_2_1_12_1","series-title":"Lecture Notes in Computer Science","first-page":"194","volume-title":"R. Falcone, M. Singh, and Y.-H","author":"Yu E.","unstructured":"E. Yu and L. Liu . Modelling trust for system design using the i * strategic actors framework . In R. Falcone, M. Singh, and Y.-H . Tan, editors, Trust in Cyber-societies , volume 2246 of Lecture Notes in Computer Science , pages 175\u2013 194 . Springer Berlin Heidelberg, 2001. E. Yu and L. Liu. Modelling trust for system design using the i * strategic actors framework. In R. Falcone, M. Singh, and Y.-H. Tan, editors, Trust in Cyber-societies, volume 2246 of Lecture Notes in Computer Science, pages 175\u2013194. Springer Berlin Heidelberg, 2001."}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Companion Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591201","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2591062.2591201","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:30Z","timestamp":1750230090000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591201"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":12,"alternative-id":["10.1145\/2591062.2591201","10.1145\/2591062"],"URL":"https:\/\/doi.org\/10.1145\/2591062.2591201","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}