{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:01:00Z","timestamp":1766268060902,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,22]],"date-time":"2017-05-22T00:00:00Z","timestamp":1495411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Regional Development Fund"},{"name":"Science Foundation Ireland","award":["13\/RC\/2094"],"award-info":[{"award-number":["13\/RC\/2094"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,22]]},"DOI":"10.1145\/3120459.3120471","type":"proceedings-article","created":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T12:25:25Z","timestamp":1502799925000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Security challenges in IoT development"],"prefix":"10.1145","author":[{"given":"Anh Nguyen","family":"Duc","sequence":"first","affiliation":[{"name":"NTNU., Trondheim, S\u00f8r-Tr\u00f8ndelag, Norway"}]},{"given":"Ronald","family":"Jabangwe","sequence":"additional","affiliation":[{"name":"Dundalk Institute of Technology, Dundalk, Co.Louth, Ireland"}]},{"given":"Pangkaj","family":"Paul","sequence":"additional","affiliation":[{"name":"Dundalk Institute of Technology, Dundalk, Co.Louth, Ireland"}]},{"given":"Pekka","family":"Abrahamsson","sequence":"additional","affiliation":[{"name":"NTNU., Trondheim, S\u00f8r-Tr\u00f8ndelag, Norway"}]}],"member":"320","published-online":{"date-parts":[[2017,5,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/QUATIC.2016.028"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TENSYMP.2015.25"},{"key":"e_1_3_2_1_3_1","volume-title":"First ACM Workshop on Business Driven Security Engineering (BizSec)","author":"Beznosov Konstantin","year":"2003","unstructured":"Konstantin Beznosov . 2003 . Extreme security engineering: On employing XP practices to achieve'good enough security'without defining it . In First ACM Workshop on Business Driven Security Engineering (BizSec) . Fairfax, VA. Konstantin Beznosov. 2003. Extreme security engineering: On employing XP practices to achieve'good enough security'without defining it. In First ACM Workshop on Business Driven Security Engineering (BizSec). Fairfax, VA."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2015.7154707"},{"key":"e_1_3_2_1_5_1","volume-title":"Role-based Extreme Programming (XP) For Secure Software Development. Special Issue-Agile Symposium 25","author":"Ghani Imran","year":"2013","unstructured":"Imran Ghani , Nor Izzaty , and Adila Firdaus . 2013 . Role-based Extreme Programming (XP) For Secure Software Development. Special Issue-Agile Symposium 25 (2013), 1071--1074. Issue 4. Imran Ghani, Nor Izzaty, and Adila Firdaus. 2013. Role-based Extreme Programming (XP) For Secure Software Development. Special Issue-Agile Symposium 25 (2013), 1071--1074. Issue 4."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2015.47"},{"key":"e_1_3_2_1_7_1","volume-title":"Is there a single method for the Internet of Things? Ivar Jacobson International","author":"Jacobson Ivar","year":"2016","unstructured":"Ivar Jacobson , Ian Spence , and Pan Wei Ng. 2016. Is there a single method for the Internet of Things? Ivar Jacobson International ( 2016 ). Ivar Jacobson, Ian Spence, and Pan Wei Ng. 2016. Is there a single method for the Internet of Things? Ivar Jacobson International (2016)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0761-7"},{"key":"e_1_3_2_1_9_1","volume-title":"IoT platforms: enabling the Internet of Things. IHS Technology - Whitepaper","author":"Lucero Sam","year":"2016","unstructured":"Sam Lucero . 2016. IoT platforms: enabling the Internet of Things. IHS Technology - Whitepaper ( 2016 ), 1--21. Sam Lucero. 2016. IoT platforms: enabling the Internet of Things. IHS Technology - Whitepaper (2016), 1--21."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.10.001"},{"key":"e_1_3_2_1_11_1","volume-title":"Recommendations of the National Institute of Standards and Technology, 53A","author":"National Institute of Standards and Technology (Joint Task Force Transformation Initiative). 2014.","year":"2014","unstructured":"National Institute of Standards and Technology (Joint Task Force Transformation Initiative). 2014. Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans. Special Publication 800-53A , Recommendations of the National Institute of Standards and Technology, 53A ( 2014 ), 487. National Institute of Standards and Technology (Joint Task Force Transformation Initiative). 2014. Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans. Special Publication 800-53A, Recommendations of the National Institute of Standards and Technology, 53A (2014), 487."},{"volume-title":"Core Software Security: Security at the Source","author":"Ransome James","key":"e_1_3_2_1_12_1","unstructured":"James Ransome and Anmol Misra . 2013. Core Software Security: Security at the Source . CRC Press . James Ransome and Anmol Misra. 2013. Core Software Security: Security at the Source. CRC Press."},{"volume-title":"The coding manual for qualitative researchers","author":"Salda\u00f1a Johnny","key":"e_1_3_2_1_13_1","unstructured":"Johnny Salda\u00f1a . 2015. The coding manual for qualitative researchers . Sage . Johnny Salda\u00f1a. 2015. The coding manual for qualitative researchers. Sage."},{"key":"e_1_3_2_1_14_1","volume-title":"International journal of multimedia and ubiquitous engineering 2, 2","author":"Sattarova Feruza Y","year":"2007","unstructured":"Y Sattarova Feruza and Tao-hoon Kim. 2007. IT security review: Privacy, protection, access control, assurance and system security . International journal of multimedia and ubiquitous engineering 2, 2 ( 2007 ), 17--31. Y Sattarova Feruza and Tao-hoon Kim. 2007. IT security review: Privacy, protection, access control, assurance and system security. International journal of multimedia and ubiquitous engineering 2, 2 (2007), 17--31."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23756-0_19"},{"volume-title":"Threat Modeling","author":"Swiderski Frank","key":"e_1_3_2_1_16_1","unstructured":"Frank Swiderski and Window Snyder . 2004. Threat Modeling . Microsoft Press , Redmond, WA, USA . Frank Swiderski and Window Snyder. 2004. Threat Modeling. Microsoft Press, Redmond, WA, USA."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"}],"event":{"name":"XP '17 Workshops: Proceedings of the Scientific Workshops of XP2017","acronym":"XP '17 Workshops","location":"Cologne Germany"},"container-title":["Proceedings of the XP2017 Scientific Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3120459.3120471","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3120459.3120471","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:04Z","timestamp":1750273504000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3120459.3120471"}},"subtitle":["a software engineering perspective"],"short-title":[],"issued":{"date-parts":[[2017,5,22]]},"references-count":17,"alternative-id":["10.1145\/3120459.3120471","10.1145\/3120459"],"URL":"https:\/\/doi.org\/10.1145\/3120459.3120471","relation":{},"subject":[],"published":{"date-parts":[[2017,5,22]]},"assertion":[{"value":"2017-05-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}