{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:26:44Z","timestamp":1765888004059,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,22]],"date-time":"2018-05-22T00:00:00Z","timestamp":1526947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,22]]},"DOI":"10.1145\/3198458.3198459","type":"proceedings-article","created":{"date-parts":[[2018,5,25]],"date-time":"2018-05-25T12:39:28Z","timestamp":1527251968000},"page":"39-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space"],"prefix":"10.1145","author":[{"given":"Gerd S.","family":"Brost","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Manuel","family":"Huber","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Michael","family":"Wei\u00df","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Mykolai","family":"Protsenko","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Julian","family":"Sch\u00fctte","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]},{"given":"Sascha","family":"Wessel","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching near Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,5,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Fraunhofer AISEC. 2018. trustm3 is trust|me. (2018). https:\/\/github.com\/trustm3. Accessed: 2018-03--17.  Fraunhofer AISEC. 2018. trustm3 is trust|me. (2018). https:\/\/github.com\/trustm3. Accessed: 2018-03--17."},{"key":"e_1_3_2_1_2_1","unstructured":"OSGi Alliance. 2018. Architecture. (2018). https:\/\/www.osgi.org\/developer\/architecture\/. Accessed: 2018-03--17.  OSGi Alliance. 2018. Architecture. (2018). https:\/\/www.osgi.org\/developer\/architecture\/. Accessed: 2018-03--17."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"e_1_3_2_1_4_1","unstructured":"Industrial Data Space Association. 2018. IoT edge platform \"Trusted Connector\". (2018). https:\/\/github.com\/industrial-data-space\/trusted-connector. Accessed: 2018-03--17.  Industrial Data Space Association. 2018. IoT edge platform \"Trusted Connector\". (2018). https:\/\/github.com\/industrial-data-space\/trusted-connector. Accessed: 2018-03--17."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2014.51"},{"volume-title":"Exploring Container Virtualization in IoT Clouds. In IEEE International Conference on Smart Computing (SMARTCOMP). 1--6.","author":"Celesti A.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389791"},{"key":"e_1_3_2_1_9_1","unstructured":"OpenFog Consortium. 2018. OpenFog Reference Architecture. (2018). https:\/\/www.openfogconsortium.org\/ra. Accessed: 2018-03--17.  OpenFog Consortium. 2018. OpenFog Reference Architecture. (2018). https:\/\/www.openfogconsortium.org\/ra. Accessed: 2018-03--17."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541946"},{"key":"e_1_3_2_1_11_1","unstructured":"Google Developers. 2018. Protocol Buffers - Google's data interchange format. (2018). https:\/\/github.com\/google\/protobuf. Accessed: 2018-03--17.  Google Developers. 2018. Protocol Buffers - Google's data interchange format. (2018). https:\/\/github.com\/google\/protobuf. Accessed: 2018-03--17."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Maria Fazio Antonio Celesti and Massimo Villari. 2013. Design of a Message-Oriented Middleware for Cooperating Clouds. Springer Berlin Heidelberg Berlin Heidelberg 25--36.  Maria Fazio Antonio Celesti and Massimo Villari. 2013. Design of a Message-Oriented Middleware for Cooperating Clouds. Springer Berlin Heidelberg Berlin Heidelberg 25--36.","DOI":"10.1007\/978-3-642-45364-9_3"},{"volume-title":"An Updated Performance Comparison of Virtual Machines and Linux Containers. In 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). 171--172","author":"Felter W.","key":"e_1_3_2_1_13_1"},{"volume-title":"Proceedings of 11th annual computer security application conference. 241--48","year":"1995","author":"Ferraiolo David","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DataCloud.2014.6"},{"key":"e_1_3_2_1_16_1","unstructured":"Ken Goldman. 2018. IBM's TPM 2.0 TSS. (2018). https:\/\/sourceforge.net\/projects\/ibmtpm20tss\/. Accessed: 2018-03--17.  Ken Goldman. 2018. IBM's TPM 2.0 TSS. (2018). https:\/\/sourceforge.net\/projects\/ibmtpm20tss\/. Accessed: 2018-03--17."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.51"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-38898-4_25"},{"volume-title":"Xen on ARM: System Virtualization Using Xen Hypervisor for ARM- Based Secure Mobile Phones. In Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE. 257--261","year":"2008","author":"Hwang Joo-Young","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377856"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600427"},{"volume-title":"Docker: Lightweight Linux Containers for Consistent Development and Deployment. Linux Journal 239","year":"2014","author":"Merkel Dirk","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Davide Mulfari Maria Fazio Antonio Celesti Massimo Villari and Antonio Puliafito. 2016. Design of an IoT Cloud System for Container Virtualization on Smart Objects. Springer International Publishing Cham 33--47.  Davide Mulfari Maria Fazio Antonio Celesti Massimo Villari and Antonio Puliafito. 2016. Design of an IoT Cloud System for Container Virtualization on Smart Objects. Springer International Publishing Cham 33--47.","DOI":"10.1007\/978-3-319-33313-7_3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_1_25_1","unstructured":"B Otto S Auer J Cirullies J J\u00fcrjens N Menz J Schon and S Wenzel. 2016. Industrial Data Space: Digital Sovereignity over Data. Whitepaper Fraunhofer-Gesellschaft Munich (2016).  B Otto S Auer J Cirullies J J\u00fcrjens N Menz J Schon and S Wenzel. 2016. Industrial Data Space: Digital Sovereignity over Data. Whitepaper Fraunhofer-Gesellschaft Munich (2016)."},{"key":"e_1_3_2_1_26_1","unstructured":"B Otto S Lohmann S Auer G Brost J Cirullies A Eitel T Ernst C Haas M Huber C Jung etal 2017. Reference Architecture Model for the Industrial Data Space. Fraunhofer-Gesellschaft Munich (2017).  B Otto S Lohmann S Auer G Brost J Cirullies A Eitel T Ernst C Haas M Huber C Jung et al. 2017. Reference Architecture Model for the Industrial Data Space. Fraunhofer-Gesellschaft Munich (2017)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2015.35"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507722"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_30_1","unstructured":"Thomas F. J.-M. Pasquier Jatinder Singh David M. Eyers and Jean Bacon. 2015. CamFlow: Managed Data-sharing for Cloud Services. CoRR abs\/1506.04391 (2015).  Thomas F. J.-M. Pasquier Jatinder Singh David M. Eyers and Jean Bacon. 2015. CamFlow: Managed Data-sharing for Cloud Services. CoRR abs\/1506.04391 (2015)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-016-9366-y"},{"volume-title":"Advanced Security Considerations in the Arrowhead Framework. In International Conference on Computer Safety, Reliability, and Security. Springer, 234--245","year":"2016","author":"Pl\u00f3sz S\u00e1ndor","key":"e_1_3_2_1_32_1"},{"volume-title":"Proc. 5th Intl. Workshop on Security and Trust Management. 124--137","year":"2009","author":"Pretschner Alexander","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151053"},{"key":"e_1_3_2_1_35_1","unstructured":"resin.io. 2018. resinOS - Introduction. (2018). https:\/\/resinos.io\/docs\/. Accessed: 2018-03--17.  resin.io. 2018. resinOS - Introduction. (2018). https:\/\/resinos.io\/docs\/. Accessed: 2018-03--17."},{"key":"e_1_3_2_1_36_1","unstructured":"Otavio Salvador and Daiane Angolini. 2014. Embedded Linux Development with Yocto Project. Packt Publishing Ltd.   Otavio Salvador and Daiane Angolini. 2014. Embedded Linux Development with Yocto Project. Packt Publishing Ltd."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2016.127"},{"volume-title":"Performance Comparison Analysis of Linux Container and Virtual Machine for Building Cloud. In Conference: Networking and Communication","year":"2014","author":"Seo Kyoung-Taek","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143461"},{"key":"e_1_3_2_1_43_1","unstructured":"Steffen Wagner Sergej Proskurin and Tamas Bakos. 2018. TPM 2.0 Simulator Extraction Script. (2018). https:\/\/github.com\/stwagnr\/tpm2simulator. Accessed: 2018-03--17.  Steffen Wagner Sergej Proskurin and Tamas Bakos. 2018. TPM 2.0 Simulator Extraction Script. (2018). https:\/\/github.com\/stwagnr\/tpm2simulator. Accessed: 2018-03--17."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.02.005"},{"volume-title":"White Paper: Linux Containers - Where Enterprise Meets Embedded Operating Environments. Technical Report","year":"2016","author":"Systems Wind River","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23164"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108906.1108908"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2008.79"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 4th ACM Workshop on Cyber-Physical System Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3198458.3198459","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3198458.3198459","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:24Z","timestamp":1750268964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3198458.3198459"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,22]]},"references-count":48,"alternative-id":["10.1145\/3198458.3198459","10.1145\/3198458"],"URL":"https:\/\/doi.org\/10.1145\/3198458.3198459","relation":{},"subject":[],"published":{"date-parts":[[2018,5,22]]},"assertion":[{"value":"2018-05-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}