{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:55Z","timestamp":1750221055312,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3277593.3277615","type":"proceedings-article","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T19:40:57Z","timestamp":1539286857000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Towards designing open and secure IoT systems"],"prefix":"10.1145","author":[{"given":"Bahtijar","family":"Vogel","sequence":"first","affiliation":[{"name":"Malmo University, Malmo, Sweden"}]},{"given":"Rimpu","family":"Varshney","sequence":"additional","affiliation":[{"name":"Sony Mobile Communications AB, Lund, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.04.002"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.12.004"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7841030"},{"key":"e_1_3_2_1_4_1","unstructured":"Boddy S. and Shattuck J. Threat analysis report The hunt for IOT. F5Labs. https:\/\/www.f5.com\/content\/dam\/f5\/downloads\/F5_Labs_Hunt_for_IOT_Vol_3_rev09AUG17.pdf.  Boddy S. and Shattuck J. Threat analysis report The hunt for IOT. F5Labs. https:\/\/www.f5.com\/content\/dam\/f5\/downloads\/F5_Labs_Hunt_for_IOT_Vol_3_rev09AUG17.pdf."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868419"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151346"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.01.033"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_9_1","unstructured":"IoT Security Foundation Accessed: 2018. https:\/\/www.iotsecurityfoundation.org\/about-us\/.  IoT Security Foundation Accessed: 2018. https:\/\/www.iotsecurityfoundation.org\/about-us\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-09-2017-0066"},{"key":"e_1_3_2_1_11_1","unstructured":"Kitchenham B. Procedures for performing systematic reviews.  Kitchenham B. Procedures for performing systematic reviews."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Mansfield-Devine S. Open source and the internet of things. 14--19.  Mansfield-Devine S. Open source and the internet of things. 14--19.","DOI":"10.1016\/S1353-4858(18)30016-3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.06.002"},{"key":"e_1_3_2_1_15_1","unstructured":"Petersen H. Baccelli E. and Whlisch M. Interoperable services on constrained devices in the internet of things.  Petersen H. Baccelli E. and Whlisch M. Interoperable services on constrained devices in the internet of things."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41265-017-0049-3"},{"key":"e_1_3_2_1_17_1","first-page":"2","article-title":"A roadmap for security challenges in the internet of things","volume":"4","author":"Sfar A. R.","year":"2018","journal-title":"Digital Communications and Networks"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"volume-title":"Towards Designing Open Secure IoT System Insights for practitioners. Thesis Dissertation","year":"2018","author":"Varshney R.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3129790.3129793"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.70"}],"event":{"name":"IOT '18: 8th International Conference on the Internet of Things","acronym":"IOT '18","location":"Santa Barbara California USA"},"container-title":["Proceedings of the 8th International Conference on the Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3277593.3277615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3277593.3277615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:25Z","timestamp":1750207465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3277593.3277615"}},"subtitle":["insights for practitioners"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":21,"alternative-id":["10.1145\/3277593.3277615","10.1145\/3277593"],"URL":"https:\/\/doi.org\/10.1145\/3277593.3277615","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}