{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:25Z","timestamp":1725808405662},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_10","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"85-95","source":"Crossref","is-referenced-by-count":18,"title":["Security, Trust and Implementation Limitations of Prominent IoT Platforms"],"prefix":"10.1007","author":[{"given":"Shiju","family":"Satyadevan","sequence":"first","affiliation":[]},{"given":"Boney S.","family":"Kalarickal","sequence":"additional","affiliation":[]},{"given":"M. K.","family":"Jinesh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"IERC \u201cAbout IoT\u201d, \n http:\/\/www.internet-of-things-research.eu\/about_iot.htm"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L. Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: A survey. Computer Networks\u00a054, 2787\u20132805 (2010)","journal-title":"Computer Networks"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Chaqfeh, M.A., Mohamed, N.: Challenges in middleware solutions for the internet of things. In: 2012 International Conference on Collaboration Technologies and Systems (CTS), May 21-25, pp. 21\u201326 (2012)","DOI":"10.1109\/CTS.2012.6261022"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Bandyopadhyay, S., Sengupta, M., Maiti, S., Dutta, S.: Role of Middleware for Internet of things: A Study. International Journal of Computer Science & Engineering Survey (IJCSES)\u00a02(3) (August 2011), doi:10.5121\/ijcses.2011.230794","DOI":"10.5121\/ijcses.2011.2307"},{"key":"10_CR5","unstructured":"Mayer, C.P.: Security and Privacy Challenges in the Internet of Things. In: Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen, WowKiVS 2009 (2009)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Castro, M., Jara, A.J., Skarmeta, A.F.: An Analysis of M2M Platforms: Challenges and Opportunities for the Internet of Things. In: 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), July 4-6, pp. 757\u2013762 (2012)","DOI":"10.1109\/IMIS.2012.184"},{"key":"10_CR7","unstructured":"Carriots: M2M Cloud Based IoT platform, \n https:\/\/www.carriots.com\/documentation\/carriots_ecosystem#introduction"},{"key":"10_CR8","unstructured":"Xively: Public cloud, \n https:\/\/xively.com\/dev\/docs\/api\/"},{"key":"10_CR9","unstructured":"ThingSpeak: Open source platform, \n http:\/\/community.thingspeak.com\/documentation\/api\/"},{"key":"10_CR10","unstructured":"RunMyProcess: Enterprise platform, \n https:\/\/www.runmyprocess.com"},{"key":"10_CR11","unstructured":"Hydra: A network embedded middleware, \n http:\/\/www.hydramiddleware.eu\/articles.php?article_id=68"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Kominers, P.: Interoperability Case Study: Internet of Things (IoT) (April 1, 2012), Berkman Center Research Publication No. 2012-10. Available at SSRN: \n http:\/\/ssrn.com\/abstract=2046984\n or \n http:\/\/dx.doi.org\/10.2139\/ssrn.2046984","DOI":"10.2139\/ssrn.2046984"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Sha, L., Gopalakrishnan, S., Liu, X., Wang, Q.: Cyber-Physical Systems: A New Frontier. In: IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, SUTC 2008, June 11-13, pp. 1\u20139 (2008)","DOI":"10.1109\/SUTC.2008.85"},{"issue":"1","key":"10_CR14","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"26","author":"R.H. Weber","year":"2010","unstructured":"Weber, R.H.: Internet of Things \u2013 New security and privacy challenges. Computer Law & Security Review\u00a026(1), 23\u201330 (2010), \n http:\/\/dx.doi.org\/10.1016\/j.clsr.2009.11.008\n ISSN 0267-3649","journal-title":"Computer Law & Security Review"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T00:18:42Z","timestamp":1674173922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_10","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}