{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T04:07:40Z","timestamp":1729051660149},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/iotsms62296.2024.10710195","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:50Z","timestamp":1728926570000},"page":"218-223","source":"Crossref","is-referenced-by-count":0,"title":["From Cloud to IoT Device Authenticity under Kubernetes Management"],"prefix":"10.1109","author":[{"given":"George","family":"Kornaros","sequence":"first","affiliation":[{"name":"Hellenic Mediteranean Univ.,ECE Dept.,Iraklio,Greece"}]},{"given":"Dimitris","family":"Bakoyiannis","sequence":"additional","affiliation":[{"name":"Hellenic Mediteranean Univ.,ECE Dept.,Iraklio,Greece"}]},{"given":"Othon","family":"Tomoutzoglou","sequence":"additional","affiliation":[{"name":"Hellenic Mediteranean Univ.,ECE Dept.,Iraklio,Greece"}]},{"given":"Marcello","family":"Coppola","sequence":"additional","affiliation":[{"name":"STM,Grenoble,France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2918437"},{"year":"2023","key":"ref2","article-title":"Threat Model and Security Protection Analysis"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174679"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56326-3_12"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3179047"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2024.05.014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3558779"},{"year":"2023","key":"ref8","article-title":"The Secure Production Identity Framework For Everyone (SPIFFE) Project"},{"article-title":"Zero Trust Architecture, NIST Special Publication 800\u2013207","year":"2024","author":"Rose","key":"ref9"},{"year":"2023","key":"ref10","article-title":"Security"},{"article-title":"Kubernetes Native Policy Management","issue":"io","year":"2024","key":"ref11"},{"volume-title":"The Falco Project","year":"2024","key":"ref12"},{"year":"2024","key":"ref13","article-title":"eBPF-based Networking, Observability, Security"},{"year":"2024","key":"ref14","article-title":"Multicloud communication for Kubernetes"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-1274-8_20"},{"author":"Brasser","key":"ref16","article-title":"Trusted container extensions for container-based confidential computing"},{"year":"2024","key":"ref17","article-title":"STM32WB-WBA Bluetooth LE Security"},{"journal-title":"dS13039 Rev 1","article-title":"STSAFE-A110, Authentication, state-of-the-art security for peripherals and IoT devices","year":"2024","key":"ref18"}],"event":{"name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","start":{"date-parts":[[2024,9,2]]},"location":"Malm\u00f6, Sweden","end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710136\/10710182\/10710195.pdf?arnumber=10710195","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:56:29Z","timestamp":1728968189000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710195\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/iotsms62296.2024.10710195","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}