{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:50:41Z","timestamp":1740099041632,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,5]]},"DOI":"10.1145\/3137003.3137010","type":"proceedings-article","created":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T14:22:01Z","timestamp":1514557321000},"page":"8-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["An Architectural Mechanism for Resilient IoT Services"],"prefix":"10.1145","author":[{"given":"Hokeun","family":"Kim","sequence":"first","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"Eunsuk","family":"Kang","sequence":"additional","affiliation":[{"name":"University of California, Berkeley"}]},{"given":"David","family":"Broman","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology"}]},{"given":"Edward A.","family":"Lee","sequence":"additional","affiliation":[{"name":"University of California, Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2017,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. How the AWS IoT Platform Works - Amazon Web Services. http:\/\/aws.amazon.com\/iot-platform\/how-it-works\/ [n. d.]. How the AWS IoT Platform Works - Amazon Web Services. http:\/\/aws.amazon.com\/iot-platform\/how-it-works\/"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Linux Containers - LXC - Introduction. https:\/\/linuxcontainers.org\/lxc\/ [n. d.]. Linux Containers - LXC - Introduction. https:\/\/linuxcontainers.org\/lxc\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-015-1705-6"},{"key":"e_1_3_2_1_4_1","volume-title":"Mixed criticality systems: A review. Dept. of Computer Science","author":"Burns Alan","year":"2015","unstructured":"Alan Burns and Rob Davis . 2015. Mixed criticality systems: A review. Dept. of Computer Science , University of York , Tech. Rep, Sixth Edition ( Jan. 2015 ). Alan Burns and Rob Davis. 2015. Mixed criticality systems: A review. Dept. of Computer Science, University of York, Tech. Rep, Sixth Edition (Jan. 2015)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2361406"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2831347.2831354"},{"key":"e_1_3_2_1_7_1","volume-title":"Gurobi Optimization","author":"Inc.","year":"2016","unstructured":"Inc. Gurobi Optimization . 2016 . Gurobi Optimizer Reference Manual . (2016). http:\/\/www.gurobi.com Inc. Gurobi Optimization. 2016. Gurobi Optimizer Reference Manual. (2016). http:\/\/www.gurobi.com"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3054980"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3680960"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2016.24"},{"key":"e_1_3_2_1_11_1","volume-title":"Fog Computing: Focusing on Mobile Users at the Edge. arXiv:1502.01815 [cs] (Feb.","author":"Luan Tom H.","year":"2015","unstructured":"Tom H. Luan , Longxiang Gao , Zhi Li , Yang Xiang , Guiyi Wei , and Limin Sun . 2015 . Fog Computing: Focusing on Mobile Users at the Edge. arXiv:1502.01815 [cs] (Feb. 2015). http:\/\/arxiv.org\/abs\/1502.01815 arXiv: 1502.01815. Tom H. Luan, Longxiang Gao, Zhi Li, Yang Xiang, Guiyi Wei, and Limin Sun. 2015. Fog Computing: Focusing on Mobile Users at the Edge. arXiv:1502.01815 [cs] (Feb. 2015). http:\/\/arxiv.org\/abs\/1502.01815 arXiv: 1502.01815."},{"key":"e_1_3_2_1_12_1","first-page":"309","article-title":"Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things","volume":"1","author":"Mahalle Parikshit N.","year":"2013","unstructured":"Parikshit N. Mahalle , Bayu Anggorojati , Neeli R. Prasad , and Ramjee Prasad . 2013 . Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things . J. of Cyber Security and Mobility 1 , 4 (2013), 309 -- 348 . Parikshit N. Mahalle, Bayu Anggorojati, Neeli R. Prasad, and Ramjee Prasad. 2013. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things. J. of Cyber Security and Mobility 1, 4 (2013), 309--348.","journal-title":"J. of Cyber Security and Mobility"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.05.013"},{"key":"e_1_3_2_1_14_1","volume-title":"Google's Latest Failure Shows How Immature Its Hardware Is. Forbes (Feb","author":"Morris Ian","year":"2017","unstructured":"Ian Morris . 2017. Google's Latest Failure Shows How Immature Its Hardware Is. Forbes (Feb . 2017 ). http:\/\/www.forbes.com\/sites\/ianmorris\/2017\/02\/24\/googles-latest-failure-shows-how-immature-its-hardware-is\/ Ian Morris. 2017. Google's Latest Failure Shows How Immature Its Hardware Is. Forbes (Feb. 2017). http:\/\/www.forbes.com\/sites\/ianmorris\/2017\/02\/24\/googles-latest-failure-shows-how-immature-its-hardware-is\/"},{"volume-title":"Proc. of the 14th ACM Conf. on Embedded Network Sensor Syst. CD-ROM (SenSys '16)","author":"Antonio","key":"e_1_3_2_1_15_1","unstructured":"Antonio L. Maia Neto et al. 2016. AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle . In Proc. of the 14th ACM Conf. on Embedded Network Sensor Syst. CD-ROM (SenSys '16) . ACM, New York, NY, USA, 1--15. Antonio L. Maia Neto et al. 2016. AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle. In Proc. of the 14th ACM Conf. on Embedded Network Sensor Syst. CD-ROM (SenSys '16). ACM, New York, NY, USA, 1--15."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.2850"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC.2013.71"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.522"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/iCOST.2012.6271291"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.145"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16546-2_3"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0135-2_36"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.12.005"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1600113NM"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 18th Symposium on Communications & Networking (CNS '15)","author":"Zhang Congyingzi","year":"2015","unstructured":"Congyingzi Zhang and Robert Green . 2015 . Communication Security in Internet of Thing: Preventive Measure and Avoid DDoS Attack over IoT Network . In Proceedings of the 18th Symposium on Communications & Networking (CNS '15) . Society for Computer Simulation International, San Diego, CA, USA, 8--15. Congyingzi Zhang and Robert Green. 2015. Communication Security in Internet of Thing: Preventive Measure and Avoid DDoS Attack over IoT Network. In Proceedings of the 18th Symposium on Communications & Networking (CNS '15). Society for Computer Simulation International, San Diego, CA, USA, 8--15."}],"event":{"name":"SenSys '17: The 15th ACM Conference on Embedded Network Sensor Systems","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Delft Netherlands","acronym":"SenSys '17"},"container-title":["Proceedings of the 1st ACM Workshop on the Internet of Safe Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3137003.3137010","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3137003.3137010","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T17:43:23Z","timestamp":1673286203000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3137003.3137010"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,5]]},"references-count":27,"alternative-id":["10.1145\/3137003.3137010","10.1145\/3137003"],"URL":"https:\/\/doi.org\/10.1145\/3137003.3137010","relation":{},"subject":[],"published":{"date-parts":[[2017,11,5]]},"assertion":[{"value":"2017-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}