{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,30]],"date-time":"2025-11-30T22:03:11Z","timestamp":1764540191101,"version":"3.41.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/edcc.2017.33","type":"proceedings-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T21:59:05Z","timestamp":1512079145000},"page":"117-120","source":"Crossref","is-referenced-by-count":8,"title":["SAFETHINGS: Data Security by Design in the IoT"],"prefix":"10.1109","author":[{"given":"Manuel","family":"Barbosa","sequence":"first","affiliation":[{"name":"INESC-TEC, Univ. of Minho, Braga, Portugal"}]},{"given":"Sonia Ben","family":"Mokhtar","sequence":"additional","affiliation":[{"name":"Univ. of Lyon, Lyon, France"}]},{"given":"Pascal","family":"Felber","sequence":"additional","affiliation":[{"name":"Univ. of Neuchatel, Neuchatel, Switzerland"}]},{"given":"Francisco","family":"Maia","sequence":"additional","affiliation":[{"name":"INESC-TEC, Univ. of Minho, Braga, Portugal"}]},{"given":"Miguel","family":"Matos","sequence":"additional","affiliation":[{"name":"INESC-ID, Univ. of Lisbon, Lisbon, Portugal"}]},{"given":"Rui","family":"Oliveira","sequence":"additional","affiliation":[{"name":"INESC-TEC, Univ. of Minho, Braga, Portugal"}]},{"given":"Etienne","family":"Riviere","sequence":"additional","affiliation":[{"name":"Univ. of Neuchatel, Neuchatel, Switzerland"}]},{"given":"Valerio","family":"Schiavoni","sequence":"additional","affiliation":[{"name":"Univ. of Neuchatel, Neuchatel, Switzerland"}]},{"given":"Spyros","family":"Voulgaris","sequence":"additional","affiliation":[{"name":"Univ. of Patras, Patras, Greece"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_28"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2814576.2814804"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2012.92"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2014.6934297"},{"key":"ref15","first-page":"127","article-title":"Handling churn in a DHT","author":"rhea","year":"2004","journal-title":"Proceedings of the USENIX Annual Technical Conference"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.808407"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref18","article-title":"The digital universe of opportunities: rich data and the increasing value of the internet of things","author":"turner","year":"2014","journal-title":"IDC Analyze the Future"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688697"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2488222.2488260"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/srep01376"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"ref7","first-page":"1","article-title":"Designs, lessons and advice from building large distributed systems","author":"dean","year":"2009","journal-title":"Keynote from LADIS"},{"journal-title":"Privacy and Security by Design An Enterprise Architecture Approach","year":"2016","key":"ref2"},{"journal-title":"Introduction to AWS Security by Design","year":"2016","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1868470.1868479"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9489-2"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0633-z"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75551-7_5"}],"event":{"name":"2017 13th European Dependable Computing Conference (EDCC)","start":{"date-parts":[[2017,9,4]]},"location":"Geneva, Switzerland","end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 13th European Dependable Computing Conference (EDCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8121826\/8123531\/08123562.pdf?arnumber=8123562","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T18:52:15Z","timestamp":1750099935000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8123562\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/edcc.2017.33","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}