TY - JOUR AU - Roman, R. AU - Najera, P. AU - Lopez, J. PY - 2011 DA - 2011// TI - Securing the internet of things JO - Computer VL - 44 UR - https://doi.org/10.1109/MC.2011.291 DO - 10.1109/MC.2011.291 ID - Roman2011 ER - TY - JOUR AU - Fernandez-Gago, C. AU - Moyano, F. AU - Lopez, J. PY - 2017 DA - 2017// TI - Modelling trust dynamics in the internet of things JO - Inf Sci VL - 396 UR - https://doi.org/10.1016/j.ins.2017.02.039 DO - 10.1016/j.ins.2017.02.039 ID - Fernandez-Gago2017 ER - TY - STD TI - Erickson J (2009) Trust metrics. In: International symposium on collaborative technologies and systems, 2009. CTS’09, IEEE, New York, pp 93–97 ID - ref3 ER - TY - STD TI - Levien RL (2002) Attack resistant trust metrics. PhD thesis, University of California at Berkeley ID - ref4 ER - TY - JOUR AU - Grandison, T. AU - Sloman, M. PY - 2000 DA - 2000// TI - A survey of trust in internet applications JO - IEEE Commun Surv Tutorials VL - 3 UR - https://doi.org/10.1109/COMST.2000.5340804 DO - 10.1109/COMST.2000.5340804 ID - Grandison2000 ER - TY - JOUR AU - Hoffman, L. J. AU - Lawson-Jenkins, K. AU - Blum, J. PY - 2006 DA - 2006// TI - Trust beyond security: an expanded trust model JO - Commun ACM VL - 49 UR - https://doi.org/10.1145/1139922.1139924 DO - 10.1145/1139922.1139924 ID - Hoffman2006 ER - TY - STD TI - Pavlidis M (2011) Designing for trust. In: CAiSE (Doctoral Consortium), pp. 3–14 ID - ref7 ER - TY - STD TI - Ferraris D, Fernandez-Gago C, Lopez J (2018) A trust by design framework for the internet of things. In: NTMS’2018—Security Track (NTMS 2018 Security Track), Paris, France ID - ref8 ER - TY - JOUR AU - Mohammadi, V. AU - Rahmani, A. M. AU - Darwesh, A. M. AU - Sahafi, A. PY - 2019 DA - 2019// TI - Trust-based recommendation systems in internet of things: a systematic literature review JO - Human Centric Comput Inf Sci VL - 9 UR - https://doi.org/10.1186/s13673-019-0183-8 DO - 10.1186/s13673-019-0183-8 ID - Mohammadi2019 ER - TY - JOUR AU - Shayesteh, B. AU - Hakami, V. AU - Akbari, A. PY - 2020 DA - 2020// TI - A trust management scheme for IOT-enabled environmental health/accessibility monitoring services JO - Int J Inf Secur VL - 19 UR - https://doi.org/10.1007/s10207-019-00446-x DO - 10.1007/s10207-019-00446-x ID - Shayesteh2020 ER - TY - JOUR AU - Bordel, B. AU - Alcarria, R. AU - Martin, D. AU - Sanchez-Picot, A. PY - 2019 DA - 2019// TI - Trust provision in the internet of things using transversal blockchain networks JO - Intell Autom Soft Comput VL - 25 ID - Bordel2019 ER - TY - JOUR AU - Lee, Y. AU - Rathore, S. AU - Park, J. H. AU - Park, J. H. PY - 2020 DA - 2020// TI - A blockchain-based smart home gateway architecture for preventing data forgery JO - Human Centric Comput Inf Sci VL - 10 UR - https://doi.org/10.1186/s13673-019-0205-6 DO - 10.1186/s13673-019-0205-6 ID - Lee2020 ER - TY - BOOK AU - Rumbaugh, J. AU - Jacobson, I. AU - Booch, G. PY - 2004 DA - 2004// TI - Unified modeling language reference manual PB - The Pearson Higher Education CY - London ID - Rumbaugh2004 ER - TY - BOOK AU - Friedenthal, S. AU - Moore, A. AU - Steiner, R. PY - 2014 DA - 2014// TI - A practical gide to SysML: the systems modeling language PB - Morgan Kaufmann CY - Burlington ID - Friedenthal2014 ER - TY - STD TI - Marsh SP (1994) Formalising trust as a computational concept. PhD thesis, Department of Computing Science and Mathematics, University of Stirling ID - ref15 ER - TY - STD TI - Blaze M, Feigenbaum J, Lacy J (1996) Decentralized trust management. In: Proceedings 1996 IEEE symposium onSecurity and privacy, 1996. IEEE, New York, pp 164–173. ID - ref16 ER - TY - STD TI - Uddin MG, Zulkernine M (2008) Umltrust: towards developing trust-aware software. In: Proceedings of the 2008 ACM symposium on applied computing, ACM, New York, pp 831–836 ID - ref17 ER - TY - JOUR AU - Górski, J. AU - Jarzębowicz, A. AU - Leszczyna, R. AU - Miler, J. AU - Olszewski, M. PY - 2005 DA - 2005// TI - Trust case: justifying trust in an it solution JO - Reliabil Eng Syst Saf VL - 89 UR - https://doi.org/10.1016/j.ress.2004.08.005 DO - 10.1016/j.ress.2004.08.005 ID - Górski2005 ER - TY - JOUR AU - Ferraris, D. AU - Fernandez-Gago, C. PY - 2019 DA - 2019// TI - Trustapis: a trust requirements elicitation method for IOT JO - Int J Inf Secur VL - 19 UR - https://doi.org/10.1007/s10207-019-00438-x DO - 10.1007/s10207-019-00438-x ID - Ferraris2019 ER - TY - BOOK AU - Jürjens, J. PY - 2005 DA - 2005// TI - Secure systems development with UML PB - Springer CY - Berlin ID - Jürjens2005 ER - TY - STD TI - Basin D, Doser J, Lodderstedt T (2003) Model driven security for process-oriented systems. In: Proceedings of the eighth ACM symposium on access control models and technologies, ACM, New York, pp 100–109 ID - ref21 ER - TY - STD TI - Lodderstedt T, Basin D, Doser J (2002) Secureuml: a uml-based modeling language for model-driven security. In: International conference on the unified modeling language. Springer, Berlin, pp 426–441 ID - ref22 ER - TY - JOUR AU - Mai, P. X. AU - Goknil, A. AU - Shar, L. K. AU - Pastore, F. AU - Briand, L. C. AU - Shaame, S. PY - 2018 DA - 2018// TI - Modeling security and privacy requirements: a use case-driven approach JO - Inf Softw Technol VL - 100 UR - https://doi.org/10.1016/j.infsof.2018.04.007 DO - 10.1016/j.infsof.2018.04.007 ID - Mai2018 ER - TY - JOUR AU - Aufner, P. PY - 2020 DA - 2020// TI - The iot security gap: a look down into the valley between threat models and their implementation JO - Int J Inf Secur VL - 19 UR - https://doi.org/10.1007/s10207-019-00445-y DO - 10.1007/s10207-019-00445-y ID - Aufner2020 ER - TY - JOUR AU - Rathore, S. AU - Sharma, P. K. AU - Loia, V. AU - Jeong, Y. -. S. AU - Park, J. H. PY - 2017 DA - 2017// TI - Social network security: issues, challenges, threats, and solutions JO - Inf Sci VL - 421 UR - https://doi.org/10.1016/j.ins.2017.08.063 DO - 10.1016/j.ins.2017.08.063 ID - Rathore2017 ER - TY - STD TI - Vraalsen F, Lund MS, Mahler T, Parent X, Stølen K (2005) Specifying legal risk scenarios using the coras threat modelling language. In: International conference on trust management. Springer, Berlin, pp 45–60 ID - ref26 ER - TY - STD TI - Dimitrakos T, Ritchie B, Raptis D, Stølen K (2002) Model-based security risk analysis for web applications: the coras approach. In: Proceedings of the EuroWeb. Citeseer ID - ref27 ER - TY - STD TI - Hussein M, Zulkernine M (2006) Umlintr: a uml profile for specifying intrusions. In: 13th annual IEEE international symposium and workshop on engineering of computer based systems, 2006. ECBS 2006, IEEE, New York, pp 8 ID - ref28 ER - TY - JOUR AU - Sicato, J. C. S. AU - Singh, S. K. AU - Rathore, S. AU - Park, J. H. PY - 2020 DA - 2020// TI - A comprehensive analyses of intrusion detection system for iot environment JO - J Inf Process Syst VL - 16 ID - Sicato2020 ER - TY - STD TI - Maskani I, Boutahar J, El Houssaïni SEG (2018) Modeling telemedicine security requirements using a sysml security extension. In: 2018 6th international conference on multimedia computing and systems (ICMCS), IEEE, New York, pp 1–6 ID - ref30 ER - TY - STD TI - Apvrille L, Roudier Y (2013) Sysml-sec: A sysml environment for the design and development of secure embedded systems. APCOSEC, Asia-Pacific Council on Systems Engineering, pp 8–11 ID - ref31 ER - TY - STD TI - Harrand N, Fleurey F, Morin B, Husa KE (2016) Thingml: a language and code generation framework for heterogeneous targets. In: Proceedings of the ACM/IEEE 19th international conference on model driven engineering languages and systems, pp 125–135 ID - ref32 ER - TY - JOUR AU - Mavropoulos, O. AU - Mouratidis, H. AU - Fish, A. AU - Panaousis, E. AU - Kalloniatis, C. PY - 2017 DA - 2017// TI - A conceptual model to support security analysis in the internet of things JO - Comput Sci Inf Syst VL - 14 UR - https://doi.org/10.2298/CSIS160110016M DO - 10.2298/CSIS160110016M ID - Mavropoulos2017 ER - TY - STD TI - Moyano F, Fernandez-Gago C, Lopez J (2012) A conceptual framework for trust models. In: 9th international conference on trust, privacy and security in digital business, TrustBus 2012, vol. 7449 of lectures notes in computer science. Springer, Berlin, pp 93–104 ID - ref34 ER - TY - JOUR AU - Kou, L. AU - Shi, Y. AU - Zhang, L. AU - Liu, D. AU - Yang, Q. PY - 2019 DA - 2019// TI - A lightweight three-factor user authentication protocol for the information perception of iot JO - Comput Mater Continua VL - 58 UR - https://doi.org/10.32604/cmc.2019.03760 DO - 10.32604/cmc.2019.03760 ID - Kou2019 ER - TY - JOUR AU - Jøsang, A. AU - Ismail, R. AU - Boyd, C. PY - 2007 DA - 2007// TI - A survey of trust and reputation systems for online service provision JO - Decis Support Syst VL - 43 UR - https://doi.org/10.1016/j.dss.2005.05.019 DO - 10.1016/j.dss.2005.05.019 ID - Jøsang2007 ER - TY - STD TI - Ferraris D, Daniel J, Fernandez-Gago C, Lopez J (2019) A segregated architecture for a trust-based network of internet of things. In: 2019 16th IEEE annual consumer communications & networking conference (CCNC) (CCNC 2019), Las Vegas, USA ID - ref37 ER - TY - JOUR AU - Gafurov, K. AU - Chung, T. -. M. PY - 2019 DA - 2019// TI - Comprehensive survey on internet of things, architecture, security aspects, applications, related technologies, economic perspective, and future directions JO - J Inf Process Syst VL - 15 ID - Gafurov2019 ER - TY - JOUR AU - Park, J. -. H. AU - Salim, M. M. AU - Jo, J. H. AU - Sicato, J. C. S. AU - Rathore, S. AU - Park, J. H. PY - 2019 DA - 2019// TI - Ciot-net: a scalable cognitive iot based smart city network architecture JO - Human Centric Comput Inf Sci VL - 9 UR - https://doi.org/10.1186/s13673-019-0190-9 DO - 10.1186/s13673-019-0190-9 ID - Park2019 ER - TY - JOUR AU - Giorgini, P. AU - Massacci, F. AU - Mylopoulos, J. AU - Zannone, N. PY - 2006 DA - 2006// TI - Requirements engineering for trust management: model, methodology, and reasoning JO - Int J Inf Secur VL - 5 UR - https://doi.org/10.1007/s10207-006-0005-7 DO - 10.1007/s10207-006-0005-7 ID - Giorgini2006 ER - TY - BOOK AU - Yan, Z. AU - Holtmanns, S. PY - 2008 DA - 2008// TI - Trust modeling and management: from social trust to digital trust PB - IGI Global CY - Hershey ID - Yan2008 ER - TY - STD TI - Hershey JR, Chen Z, Le Roux J, Watanabe S (2016) Deep clustering: discriminative embeddings for segmentation and separation. In: 2016 IEEE international conference on acoustics, speech and signal processing (ICASSP), IEEE, New York, pp 31–35 ID - ref42 ER -