{"id":"https://openalex.org/W2296595486","doi":"https://doi.org/10.1007/978-3-319-24174-6_26","title":"Lightweight and Flexible Trust Assessment Modules for the Internet of Things","display_name":"Lightweight and Flexible Trust Assessment Modules for the Internet of Things","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2296595486","doi":"https://doi.org/10.1007/978-3-319-24174-6_26","mag":"2296595486"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-24174-6_26","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-24174-6_26","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-24174-6_26.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-24174-6_26.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111139756","display_name":"Jan Tobias M\u00fchlberg","orcid":null},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I39327780","display_name":"iMinds","ror":"https://ror.org/03baec336","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I39327780"]}],"countries":["BE"],"is_corresponding":true,"raw_author_name":"Jan Tobias M\u00fchlberg","raw_affiliation_strings":["iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium","institution_ids":["https://openalex.org/I39327780","https://openalex.org/I99464096"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029798411","display_name":"Job Noorman","orcid":"https://orcid.org/0000-0002-5287-2543"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I39327780","display_name":"iMinds","ror":"https://ror.org/03baec336","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I39327780"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Job Noorman","raw_affiliation_strings":["iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium","institution_ids":["https://openalex.org/I39327780","https://openalex.org/I99464096"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008329832","display_name":"Frank Piessens","orcid":"https://orcid.org/0000-0001-5438-153X"},"institutions":[{"id":"https://openalex.org/I99464096","display_name":"KU Leuven","ror":"https://ror.org/05f950310","country_code":"BE","type":"education","lineage":["https://openalex.org/I99464096"]},{"id":"https://openalex.org/I39327780","display_name":"iMinds","ror":"https://ror.org/03baec336","country_code":"BE","type":"nonprofit","lineage":["https://openalex.org/I39327780"]}],"countries":["BE"],"is_corresponding":false,"raw_author_name":"Frank Piessens","raw_affiliation_strings":["iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium"],"affiliations":[{"raw_affiliation_string":"iMinds-DistriNet, KU Leuven, Celestijnenlaan 200A, 3001, Leuven, Belgium","institution_ids":["https://openalex.org/I39327780","https://openalex.org/I99464096"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111139756"],"corresponding_institution_ids":["https://openalex.org/I39327780","https://openalex.org/I99464096"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":2.0456,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.87786947,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"503","last_page":"520"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9921000003814697,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8014589548110962},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.7682014107704163},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.6352113485336304},{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.621338963508606},{"id":"https://openalex.org/keywords/trusted-computing-base","display_name":"Trusted computing base","score":0.6119061708450317},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.6031872034072876},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5734605193138123},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.5227565765380859},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.49115607142448425},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.4444117248058319},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.43046319484710693},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42481184005737305},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4244893491268158},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3901381492614746},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.38390856981277466},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.19285327196121216},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.1694183647632599},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10419139266014099},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09586954116821289}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8014589548110962},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.7682014107704163},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.6352113485336304},{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.621338963508606},{"id":"https://openalex.org/C147346212","wikidata":"https://www.wikidata.org/wiki/Q5492632","display_name":"Trusted computing base","level":4,"score":0.6119061708450317},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.6031872034072876},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5734605193138123},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.5227565765380859},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.49115607142448425},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.4444117248058319},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.43046319484710693},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42481184005737305},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4244893491268158},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3901381492614746},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.38390856981277466},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.19285327196121216},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.1694183647632599},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10419139266014099},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09586954116821289},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-24174-6_26","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-24174-6_26","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-24174-6_26.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:lirias2repo.kuleuven.be:123456789/516201","is_oa":true,"landing_page_url":"https://lirias.kuleuven.be/handle/123456789/516201","pdf_url":null,"source":{"id":"https://openalex.org/S4306401954","display_name":"Lirias (KU Leuven)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I99464096","host_organization_name":"KU Leuven","host_organization_lineage":["https://openalex.org/I99464096"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"ESORICS, Vienna, Austria, 21-25 September 2015","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:dipot.ulb.ac.be:2013/388612","is_oa":false,"landing_page_url":"http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/388612","pdf_url":null,"source":{"id":"https://openalex.org/S4306401063","display_name":"D\u00e9p\u00f4t institutionnel de l'Universit\u00e9 libre de Bruxelles (Universit\u00e9 Libre de Bruxelles)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I132053463","host_organization_name":"Universit\u00e9 Libre de Bruxelles","host_organization_lineage":["https://openalex.org/I132053463"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"In: Computer Security -- ESORICS 2015Lecture notes in computer science","raw_type":"info:ulb-repo/semantics/openurl/proceeding"}],"best_oa_location":{"id":"doi:10.1007/978-3-319-24174-6_26","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-319-24174-6_26","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-319-24174-6_26.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[{"id":"https://openalex.org/G1638137056","display_name":null,"funder_award_id":"FWO-Vl","funder_id":"https://openalex.org/F4320321730","funder_display_name":"Fonds Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G502646978","display_name":null,"funder_award_id":"PhD grant","funder_id":"https://openalex.org/F4320322308","funder_display_name":"KU Leuven"},{"id":"https://openalex.org/G6867476589","display_name":null,"funder_award_id":"FWO-Vlaanderen","funder_id":"https://openalex.org/F4320321730","funder_display_name":"Fonds Wetenschappelijk Onderzoek"},{"id":"https://openalex.org/G7653459555","display_name":null,"funder_award_id":"PhD grant","funder_id":"https://openalex.org/F4320321730","funder_display_name":"Fonds Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321730","display_name":"Fonds Wetenschappelijk Onderzoek","ror":"https://ror.org/03qtxy027"},{"id":"https://openalex.org/F4320322308","display_name":"KU Leuven","ror":"https://ror.org/05f950310"},{"id":"https://openalex.org/F4320327336","display_name":"Vlaamse regering","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2296595486.pdf","grobid_xml":"https://content.openalex.org/works/W2296595486.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W103986934","https://openalex.org/W144216357","https://openalex.org/W161166442","https://openalex.org/W167216241","https://openalex.org/W198928148","https://openalex.org/W317521241","https://openalex.org/W1247015877","https://openalex.org/W1768741698","https://openalex.org/W1968412195","https://openalex.org/W1993602585","https://openalex.org/W1993767827","https://openalex.org/W2023042236","https://openalex.org/W2029224396","https://openalex.org/W2036329595","https://openalex.org/W2050067204","https://openalex.org/W2065325623","https://openalex.org/W2105785761","https://openalex.org/W2125555950","https://openalex.org/W2128159601","https://openalex.org/W2135274013","https://openalex.org/W2140678915","https://openalex.org/W2143591442","https://openalex.org/W2152178634","https://openalex.org/W2152605584","https://openalex.org/W2166088389","https://openalex.org/W2167332015","https://openalex.org/W2276799569","https://openalex.org/W3021076715","https://openalex.org/W4250213256"],"related_works":["https://openalex.org/W2358352283","https://openalex.org/W2051856262","https://openalex.org/W2377235694","https://openalex.org/W2387129584","https://openalex.org/W2006718650","https://openalex.org/W2356797718","https://openalex.org/W2081290302","https://openalex.org/W2736431337","https://openalex.org/W1481972788","https://openalex.org/W2364450600"],"abstract_inverted_index":{"In":[0],"this":[1],"paper":[2],"we":[3,60],"describe":[4],"a":[5,21,63,85,99,167,185],"novel":[6],"approach":[7,47,123,172],"to":[8,14,33,73,124,130,159],"securely":[9,154],"obtain":[10],"measurements":[11,36],"with":[12,179],"respect":[13],"the":[15,41,108,126,133,148,180],"integrity":[16],"of":[17,40,43,91,98,170],"software":[18],"running":[19,183],"on":[20,29,50,184],"low-cost":[22],"and":[23,69,96,106,139,153],"low-power":[24],"computing":[25],"node":[26],"autonomously":[27],"or":[28,150],"request.":[30],"We":[31,165],"propose":[32],"use":[34],"these":[35],"as":[37],"an":[38,79,160],"indication":[39],"trustworthiness":[42],"that":[44,94,107,118,132,173],"node.":[45],"Our":[46],"is":[48],"based":[49],"recent":[51],"developments":[52],"in":[53],"Program":[54],"Counter":[55],"Based":[56],"Access":[57],"Control.":[58],"Specifically,":[59],"employ":[61],"Sancus,":[62],"light-weight":[64],"hardware-only":[65],"Trusted":[66],"Computing":[67],"Base":[68],"Protected":[70],"Module":[71],"Architecture,":[72],"integrate":[74],"trust":[75,127,135,143,157,162,176],"assessment":[76,144,177],"modules":[77,145,178],"into":[78],"untrusted":[80],"embedded":[81],"OS":[82,149,182],"without":[83],"using":[84],"hypervisor.":[86],"Sancus":[87,113],"ensures":[88],"by":[89,121],"means":[90],"hardware":[92],"extensions":[93],"code":[95,152],"data":[97,110],"protected":[100],"module":[101],"cannot":[102],"be":[103],"tampered":[104],"with,":[105],"module\u2019s":[109],"remains":[111],"confidential.":[112],"further":[114],"provides":[115],"cryptographic":[116],"primitives":[117],"are":[119,137],"employed":[120],"our":[122,142,171],"enable":[125],"management":[128,163],"system":[129],"verify":[131],"obtained":[134],"metrics":[136,158],"authentic":[138],"fresh.":[140],"Thereby,":[141],"can":[146],"inspect":[147],"application":[151],"report":[155],"reliable":[156],"external":[161],"system.":[164],"evaluate":[166],"prototypic":[168],"implementation":[169],"integrates":[174],"Sancus-protected":[175],"Contiki":[181],"Sancus-enabled":[186],"TI":[187],"MSP430":[188],"microcontroller.":[189]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2016-06-24T00:00:00"}
