{"id":"https://openalex.org/W3036410930","doi":"https://doi.org/10.1109/giots49054.2020.9119580","title":"Trustworthiness in Supply Chains : A modular extensible Approach applied to Industrial IoT","display_name":"Trustworthiness in Supply Chains : A modular extensible Approach applied to Industrial IoT","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3036410930","doi":"https://doi.org/10.1109/giots49054.2020.9119580","mag":"3036410930"},"language":"en","primary_location":{"id":"doi:10.1109/giots49054.2020.9119580","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots49054.2020.9119580","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Global Internet of Things Summit (GIoTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024226217","display_name":"J\u00fcrgen Neises","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162263","display_name":"Fujitsu (Germany)","ror":"https://ror.org/04max0939","country_code":"DE","type":"company","lineage":["https://openalex.org/I2252096349","https://openalex.org/I4210162263"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jurgen Neises","raw_affiliation_strings":["R&I Subsidies Program Management, Fujitsu Technology Solutions GmbH, D\u00fcsseldorf, Germany"],"affiliations":[{"raw_affiliation_string":"R&I Subsidies Program Management, Fujitsu Technology Solutions GmbH, D\u00fcsseldorf, Germany","institution_ids":["https://openalex.org/I4210162263"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053762307","display_name":"George Moldovan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210095246","display_name":"Siemens (Romania)","ror":"https://ror.org/00sexkk33","country_code":"RO","type":"company","lineage":["https://openalex.org/I1325886976","https://openalex.org/I4210095246"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"George Moldovan","raw_affiliation_strings":["CT RDA BAM CON-RO, Siemens S.R.L, Brasov, Romania"],"affiliations":[{"raw_affiliation_string":"CT RDA BAM CON-RO, Siemens S.R.L, Brasov, Romania","institution_ids":["https://openalex.org/I4210095246"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009797054","display_name":"Thomas Walloschke","orcid":null},"institutions":[{"id":"https://openalex.org/I4210162263","display_name":"Fujitsu (Germany)","ror":"https://ror.org/04max0939","country_code":"DE","type":"company","lineage":["https://openalex.org/I2252096349","https://openalex.org/I4210162263"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Walloschke","raw_affiliation_strings":["Horizon Projects, Fujitsu Technology Solutions GmbH, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Horizon Projects, Fujitsu Technology Solutions GmbH, Berlin, Germany","institution_ids":["https://openalex.org/I4210162263"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034483155","display_name":"Bianca Popovici","orcid":null},"institutions":[{"id":"https://openalex.org/I4210095246","display_name":"Siemens (Romania)","ror":"https://ror.org/00sexkk33","country_code":"RO","type":"company","lineage":["https://openalex.org/I1325886976","https://openalex.org/I4210095246"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Bianca Popovici","raw_affiliation_strings":["CT RDA BAM CON-RO, Siemens S.R.L, Brasov, Romania"],"affiliations":[{"raw_affiliation_string":"CT RDA BAM CON-RO, Siemens S.R.L, Brasov, Romania","institution_ids":["https://openalex.org/I4210095246"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024226217"],"corresponding_institution_ids":["https://openalex.org/I4210162263"],"apc_list":null,"apc_paid":null,"fwci":0.3634,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.73019056,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7365553379058838},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.6506857872009277},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.6153864860534668},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5926021337509155},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.5441080927848816},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5121150016784668},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.43567994236946106},{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.42766982316970825},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.4230361878871918},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36831894516944885},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.2986403703689575},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11876523494720459}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7365553379058838},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.6506857872009277},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.6153864860534668},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5926021337509155},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.5441080927848816},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5121150016784668},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43567994236946106},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.42766982316970825},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.4230361878871918},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36831894516944885},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2986403703689575},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11876523494720459},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/giots49054.2020.9119580","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots49054.2020.9119580","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Global Internet of Things Summit (GIoTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W61550851","https://openalex.org/W124291695","https://openalex.org/W2097726984","https://openalex.org/W4244982379","https://openalex.org/W4312285779","https://openalex.org/W6846963363"],"related_works":["https://openalex.org/W2158491338","https://openalex.org/W2807901368","https://openalex.org/W2133733652","https://openalex.org/W2072658171","https://openalex.org/W2606392311","https://openalex.org/W2320042380","https://openalex.org/W4385956668","https://openalex.org/W2900895161","https://openalex.org/W4380838366","https://openalex.org/W2539884462"],"abstract_inverted_index":{"Typical":[0],"transactions":[1],"in":[2,44,62,102,113,132],"cross-company":[3],"Industry":[4,161],"4.0":[5,162],"supply":[6],"chains":[7,43],"require":[8],"a":[9,52,94,133],"dynamically":[10],"evaluable":[11],"form":[12],"of":[13,35,39,48,60,72,86,124,130,157,167,171,180],"trustworthiness.":[14],"Therefore,":[15],"specific":[16],"requirements":[17],"on":[18,66,137,177],"the":[19,24,33,36,49,58,67,73,90,122,164,178,181],"parties":[20],"involved,":[21],"down":[22],"to":[23],"machine":[25],"level,":[26],"for":[27,57,93],"automatically":[28],"verifiable":[29],"operations":[30],"shall":[31],"facilitate":[32],"realization":[34],"economic":[37],"advantages":[38],"future":[40],"flexible":[41,95],"process":[42],"production.":[45],"The":[46,144],"core":[47],"paper":[50],"is":[51,89,142,174],"modular":[53],"and":[54,117,151,153],"extensible":[55],"model":[56],"assessment":[59],"trustworthiness":[61,83,109,131],"industrial":[63,172],"IoT":[64],"based":[65,136,176],"Industrial":[68,74],"Internet":[69,75],"Security":[70],"Framework":[71],"Consortium,":[76],"which":[77,97],"among":[78],"other":[79],"things":[80],"defines":[81],"five":[82],"key":[84],"characteristics":[85],"NIST.":[87],"This":[88],"starting":[91],"point":[92],"model,":[96],"contains":[98],"features":[99],"as":[100,111],"discussed":[101],"ISO/IEC":[103],"JTC":[104],"1/AG":[105],"7":[106],"N51":[107],"or":[108],"profiles":[110],"used":[112],"regulatory":[114],"requirements.Specific":[115],"minimum":[116],"maximum":[118],"requirement":[119],"parameters":[120],"define":[121],"range":[123],"trustworthy":[125],"operation.":[126],"An":[127],"automated":[128],"calculation":[129],"dynamic":[134,165],"environment":[135],"an":[138],"initial":[139],"trust":[140,169],"metric":[141],"presented.":[143],"evaluation":[145,166],"can":[146],"be":[147],"device-based,":[148],"connection-based,":[149],"behaviour-based":[150],"context-based":[152],"thus":[154],"become":[155],"part":[156],"measurable,":[158],"trustworthy,":[159],"monitorable":[160],"scenarios.Finally,":[163],"automatable":[168],"models":[170],"components":[173],"illustrated":[175],"Multi-Vendor-Industry":[179],"Horizon":[182],"2020":[183],"project":[184],"SecureIoT.":[185],"(grant":[186],"agreement":[187],"number":[188],"779899)":[189]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
