{"id":"https://openalex.org/W2085755607","doi":"https://doi.org/10.1145/2591062.2591201","title":"Privacy and security requirements framework for the internet of things (IoT)","display_name":"Privacy and security requirements framework for the internet of things (IoT)","publication_year":2014,"publication_date":"2014-05-20","ids":{"openalex":"https://openalex.org/W2085755607","doi":"https://doi.org/10.1145/2591062.2591201","mag":"2085755607"},"language":"en","primary_location":{"id":"doi:10.1145/2591062.2591201","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2591062.2591201","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Proceedings of the 36th International Conference on Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024649509","display_name":"Israa Alqassem","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Israa Alqassem","raw_affiliation_strings":["Masdar Institute of Science and Technology, United Arab Emirates","Masdar Institute of Science and Technology, United Arab Emirates#TAB#"],"affiliations":[{"raw_affiliation_string":"Masdar Institute of Science and Technology, United Arab Emirates","institution_ids":[]},{"raw_affiliation_string":"Masdar Institute of Science and Technology, United Arab Emirates#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5024649509"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.1377,"has_fulltext":false,"cited_by_count":38,"citation_normalized_percentile":{"value":0.94547241,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"739","last_page":"741"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7422263622283936},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7292298674583435},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6391439437866211},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.5572324395179749},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4493725895881653},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32529574632644653},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18510836362838745},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.11340266466140747}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7422263622283936},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7292298674583435},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6391439437866211},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.5572324395179749},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4493725895881653},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32529574632644653},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18510836362838745},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.11340266466140747},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2591062.2591201","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2591062.2591201","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Proceedings of the 36th International Conference on Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1484460783","https://openalex.org/W1577076081","https://openalex.org/W2003544295","https://openalex.org/W2050016374","https://openalex.org/W2075395364","https://openalex.org/W2105103777","https://openalex.org/W2110157102","https://openalex.org/W2110578718","https://openalex.org/W2119046642","https://openalex.org/W2128386642","https://openalex.org/W2168452204","https://openalex.org/W2404383051","https://openalex.org/W2561675875","https://openalex.org/W4285719527","https://openalex.org/W6676745242","https://openalex.org/W6713099132"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W2950174689","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W4285201139"],"abstract_inverted_index":{"Capturing":[0],"privacy":[1,62,104],"and":[2,38,63,103],"security":[3,64,102],"requirements":[4,35,65,90],"in":[5,17,71,93],"the":[6,21,28,61,109],"very":[7],"early":[8],"stages":[9],"is":[10,69,85],"essential":[11],"for":[12,67],"creating":[13],"sufficient":[14],"public":[15],"confidence":[16],"order":[18,72,94],"to":[19,59,73,86,95],"facilitate":[20],"adaption":[22],"of":[23,30,50,82,99],"novel":[24],"systems":[25],"such":[26,88],"as":[27],"Internet":[29],"Things":[31],"(IoT).":[32],"However,":[33],"traditional":[34],"engineering":[36,91],"methods":[37],"frameworks":[39],"might":[40],"not":[41],"be":[42],"sufficiently":[43],"effective":[44],"when":[45],"dealing":[46],"with":[47,75,101],"new":[48],"types":[49],"IoT":[51,68,100],"heterogeneous":[52],"systems.":[53],"Therefore,":[54],"building":[55],"a":[56,89],"methodological":[57],"framework":[58,92],"model":[60],"specifications":[66],"necessary":[70],"deal":[74],"its":[76],"mission":[77],"critical":[78],"nature.":[79],"The":[80],"purpose":[81],"this":[83],"project":[84],"develop":[87],"ensure":[96],"proper":[97],"development":[98],"taken":[105],"into":[106],"account":[107],"from":[108],"earliest":[110],"stages.":[111]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
