{"id":"https://openalex.org/W3111466035","doi":"https://doi.org/10.1186/s13673-020-00257-3","title":"A model-driven approach to ensure trust in the IoT","display_name":"A model-driven approach to ensure trust in the IoT","publication_year":2020,"publication_date":"2020-12-01","ids":{"openalex":"https://openalex.org/W3111466035","doi":"https://doi.org/10.1186/s13673-020-00257-3","mag":"3111466035"},"language":"en","primary_location":{"id":"doi:10.1186/s13673-020-00257-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13673-020-00257-3","pdf_url":null,"source":{"id":"https://openalex.org/S2497168432","display_name":"Human-centric Computing and Information Sciences","issn_l":"2192-1962","issn":["2192-1962"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Human-centric Computing and Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1186/s13673-020-00257-3","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008976504","display_name":"Davide Ferraris","orcid":"https://orcid.org/0000-0003-3035-3774"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":true,"raw_author_name":"Davide Ferraris","raw_affiliation_strings":["Network, Information and Computer Security Lab, University of Malaga, 29071, Malaga, Spain"],"affiliations":[{"raw_affiliation_string":"Network, Information and Computer Security Lab, University of Malaga, 29071, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082814382","display_name":"Carmen Fern\u00e1ndez-Gago","orcid":"https://orcid.org/0000-0002-4564-6636"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Carmen Fernandez-Gago","raw_affiliation_strings":["Network, Information and Computer Security Lab, University of Malaga, 29071, Malaga, Spain"],"affiliations":[{"raw_affiliation_string":"Network, Information and Computer Security Lab, University of Malaga, 29071, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100641212","display_name":"Javier L\u00f3pez","orcid":"https://orcid.org/0000-0001-8066-9991"},"institutions":[{"id":"https://openalex.org/I82767444","display_name":"Universidad de M\u00e1laga","ror":"https://ror.org/036b2ww28","country_code":"ES","type":"education","lineage":["https://openalex.org/I82767444"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Javier Lopez","raw_affiliation_strings":["Network, Information and Computer Security Lab, University of Malaga, 29071, Malaga, Spain"],"affiliations":[{"raw_affiliation_string":"Network, Information and Computer Security Lab, University of Malaga, 29071, Malaga, Spain","institution_ids":["https://openalex.org/I82767444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5008976504"],"corresponding_institution_ids":["https://openalex.org/I82767444"],"apc_list":null,"apc_paid":null,"fwci":3.2704,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.93668467,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"10","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7786198854446411},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5968909859657288},{"id":"https://openalex.org/keywords/activity-diagram","display_name":"Activity diagram","score":0.5804296135902405},{"id":"https://openalex.org/keywords/unified-modeling-language","display_name":"Unified Modeling Language","score":0.5800749063491821},{"id":"https://openalex.org/keywords/traceability","display_name":"Traceability","score":0.5621565580368042},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5330796241760254},{"id":"https://openalex.org/keywords/systems-modeling-language","display_name":"Systems Modeling Language","score":0.4993765354156494},{"id":"https://openalex.org/keywords/systems-development-life-cycle","display_name":"Systems development life cycle","score":0.4966126084327698},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4852147400379181},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4703775942325592},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.2495068907737732},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.09446719288825989},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.09433737397193909}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7786198854446411},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5968909859657288},{"id":"https://openalex.org/C64219723","wikidata":"https://www.wikidata.org/wiki/Q423262","display_name":"Activity diagram","level":4,"score":0.5804296135902405},{"id":"https://openalex.org/C145644426","wikidata":"https://www.wikidata.org/wiki/Q169411","display_name":"Unified Modeling Language","level":3,"score":0.5800749063491821},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.5621565580368042},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5330796241760254},{"id":"https://openalex.org/C21285288","wikidata":"https://www.wikidata.org/wiki/Q2117885","display_name":"Systems Modeling Language","level":4,"score":0.4993765354156494},{"id":"https://openalex.org/C120617098","wikidata":"https://www.wikidata.org/wiki/Q559486","display_name":"Systems development life cycle","level":5,"score":0.4966126084327698},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4852147400379181},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4703775942325592},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2495068907737732},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.09446719288825989},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.09433737397193909},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13673-020-00257-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13673-020-00257-3","pdf_url":null,"source":{"id":"https://openalex.org/S2497168432","display_name":"Human-centric Computing and Information Sciences","issn_l":"2192-1962","issn":["2192-1962"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Human-centric Computing and Information Sciences","raw_type":"journal-article"},{"id":"pmh:oai:riuma.uma.es:10630/33789","is_oa":true,"landing_page_url":"https://hdl.handle.net/10630/33789","pdf_url":null,"source":{"id":"https://openalex.org/S4306401385","display_name":"Repositorio Institucional de la Universidad de M\u00e1laga (University of M\u00e1laga)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I82767444","host_organization_name":"Universidad de M\u00e1laga","host_organization_lineage":["https://openalex.org/I82767444"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"VoR"}],"best_oa_location":{"id":"doi:10.1186/s13673-020-00257-3","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13673-020-00257-3","pdf_url":null,"source":{"id":"https://openalex.org/S2497168432","display_name":"Human-centric Computing and Information Sciences","issn_l":"2192-1962","issn":["2192-1962"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Human-centric Computing and Information Sciences","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1486178352","https://openalex.org/W1539015727","https://openalex.org/W1951555804","https://openalex.org/W1998017916","https://openalex.org/W2027060223","https://openalex.org/W2043000230","https://openalex.org/W2048664663","https://openalex.org/W2050989746","https://openalex.org/W2059914506","https://openalex.org/W2097726984","https://openalex.org/W2098019984","https://openalex.org/W2100107987","https://openalex.org/W2103438541","https://openalex.org/W2143591442","https://openalex.org/W2157034822","https://openalex.org/W2165854000","https://openalex.org/W2170496240","https://openalex.org/W2221409856","https://openalex.org/W2232727593","https://openalex.org/W2266302299","https://openalex.org/W2293678554","https://openalex.org/W2398091629","https://openalex.org/W2482685667","https://openalex.org/W2521359717","https://openalex.org/W2525896035","https://openalex.org/W2588999644","https://openalex.org/W2726226099","https://openalex.org/W2746416264","https://openalex.org/W2794887609","https://openalex.org/W2800621402","https://openalex.org/W2887476901","https://openalex.org/W2900353822","https://openalex.org/W2911666451","https://openalex.org/W2918820326","https://openalex.org/W2945597416","https://openalex.org/W2947753203","https://openalex.org/W2953249636","https://openalex.org/W2964069175","https://openalex.org/W2964474528","https://openalex.org/W2977830249","https://openalex.org/W3013437827","https://openalex.org/W3013681840","https://openalex.org/W3083863345","https://openalex.org/W4205736829","https://openalex.org/W4248223175"],"related_works":["https://openalex.org/W2170113317","https://openalex.org/W2009258791","https://openalex.org/W2135253840","https://openalex.org/W3149751866","https://openalex.org/W2170871060","https://openalex.org/W1984712372","https://openalex.org/W2141291477","https://openalex.org/W2062302515","https://openalex.org/W2139959881","https://openalex.org/W4244804067"],"abstract_inverted_index":{"Abstract":[0],"The":[1],"Internet":[2],"of":[3,68,81,102,110,200,216],"Things":[4],"(IoT)":[5],"is":[6,33,42,65],"a":[7,66,82,91,120,149,172,176,207],"paradigm":[8],"that":[9,44,94,165],"permits":[10],"smart":[11,46,54,83,188],"entities":[12,47,55,190],"to":[13,35,58,146,151,185,192],"be":[14,206],"interconnected":[15],"anywhere":[16],"and":[17,50,125,129,136,175,213],"anyhow.":[18],"IoT":[19,84,189],"opens":[20],"new":[21,26,92,163],"opportunities":[22],"but":[23,105],"also":[24,106],"rises":[25],"issues.":[27,38],"In":[28,39,86],"this":[29,87],"dynamic":[30],"environment,":[31],"trust":[32,51,72,96,128,153],"useful":[34],"mitigate":[36],"these":[37],"fact,":[40],"it":[41],"important":[43,168],"the":[45,52,74,100,103,108,116,170,187,193,197,201,211,217],"could":[48],"know":[49],"other":[53],"in":[56,144,155,196],"order":[57,145],"collaborate":[59],"with":[60],"them.":[61],"So":[62],"far,":[63],"there":[64],"lack":[67],"research":[69],"when":[70],"considering":[71,127],"through":[73],"whole":[75],"System":[76],"Development":[77],"Life":[78],"Cycle":[79],"(SDLC)":[80],"entity.":[85],"paper,":[88],"we":[89,114,160],"suggest":[90],"approach":[93,122,181],"considers":[95],"not":[97],"only":[98],"at":[99,107],"end":[101],"SDLC":[104],"start":[109],"it.":[111],"More":[112],"precisely,":[113],"explore":[115],"modeling":[117],"phase":[118],"proposing":[119],"model-driven":[121,180],"extending":[123],"UML":[124],"SysML":[126],"its":[130],"related":[131],"domains,":[132],"such":[133],"as":[134],"security":[135],"privacy.":[137],"We":[138],"propose":[139,161],"stereotypes":[140],"for":[141,169,210],"each":[142],"diagram":[143,174],"give":[147],"developers":[148,184],"way":[150],"represent":[152],"elements":[154],"an":[156],"effective":[157],"way.":[158],"Moreover,":[159],"two":[162],"diagrams":[164],"are":[166],"very":[167],"IoT:":[171],"traceability":[173],"context":[177],"diagram.":[178],"This":[179],"will":[182,205],"help":[183],"model":[186],"according":[191],"requirements":[194],"elicited":[195],"previous":[198],"phases":[199,215],"SDLC.":[202,218],"These":[203],"models":[204],"fundamental":[208],"input":[209],"following":[212],"final":[214]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
