Gamma, E., Helm, R., Johnson, R., and Vlissides, J. M.
(1994). Design Patterns: Elements of Reusable
Object-Oriented Software. Addison-Wesley Profes-
sional, 1 edition.
Hany, F. A. and Wills, G. (2020). IoT security, privacy,
safety and ethics. In Farsi, M., Daneshkhah, A.,
Hosseinian-Far, A., and Jahankhani, H., editors, Dig-
ital Twin Technologies and Smart Cities, pages 1–27.
Springer International Publishing.
IEEE SA, S. A. (2018). IEEE draft standard for an architec-
tural framework for the internet of things (IoT). IEEE
P2413/D0.4.5, December 2018, pages 1–264.
Joshi, B. (2014). Overview of design patterns for beginners.
Kitchenham, B. (2004). Procedures for performing system-
atic reviews. Keele university. technical report tr/se-
0401, Research community, Department of Computer
Science, Keele University, UK.
Kitchenham, B. A., Budgen, D., and Brereton, O. P. (2011).
Using mapping studies as the basis for further research
– a participant-observer case study. Information and
Software Technology, 53(6):638 – 651. Special Sec-
tion: Best papers from the APSEC.
L
´
ucio, L., Zhang, Q., Nguyen, P. H., Amrani, M., Klein, J.,
Vangheluwe, H., and Traon, Y. L. (2014). Chapter 3 -
advances in model-driven security. In Memon, A., ed-
itor, Advances in Computers, volume 93 of Advances
in Computers, pages 103 – 152. Elsevier.
Nguyen, P., Ferry, N., Erdogan, G., Song, H., Lavirotte, S.,
Tigli, J., and Solberg, A. (2019). Advances in deploy-
ment and orchestration approaches for IoT - a system-
atic review. In 2019 IEEE International Congress on
Internet of Things (ICIOT), pages 53–60.
Nguyen, P. H., Ferry, N., Erdogan, G., Song, H., Lavi-
rotte, S., Tigli, J.-Y., and Solberg, A. (2019a). The
preliminary results of a mapping study of deploy-
ment and orchestration for IoT. In Proceedings of the
34th ACM/SIGAPP Symposium on Applied Comput-
ing, SAC ’19, page 2040–2043, New York, NY, USA.
Association for Computing Machinery.
Nguyen, P. H., Ferry, N., Gencer Erdogan, H. S., Lavirotte,
S., Tigli, J.-Y., and Solberg, A. (2019b). A system-
atic mapping study of deployment and orchestration
approaches for IoT. In International Conference on
Internet of Things, Big Data and Security (IoTBDS).
Nguyen, P. H., Kramer, M., Klein, J., and Traon, Y. L.
(2015). An extensive systematic review on the model-
driven development of secure systems. Information
and Software Technology, 68:62 – 81.
Nguyen, P. H., Phung, P. H., and Truong, H.-L. (2018).
A security policy enforcement framework for control-
ling iot tenant applications in the edge. In Proceedings
of the 8th International Conference on the Internet of
Things, IOT ’18, New York, NY, USA. Association
for Computing Machinery.
Nguyen, P. H., Yskout, K., Heyman, T., Klein, J., Scandari-
ato, R., and Le Traon, Y. (2015). Sospa: A system of
security design patterns for systematically engineer-
ing secure systems. In 2015 ACM/IEEE 18th Interna-
tional Conference on Model Driven Engineering Lan-
guages and Systems (MODELS), pages 246–255.
Oracevic, A., Dilek, S., and Ozdemir, S. (2017). Security
in internet of things: A survey. In 2017 International
Symposium on Networks, Computers and Communi-
cations (ISNCC), pages 1–6.
Petersen, K., Vakkalanka, S., and Kuzniarz, L. (2015).
Guidelines for conducting systematic mapping stud-
ies in software engineering: An update. Information
and Software Technology, 64:1–18.
Qanbari, S., Pezeshki, S., Raisi, R., Mahdizadeh, S.,
Rahimzadeh, R., Behinaein, N., Mahmoudi, F., Ay-
oubzadeh, S., Fazlali, P., Roshani, K., Yaghini, A.,
Amiri, M., Farivarmoheb, A., Zamani, A., and Dust-
dar, S. (2016). IoT design patterns: Computational
constructs to design, build and engineer edge appli-
cations. In 2016 IEEE First International Confer-
ence on Internet-of-Things Design and Implementa-
tion (IoTDI), pages 277–282.
Reinfurt, L., Breitenb
¨
ucher, U., Falkenthal, M., Leymann,
F., and Riegg, A. (2016). Internet of things patterns.
In Proceedings of the 21st European Conference on
Pattern Languages of Programs, EuroPlop ’16, New
York, NY, USA. ACM.
Roman, R., Najera, P., and Lopez, J. (2011). Securing the
internet of things. Computer, 44(9):51–58.
Ron Ross, Michael McEvilley, J. C. O. (2016). NIST
SP 800-160, Systems Security Engineering Consider-
ations for a Multidisciplinary Approach in the Engi-
neering of Trustworthy Secure Systems. National In-
stitute of Standards & Technology.
Schneier, B. (2017). IoT security: What’s plan b? IEEE
Security Privacy, 15(5):96–96.
Schumacher, M., Fernandez-Buglioni, E., Hybertson, D.,
Buschmann, F., and Sommerlad, P. (2013). Security
Patterns: Integrating security and systems engineer-
ing. John Wiley & Sons.
Steel, C. and Nagappan, R. (2006). Core Security Patterns:
Best Practices and Strategies for J2EE”, Web Ser-
vices, and Identity Management. Pearson Education.
Tran, N. K., Sheng, Q. Z., Babar, M. A., and Yao, L.
(2017). Searching the web of things: state of the art,
challenges, and solutions. ACM Computing Surveys
(CSUR), 50(4):55.
van der Meulen, R. G. (2017). Gartner says 8.4 billion con-
nected ”things” will be in use in 2017, up 31 percent
from 2016. Technical report, Consulting community.
Washizaki, H., Xia, T., Kamata, N., Fukazawa, Y., Kanuka,
H., Yamaoto, D., Yoshino, M., Okubo, T., Ogata, S.,
Kaiya, H., Kato, T., Hazeyama, A., Tanaka, T., Yosh-
ioka, N., and Priyalakshmi, G. (2018). Taxonomy
and literature survey of security pattern research. In
2018 IEEE Conference on Application, Information
and Network Security (AINS), pages 87–92.
Washizaki, H., Yoshioka, N., Hazeyama, A., Kato, T.,
Kaiya, H., Ogata, S., Okubo, T., and Fernandez,
E. B. (2019). Landscape of IoT patterns. In 2019
IEEE/ACM 1st International Workshop on Software
Engineering Research Practices for the Internet of
Things (SERP4IoT), pages 57–60.
A Systematic Mapping of Patterns and Architectures for IoT Security
149