Background and Related Work
暂无分享,去创建一个
[1] Ju Chen,et al. An Identity Management Framework for Internet of Things , 2015, 2015 IEEE 12th International Conference on e-Business Engineering.
[2] Jiejun Hu,et al. Recent Advances in the Internet of Things: Multiple Perspectives , 2017 .
[3] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[4] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[5] A. K. Mandal,et al. Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[6] Rajkumar Buyya,et al. GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids , 2004, PDCAT.
[7] Hao Jiang,et al. JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language , 2017, WISTP.
[8] M. Beynon,et al. The Dempster-Shafer theory of evidence: an alternative approach to multicriteria decision modelling , 2000 .
[9] Muneer Bani Yassein,et al. Application layer protocols for the Internet of Things: A survey , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).
[10] Ulrich Lang,et al. Proximity-Based Access Control (PBAC) using Model-Driven Security , 2015, ISSE.
[11] Li Gong,et al. A secure identity-based capability system , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[12] Aishwarya R Parab. Generic Approach for Encryption using Reverse Context Free Grammar Productions , 2018 .
[13] Ramjee Prasad,et al. Capability-based access control delegation model on the federated IoT network , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[14] K. R. Venugopal,et al. Searching for the IoT Resources: Fundamentals, Requirements, Comprehensive Review, and Future Directions , 2018, IEEE Communications Surveys & Tutorials.
[15] Haider Abbas,et al. Trust models of internet of smart things: A survey, open issues, and future directions , 2019, J. Netw. Comput. Appl..
[16] Byung-Seo Kim,et al. Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.
[17] Alessandro Bassi,et al. Enabling Things to Talk , 2013, Springer Berlin Heidelberg.
[18] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[19] Benoit Gaudou,et al. Combining Trust and Self-Organization for Robust Maintaining of Information Coherence in Disturbed MAS , 2011, 2011 IEEE Fifth International Conference on Self-Adaptive and Self-Organizing Systems.
[20] Pramod Aswale,et al. An Overview of Internet of Things: Architecture, Protocols and Challenges , 2018, Information and Communication Technology for Intelligent Systems.
[21] Kire Trivodaliev,et al. A review of Internet of Things for smart home: Challenges and solutions , 2017 .
[22] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[23] Byung-Seo Kim,et al. Internet of Things (IoT) Operating Systems Support, Networking Technologies, Applications, and Challenges: A Comparative Review , 2018, IEEE Communications Surveys & Tutorials.
[24] Mohsen Darianian,et al. Architectural Solutions for Mobile RFID Services for the Internet of Things , 2008, 2008 IEEE Congress on Services - Part I.
[25] Yolanda Gil,et al. A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..
[26] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[27] Vishnu Sharma,et al. Solving security issues in mobile computing using cryptography techniques — A Survey , 2015, International Conference on Computing, Communication & Automation.
[28] Javier López,et al. A Conceptual Framework for Trust Models , 2012, TrustBus.
[29] Chandan Mazumdar,et al. A Survey of Trust Models for Enterprise Information Systems , 2016 .
[30] Colin Camerer,et al. Not So Different After All: A Cross-Discipline View Of Trust , 1998 .
[31] Audun Jøsang,et al. Trust network analysis with subjective logic , 2006, ACSC.
[32] Emmanuel Bertin,et al. Access control in IoT: From requirements to a candidate vision , 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).
[33] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[34] Audun Jøsang,et al. DEMPSTER’S RULE AS SEEN BY LITTLE COLORED BALLS , 2012, Comput. Intell..
[35] Jing Liu,et al. A Model of Workflow-oriented Attributed Based Access Control , 2011 .
[36] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[37] Domenico Rotondi,et al. IoT Access Control Issues: A Capability Based Approach , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[38] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[39] Vijay Karamcheti,et al. dRBAC: distributed role-based access control for dynamic coalition environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[40] Paul C. van Oorschot,et al. On Diffie-Hellman Key Agreement with Short Exponents , 1996, EUROCRYPT.
[41] Yacine Atif,et al. Securing the Web of Things with Role-Based Access Control , 2015, C2SI.
[42] Sibel Adali,et al. A Survey on Trust Modeling , 2015, ACM Comput. Surv..
[43] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[44] Genshe Chen,et al. A federated capability-based access control mechanism for internet of things (IoTs) , 2018, Defense + Security.
[45] Jeong-Nyeo Kim,et al. Technology trends of access control in IoT and requirements analysis , 2015, 2015 International Conference on Information and Communication Technology Convergence (ICTC).
[46] Vlad Trifa,et al. Towards the Web of Things: Web Mashups for Embedded Devices , 2009 .
[47] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[48] A. Jøsang,et al. User Centric Identity Management , 2005 .
[49] Chao Wang,et al. Research on Mandatory Access Control Model for Application System , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.
[50] Ru-chuan Wang,et al. An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .
[51] Alessandro Bassi,et al. Enabling Things to Talk: Designing IoT solutions with the IoT Architectural Reference Model , 2013 .
[52] Jon A. Solworth,et al. A layered design of discretionary access controls with decidable safety properties , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[53] Domenico Rotondi,et al. A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..
[54] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[55] Guoping Zhang,et al. The Research of Access Control Based on UCON in the Internet of Things , 2011, J. Softw..
[56] Ravi S. Sandhu,et al. Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda , 2016, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC).
[57] Anirban Sarkar,et al. Trust Management Model for Cloud Computing Environment , 2013, SOCO 2013.
[58] Virgil D. Gligor,et al. Towards a Theory of Trust in Networks of Humans and Computers , 2011, Security Protocols Workshop.
[59] Zhaoyu Liu,et al. A Formal Definition for Trust in Distributed Systems , 2005, ISC.
[60] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[61] Anas Abou El Kalam,et al. SmartOrBAC security and privacy in the Internet of Things , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
[62] Anand R. Tripathi,et al. Context-aware role-based access control in pervasive computing systems , 2008, SACMAT '08.
[63] Jesus Alonso-Zarate,et al. A Survey on Application Layer Protocols for the Internet of Things , 2015 .
[64] A. A. Zaidan,et al. A review on intelligent process for smart home applications based on IoT: coherent taxonomy, motivation, open challenges, and recommendations , 2018, Artificial Intelligence Review.
[65] Ramaswamy Chandramouli,et al. Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) , 2016, ABAC '16.
[66] Yacine Challal,et al. Poster: Activity-Based Access Control for IoT , 2015, SmartObjects '15.
[67] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[68] Vivy Suhendra. A Survey on Access Control Deployment , 2011, FGIT-SecTech.
[69] Jason Crampton,et al. PTaCL: A Language for Attribute-Based Access Control in Open Systems , 2012, POST.
[70] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[71] Antonio F. Skarmeta,et al. A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[72] Valtteri Niemi,et al. A User Behavior Based Trust Model for Mobile Applications , 2008, ATC.
[73] Luca Veltri,et al. Internet of Things on Power Line Communications: An Experimental Performance Analysis , 2018, Energy Systems in Electrical Engineering.
[74] Sanjay E. Sarma,et al. A Survey of the Connected Vehicle Landscape—Architectures, Enabling Technologies, Applications, and Development Areas , 2017, IEEE Transactions on Intelligent Transportation Systems.
[75] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[76] Christoph Schroth,et al. The Internet of Things in an Enterprise Context , 2009, FIS.
[77] Z. Hasan. A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK , 2011 .
[78] Nasir Ghani,et al. Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.
[79] Uwe Schwiegelshohn,et al. Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability , 2016, J. Comput. Sci..
[80] Dipti Jadhav,et al. Security threats in the application layer in IOT applications , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[81] Jingsha He,et al. Survey of access control models and technologies for cloud computing , 2018, Cluster Computing.
[82] Lin Yang,et al. A survey of Identity Management technology , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[83] Alessandro Bassi,et al. From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.
[84] Jia Guo,et al. A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..
[85] Athena Vakali. Access Control Policy Languages , 2009, Encyclopedia of Database Systems.
[86] Yuanyuan Yang,et al. Heracles: Scalable, Fine-Grained Access Control for Internet-of-Things in Enterprise Environments , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[87] Pierangela Samarati,et al. Authentication, access control, and audit , 1996, CSUR.
[88] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[89] Miao Wu,et al. Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[90] Haibo Shen. A Capability-Based Access Control Framework with Delegation Support , 2016 .
[91] Xin Wang,et al. XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.
[92] Theodore Tryfonas,et al. The Internet of Things: a security point of view , 2016, Internet Res..
[93] Susan Wiedenbeck,et al. On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..
[94] Giuseppe Piro,et al. Attribute-Based Access Control Scheme in Federated IoT Platforms , 2016, InterOSS@IoT.
[95] Jin Tong,et al. Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).
[96] Yanchun Zhang,et al. Privacy-aware access control with trust management in web service , 2011, World Wide Web.
[97] Sarvar Patel,et al. Password-Authenticated Key Exchange Based on RSA , 2000, ASIACRYPT.
[98] Jaehong Park,et al. Towards usage control models: beyond traditional access control , 2002, SACMAT '02.
[99] Indrakshi Ray,et al. Securing Home IoT Environments with Attribute-Based Access Control , 2018 .
[100] Arthur P. Dempster,et al. Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.
[101] Giannis F. Marias,et al. Access Control for the Internet of Things , 2016, 2016 International Workshop on Secure Internet of Things (SIoT).
[102] Ramjee Prasad,et al. Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[103] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[104] Jia Guo,et al. Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.
[105] Xin Chen,et al. An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things , 2017, IEEE Access.
[106] Javier López,et al. Modelling trust dynamics in the Internet of Things , 2017, Inf. Sci..
[107] Guoping Zhang,et al. An extended role based access control model for the Internet of Things , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).
[108] Li Pan,et al. A Machine Learning Based Trust Evaluation Framework for Online Social Networks , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[109] Lik Mui,et al. Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .
[110] Jairo A. Gutiérrez,et al. Toward trust based protocols in a pervasive and mobile computing environment: A survey , 2018, Ad Hoc Networks.
[111] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[112] Gang Chen,et al. Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[113] Antonio F. Gómez-Skarmeta,et al. Towards a Lightweight Authentication and Authorization Framework for Smart Objects , 2014 .
[114] Mohammad Sayad Haghighi,et al. A conceptual trust model for the Internet of Things interactions , 2016, 2016 8th International Symposium on Telecommunications (IST).
[115] Tim Kerins,et al. Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[116] Gunasekaran Manogaran,et al. A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system , 2017, Future Gener. Comput. Syst..
[117] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[118] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[119] Goutam Sanyal,et al. A comparative survey of Symmetric and Asymmetric Key Cryptography , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).
[120] Cheng Cheng,et al. Access Control Method for Web of Things Based on Role and SNS , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.
[121] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[122] Sushil Jajodia,et al. Policies, Models, and Languages for Access Control , 2005, DNIS.
[123] Thanassis Tiropanis,et al. Analytics for the Internet of Things , 2018, ACM Comput. Surv..
[124] Athanasios V. Vasilakos,et al. IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.
[125] Antonio F. Gómez-Skarmeta,et al. Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..
[126] Antonio Iera,et al. A systemic and cognitive approach for IoT security , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[127] K. Arai. DEFINING TRUST USING EXPECTED UTILITY THEORY , 2009 .
[128] Bin Liu,et al. A Survey on Trust Modeling from a Bayesian Perspective , 2018, Wirel. Pers. Commun..
[129] J. Lewis,et al. Trust as a Social Reality , 1985 .
[130] Kathryn M. Kimery,et al. THIRD-PARTY ASSURANCES: MAPPING THE ROAD TO TRUST IN E-RETAILING , 2002 .
[131] Emmanuel S. Pilli,et al. A framework to manage Trust in Internet of Things , 2016, 2016 International Conference on Emerging Trends in Communication Technologies (ETCT).
[132] Yuanyuan Yang,et al. Flexible, Fine Grained Access Control for Internet of Things: Poster Abstract , 2017, IoTDI.