Background and Related Work

[1]  Ju Chen,et al.  An Identity Management Framework for Internet of Things , 2015, 2015 IEEE 12th International Conference on e-Business Engineering.

[2]  Jiejun Hu,et al.  Recent Advances in the Internet of Things: Multiple Perspectives , 2017 .

[3]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[4]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[5]  A. K. Mandal,et al.  Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[6]  Rajkumar Buyya,et al.  GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids , 2004, PDCAT.

[7]  Hao Jiang,et al.  JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language , 2017, WISTP.

[8]  M. Beynon,et al.  The Dempster-Shafer theory of evidence: an alternative approach to multicriteria decision modelling , 2000 .

[9]  Muneer Bani Yassein,et al.  Application layer protocols for the Internet of Things: A survey , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).

[10]  Ulrich Lang,et al.  Proximity-Based Access Control (PBAC) using Model-Driven Security , 2015, ISSE.

[11]  Li Gong,et al.  A secure identity-based capability system , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[12]  Aishwarya R Parab Generic Approach for Encryption using Reverse Context Free Grammar Productions , 2018 .

[13]  Ramjee Prasad,et al.  Capability-based access control delegation model on the federated IoT network , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.

[14]  K. R. Venugopal,et al.  Searching for the IoT Resources: Fundamentals, Requirements, Comprehensive Review, and Future Directions , 2018, IEEE Communications Surveys & Tutorials.

[15]  Haider Abbas,et al.  Trust models of internet of smart things: A survey, open issues, and future directions , 2019, J. Netw. Comput. Appl..

[16]  Byung-Seo Kim,et al.  Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.

[17]  Alessandro Bassi,et al.  Enabling Things to Talk , 2013, Springer Berlin Heidelberg.

[18]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[19]  Benoit Gaudou,et al.  Combining Trust and Self-Organization for Robust Maintaining of Information Coherence in Disturbed MAS , 2011, 2011 IEEE Fifth International Conference on Self-Adaptive and Self-Organizing Systems.

[20]  Pramod Aswale,et al.  An Overview of Internet of Things: Architecture, Protocols and Challenges , 2018, Information and Communication Technology for Intelligent Systems.

[21]  Kire Trivodaliev,et al.  A review of Internet of Things for smart home: Challenges and solutions , 2017 .

[22]  Sarmad Ullah Khan,et al.  Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.

[23]  Byung-Seo Kim,et al.  Internet of Things (IoT) Operating Systems Support, Networking Technologies, Applications, and Challenges: A Comparative Review , 2018, IEEE Communications Surveys & Tutorials.

[24]  Mohsen Darianian,et al.  Architectural Solutions for Mobile RFID Services for the Internet of Things , 2008, 2008 IEEE Congress on Services - Part I.

[25]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[26]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[27]  Vishnu Sharma,et al.  Solving security issues in mobile computing using cryptography techniques — A Survey , 2015, International Conference on Computing, Communication & Automation.

[28]  Javier López,et al.  A Conceptual Framework for Trust Models , 2012, TrustBus.

[29]  Chandan Mazumdar,et al.  A Survey of Trust Models for Enterprise Information Systems , 2016 .

[30]  Colin Camerer,et al.  Not So Different After All: A Cross-Discipline View Of Trust , 1998 .

[31]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.

[32]  Emmanuel Bertin,et al.  Access control in IoT: From requirements to a candidate vision , 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).

[33]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[34]  Audun Jøsang,et al.  DEMPSTER’S RULE AS SEEN BY LITTLE COLORED BALLS , 2012, Comput. Intell..

[35]  Jing Liu,et al.  A Model of Workflow-oriented Attributed Based Access Control , 2011 .

[36]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[37]  Domenico Rotondi,et al.  IoT Access Control Issues: A Capability Based Approach , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[38]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[39]  Vijay Karamcheti,et al.  dRBAC: distributed role-based access control for dynamic coalition environments , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[40]  Paul C. van Oorschot,et al.  On Diffie-Hellman Key Agreement with Short Exponents , 1996, EUROCRYPT.

[41]  Yacine Atif,et al.  Securing the Web of Things with Role-Based Access Control , 2015, C2SI.

[42]  Sibel Adali,et al.  A Survey on Trust Modeling , 2015, ACM Comput. Surv..

[43]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[44]  Genshe Chen,et al.  A federated capability-based access control mechanism for internet of things (IoTs) , 2018, Defense + Security.

[45]  Jeong-Nyeo Kim,et al.  Technology trends of access control in IoT and requirements analysis , 2015, 2015 International Conference on Information and Communication Technology Convergence (ICTC).

[46]  Vlad Trifa,et al.  Towards the Web of Things: Web Mashups for Embedded Devices , 2009 .

[47]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[48]  A. Jøsang,et al.  User Centric Identity Management , 2005 .

[49]  Chao Wang,et al.  Research on Mandatory Access Control Model for Application System , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[50]  Ru-chuan Wang,et al.  An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .

[51]  Alessandro Bassi,et al.  Enabling Things to Talk: Designing IoT solutions with the IoT Architectural Reference Model , 2013 .

[52]  Jon A. Solworth,et al.  A layered design of discretionary access controls with decidable safety properties , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[53]  Domenico Rotondi,et al.  A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..

[54]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[55]  Guoping Zhang,et al.  The Research of Access Control Based on UCON in the Internet of Things , 2011, J. Softw..

[56]  Ravi S. Sandhu,et al.  Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda , 2016, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC).

[57]  Anirban Sarkar,et al.  Trust Management Model for Cloud Computing Environment , 2013, SOCO 2013.

[58]  Virgil D. Gligor,et al.  Towards a Theory of Trust in Networks of Humans and Computers , 2011, Security Protocols Workshop.

[59]  Zhaoyu Liu,et al.  A Formal Definition for Trust in Distributed Systems , 2005, ISC.

[60]  Sabrina De Capitani di Vimercati,et al.  Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.

[61]  Anas Abou El Kalam,et al.  SmartOrBAC security and privacy in the Internet of Things , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

[62]  Anand R. Tripathi,et al.  Context-aware role-based access control in pervasive computing systems , 2008, SACMAT '08.

[63]  Jesus Alonso-Zarate,et al.  A Survey on Application Layer Protocols for the Internet of Things , 2015 .

[64]  A. A. Zaidan,et al.  A review on intelligent process for smart home applications based on IoT: coherent taxonomy, motivation, open challenges, and recommendations , 2018, Artificial Intelligence Review.

[65]  Ramaswamy Chandramouli,et al.  Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) , 2016, ABAC '16.

[66]  Yacine Challal,et al.  Poster: Activity-Based Access Control for IoT , 2015, SmartObjects '15.

[67]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[68]  Vivy Suhendra A Survey on Access Control Deployment , 2011, FGIT-SecTech.

[69]  Jason Crampton,et al.  PTaCL: A Language for Attribute-Based Access Control in Open Systems , 2012, POST.

[70]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[71]  Antonio F. Skarmeta,et al.  A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).

[72]  Valtteri Niemi,et al.  A User Behavior Based Trust Model for Mobile Applications , 2008, ATC.

[73]  Luca Veltri,et al.  Internet of Things on Power Line Communications: An Experimental Performance Analysis , 2018, Energy Systems in Electrical Engineering.

[74]  Sanjay E. Sarma,et al.  A Survey of the Connected Vehicle Landscape—Architectures, Enabling Technologies, Applications, and Development Areas , 2017, IEEE Transactions on Intelligent Transportation Systems.

[75]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[76]  Christoph Schroth,et al.  The Internet of Things in an Enterprise Context , 2009, FIS.

[77]  Z. Hasan A Survey on Shari’Ah Governance Practices in Malaysia, GCC Countries and the UK , 2011 .

[78]  Nasir Ghani,et al.  Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.

[79]  Uwe Schwiegelshohn,et al.  Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability , 2016, J. Comput. Sci..

[80]  Dipti Jadhav,et al.  Security threats in the application layer in IOT applications , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[81]  Jingsha He,et al.  Survey of access control models and technologies for cloud computing , 2018, Cluster Computing.

[82]  Lin Yang,et al.  A survey of Identity Management technology , 2010, 2010 IEEE International Conference on Information Theory and Information Security.

[83]  Alessandro Bassi,et al.  From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.

[84]  Jia Guo,et al.  A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..

[85]  Athena Vakali Access Control Policy Languages , 2009, Encyclopedia of Database Systems.

[86]  Yuanyuan Yang,et al.  Heracles: Scalable, Fine-Grained Access Control for Internet-of-Things in Enterprise Environments , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[87]  Pierangela Samarati,et al.  Authentication, access control, and audit , 1996, CSUR.

[88]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[89]  Miao Wu,et al.  Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[90]  Haibo Shen A Capability-Based Access Control Framework with Delegation Support , 2016 .

[91]  Xin Wang,et al.  XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.

[92]  Theodore Tryfonas,et al.  The Internet of Things: a security point of view , 2016, Internet Res..

[93]  Susan Wiedenbeck,et al.  On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..

[94]  Giuseppe Piro,et al.  Attribute-Based Access Control Scheme in Federated IoT Platforms , 2016, InterOSS@IoT.

[95]  Jin Tong,et al.  Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).

[96]  Yanchun Zhang,et al.  Privacy-aware access control with trust management in web service , 2011, World Wide Web.

[97]  Sarvar Patel,et al.  Password-Authenticated Key Exchange Based on RSA , 2000, ASIACRYPT.

[98]  Jaehong Park,et al.  Towards usage control models: beyond traditional access control , 2002, SACMAT '02.

[99]  Indrakshi Ray,et al.  Securing Home IoT Environments with Attribute-Based Access Control , 2018 .

[100]  Arthur P. Dempster,et al.  Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[101]  Giannis F. Marias,et al.  Access Control for the Internet of Things , 2016, 2016 International Workshop on Secure Internet of Things (SIoT).

[102]  Ramjee Prasad,et al.  Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.

[103]  Alfred Menezes,et al.  The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..

[104]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[105]  Xin Chen,et al.  An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things , 2017, IEEE Access.

[106]  Javier López,et al.  Modelling trust dynamics in the Internet of Things , 2017, Inf. Sci..

[107]  Guoping Zhang,et al.  An extended role based access control model for the Internet of Things , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).

[108]  Li Pan,et al.  A Machine Learning Based Trust Evaluation Framework for Online Social Networks , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[109]  Lik Mui,et al.  Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .

[110]  Jairo A. Gutiérrez,et al.  Toward trust based protocols in a pervasive and mobile computing environment: A survey , 2018, Ad Hoc Networks.

[111]  Kostas E. Psannis,et al.  Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..

[112]  Gang Chen,et al.  Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[113]  Antonio F. Gómez-Skarmeta,et al.  Towards a Lightweight Authentication and Authorization Framework for Smart Objects , 2014 .

[114]  Mohammad Sayad Haghighi,et al.  A conceptual trust model for the Internet of Things interactions , 2016, 2016 8th International Symposium on Telecommunications (IST).

[115]  Tim Kerins,et al.  Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[116]  Gunasekaran Manogaran,et al.  A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system , 2017, Future Gener. Comput. Syst..

[117]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[118]  Luming Tan,et al.  Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[119]  Goutam Sanyal,et al.  A comparative survey of Symmetric and Asymmetric Key Cryptography , 2014, 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE).

[120]  Cheng Cheng,et al.  Access Control Method for Web of Things Based on Role and SNS , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.

[121]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[122]  Sushil Jajodia,et al.  Policies, Models, and Languages for Access Control , 2005, DNIS.

[123]  Thanassis Tiropanis,et al.  Analytics for the Internet of Things , 2018, ACM Comput. Surv..

[124]  Athanasios V. Vasilakos,et al.  IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.

[125]  Antonio F. Gómez-Skarmeta,et al.  Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..

[126]  Antonio Iera,et al.  A systemic and cognitive approach for IoT security , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[127]  K. Arai DEFINING TRUST USING EXPECTED UTILITY THEORY , 2009 .

[128]  Bin Liu,et al.  A Survey on Trust Modeling from a Bayesian Perspective , 2018, Wirel. Pers. Commun..

[129]  J. Lewis,et al.  Trust as a Social Reality , 1985 .

[130]  Kathryn M. Kimery,et al.  THIRD-PARTY ASSURANCES: MAPPING THE ROAD TO TRUST IN E-RETAILING , 2002 .

[131]  Emmanuel S. Pilli,et al.  A framework to manage Trust in Internet of Things , 2016, 2016 International Conference on Emerging Trends in Communication Technologies (ETCT).

[132]  Yuanyuan Yang,et al.  Flexible, Fine Grained Access Control for Internet of Things: Poster Abstract , 2017, IoTDI.