Towards a self-adaptive access control middleware for the Internet of Things
暂无分享,去创建一个
[1] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[2] Ramjee Prasad,et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..
[3] Xinyi Huang,et al. Cryptographic Hierarchical Access Control for Dynamic Structures , 2016, IEEE Transactions on Information Forensics and Security.
[4] Heejo Lee,et al. Enforcing Access Control Using Risk Assessment , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).
[5] Manoj V. Thomas,et al. Agent-based approach for distributed access control in cloud environments , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[6] Sven Buchholz,et al. Comprehensive structured context profiles (CSCP): design and experiences , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[7] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[8] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[9] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[10] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[11] Benedict G. E. Wiedemann. Protection? , 1998, Science.
[12] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[13] Brice Morin,et al. Models@ Run.time to Support Dynamic Adaptation , 2009, Computer.
[14] Kamel Adi,et al. Risk-based decision method for access control systems , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[15] Junshan Li,et al. A Trust and Context Based Access Control Model for Distributed Systems , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[16] Antonio F. Skarmeta,et al. A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[17] Elisa Bertino,et al. Context-Aware Adaptation of Access-Control Policies , 2008, IEEE Internet Computing.
[18] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[19] Ladan Tahvildari,et al. Self-adaptive software: Landscape and research challenges , 2009, TAAS.
[20] Hongxin Hu,et al. Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks , 2016, SACMAT.
[21] M. A. Shibli,et al. Attribute based access control in DSpace , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).
[22] Robert Laddaga. Active Software , 2000, IWSAS.
[23] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[24] Lalana Kagal,et al. A Semantic Context-Aware Access Control Framework for Secure Collaborations in Pervasive Computing Environments , 2006, SEMWEB.
[25] Jian Zhu,et al. Trust and privacy in attribute based access control for collaboration environments , 2009, iiWAS.
[26] Xinyi Huang,et al. Supporting dynamic updates in storage clouds with the Akl-Taylor scheme , 2017, Information Sciences.
[27] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.