An access control management protocol for Internet of Things devices
暂无分享,去创建一个
[1] Jan Nolin,et al. The Internet of Things and convenience , 2016, Internet Res..
[2] Maryline Laurent-Maknavicius,et al. Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.
[3] Virgílio A. F. Almeida,et al. Governance Challenges for the Internet of Things , 2015, IEEE Internet Computing.
[4] Fagen Li,et al. Practical Secure Communication for Integrating Wireless Sensor Networks Into the Internet of Things , 2013, IEEE Sensors Journal.
[5] Baolin Hou,et al. Design of Distributed Remote Real-Time Monitoring and Control System Based on Internet , 2012 .
[6] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[7] Antonio F. Skarmeta,et al. A decentralized approach for security and privacy challenges in the Internet of Things , 2014, 2014 IEEE World Forum on Internet of Things (WF-IoT).
[8] Susanna Spinsante,et al. Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[9] Theodore Tryfonas,et al. The Internet of Things: a security point of view , 2016, Internet Res..
[10] Hannes Tschofenig,et al. Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.
[11] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[12] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[13] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[14] Kwang-Cheng Chen,et al. Information Fusion to Defend Intentional Attack in Internet of Things , 2014, IEEE Internet of Things Journal.
[15] Jonathan Loo,et al. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach , 2012, Int. J. Commun. Syst..
[16] Jorge Sá Silva,et al. Network‐layer security for the Internet of Things using TinyOS and BLIP , 2014, Int. J. Commun. Syst..
[17] Heljä Franssila. Enhancing information interaction as a means for situation awareness maintenance in mobile field work , 2016, Cognition, Technology & Work.
[18] Gregory Epiphaniou,et al. Guidelines for Internet of Things Deployment Approaches - The Thing Commandments , 2013, EUSPN/ICTH.
[19] Gerd Kortuem,et al. Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.
[20] Zhihua Li,et al. A Multi-layer Security Model for Internet of Things , 2012 .
[21] Donghee Shin,et al. Der Open-access-publikationsserver Der Zbw – Leibniz-informationszentrum Wirtschaft the Open Access Publication Server of the Zbw – Leibniz Information Centre for Economics a Socio-technical Framework for Internet-of-things Design a Socio-technical Framework for Internet-of-things Design , 2022 .
[22] Neeraj Suri,et al. Assessing the security of internet-connected critical infrastructures , 2014, Secur. Commun. Networks.
[23] Mario Piattini,et al. Security patterns and requirements for internet-based applications , 2006, Internet Res..
[24] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[25] H. Raghav Rao,et al. Security analysis of Internet technology components enabling globally distributed workplaces—a framework , 2008, TOIT.
[26] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[27] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[28] Charles J. Petrie,et al. Future Internet Protocols , 2012, IEEE Internet Comput..
[29] Ramjee Prasad,et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..
[30] Wendong Wang,et al. IPv4 Address Sharing and Allocation for IPv6 Transition , 2015, IEEE Internet Computing.
[31] Lina Yao,et al. Web-Based Management of the Internet of Things , 2015, IEEE Internet Computing.
[32] Yacine Challal,et al. A Systemic Approach for IoT Security , 2013, 2013 IEEE International Conference on Distributed Computing in Sensor Systems.
[33] Amin Hassanzadeh,et al. Towards effective security control assignment in the Industrial Internet of Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).