Dynamic Access Control In Iot: Monitoring User Behavior Using Smart Contracts
暂无分享,去创建一个
[1] Carla Merkle Westphall,et al. A dynamic risk-based access control architecture for cloud computing , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[2] Krishna M. Sivalingam,et al. Futuristic Trends in Networks and Computing Technologies: Second International Conference, FTNCT 2019, Chandigarh, India, November 22–23, 2019, Revised Selected Papers , 2020 .
[3] André Ivanov,et al. DynPolAC: Dynamic Policy-Based Access Control for IoT Systems , 2018, 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC).
[4] Hany F. Atlam,et al. An efficient security risk estimation technique for Risk-based access control model for IoT , 2019, Internet Things.
[5] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[6] Wolfgang Leister,et al. Context-Aware Authentication for the Internet of Things , 2015, ICAS 2015.
[7] Mahmoud Elkhodr,et al. The Internet of Things: Vision & challenges , 2013, IEEE 2013 Tencon - Spring.
[8] Xiaokang Yang,et al. Futuristic Trends in Network and Communication Technologies , 2018, Communications in Computer and Information Science.
[9] Ru-chuan Wang,et al. An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .
[10] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[11] Antonio F. Gómez-Skarmeta,et al. TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..
[12] Gary B. Wills,et al. Validation of an adaptive risk-based access control model for the Internet of Things , 2018 .
[13] Yasnitsky Leonid. Advances in Intelligent Systems and Computing , 2019 .
[14] Xiaohong Jiang,et al. Smart Contract-Based Access Control for the Internet of Things , 2018, IEEE Internet of Things Journal.
[15] Zhou Cheng,et al. Overview of the Internet of Things , 2011 .
[16] Gary B. Wills,et al. Developing an Adaptive Risk-Based Access Control Model for the Internet of Things , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[17] Madhusudan Singh,et al. Blockchain: A game changer for securing IoT data , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).
[18] Lihua Yin,et al. Attribute-Role-Based Hybrid Access Control in the Internet of Things , 2014, APWeb Workshophs.
[19] Jean-Noel Colin,et al. Adaptive Risk-Aware Access Control Model for Internet of Things , 2017, 2017 International Workshop on Secure Internet of Things (SIoT).
[20] Ju Wook Jang,et al. A Blockchain-based Secure IoT Control Scheme , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).
[21] Kevin Ashton,et al. That ‘Internet of Things’ Thing , 1999 .
[22] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.
[23] D. Richard Kuhn,et al. Attribute-Based Access Control , 2017, Computer.
[24] Mehrdad S. Sharbaf,et al. Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control , 2017, 2017 International Conference on Computational Science and Computational Intelligence (CSCI).
[25] Guoping Zhang,et al. An extended role based access control model for the Internet of Things , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).
[26] Domenico Rotondi,et al. IoT Access Control Issues: A Capability Based Approach , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.