A proposal of a distributed access control over Fog computing: The ITS use case
暂无分享,去创建一个
[1] Guillaume Urvoy-Keller,et al. Data indexing in peer-to-peer DHT networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[2] Gade Krishna,et al. A scalable peer-to-peer lookup protocol for Internet applications , 2012 .
[3] Antonio F. Gómez-Skarmeta,et al. Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..
[4] Alexander V. Smirnov,et al. Context-based access control model for smart space , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).
[5] Srdjan Vukmirovic,et al. Role-Based Access Control Model Supporting Regional Division in Smart Grid System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.
[6] Bruce Christianson,et al. A Survey of Access Control Models in Wireless Sensor Networks , 2014, J. Sens. Actuator Networks.
[7] Ru-chuan Wang,et al. An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .
[8] Sang-Soo Yeo,et al. Dynamic Access Control Model for Security Client Services in Smart Grid , 2014, Int. J. Distributed Sens. Networks.
[9] Ivan Stojmenovic,et al. The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.
[10] Andrea Zanella,et al. Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.
[11] Hamid Mcheick,et al. Toward an Access Control Model for IOTCollab , 2015, ANT/SEIT.
[12] Dimitris Gritzalis,et al. Access Control Issues in Utilizing Fog Computing for Transport Infrastructure , 2015, CRITIS.
[13] Tom H. Luan,et al. Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.
[14] Lingyun Jiang,et al. Task-role-based Access Control Model in Smart Health-care System , 2015 .
[15] K. R. Venugopal,et al. Token Based Privacy Preserving Access Control in Wireless Sensor Networks , 2015, 2015 International Conference on Advanced Computing and Communications (ADCOM).
[16] Fang Gao,et al. Access Features Analysis of Things in the Internet of Things , 2016, 2016 3rd International Conference on Information Science and Control Engineering (ICISCE).
[17] Hella Kaffel Ben Ayed,et al. Generic Access Control System for Ad Hoc MCC and Fog Computing , 2016, CANS.
[18] Vladimir A. Oleshchuk,et al. An attribute based access control scheme for secure sharing of electronic health records , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[19] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[20] Suat Özdemir,et al. A fog computing based smart grid model , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).
[21] Arslan Munir,et al. IFCIoT: Integrated Fog Cloud IoT Architectural Paradigm for Future Internet of Things , 2017, ArXiv.
[22] Xin Wang,et al. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing , 2017, Sensors.
[23] Hajar Mousannif,et al. Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.
[24] Ahmed Barnawi,et al. Attribute Based Access Control (ABAC) for HER in Fog Computing Environment , 2017 .
[25] Hella Kaffel Ben Ayed,et al. An IDMS approach towards privacy and new requirements in IoT , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[26] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.