A federated capability-based access control mechanism for internet of things (IoTs)
暂无分享,去创建一个
Genshe Chen | Erik Blasch | Ronghua Xu | Yu Chen | Genshe Chen | Erik Blasch | Ronghua Xu | Yu Chen
[1] Jack B. Dennis,et al. Programming semantics for multiprogrammed computations , 1966, CACM.
[2] Li Gong,et al. A secure identity-based capability system , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[3] Ravi S. Sandhu. The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[5] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[6] Jin Tong,et al. Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).
[7] Shigeru Hosono,et al. A delegation framework for federated identity management , 2005, DIM '05.
[8] Marc Langheinrich,et al. The Internet of Things, First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings , 2008, IoT.
[9] Dominique Guinard,et al. SOCRADES: A Web Service Based Shop Floor Integration Infrastructure , 2008, IOT.
[10] Vlad Trifa,et al. SOA-Based Integration of the Internet of Things in Enterprise Services , 2009, 2009 IEEE International Conference on Web Services.
[11] Geoff Skinner. Cyber Security Management of Access Controls in Digital Ecosystems and Distributed Environments , 2009 .
[12] Guoping Zhang,et al. An extended role based access control model for the Internet of Things , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).
[13] Hidehito Gomi,et al. Dynamic Identity Delegation Using Access Tokens in Federated Environments , 2011, 2011 IEEE International Conference on Web Services.
[14] Vivy Suhendra. A Survey on Access Control Deployment , 2011, FGIT-SecTech.
[15] Cheng Cheng,et al. Access Control Method for Web of Things Based on Role and SNS , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.
[16] Ramjee Prasad,et al. Capability-based access control delegation model on the federated IoT network , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[17] Ramjee Prasad,et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things , 2012, J. Cyber Secur. Mobil..
[18] Domenico Rotondi,et al. IoT@Work automation middleware system design and architecture , 2012, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012).
[19] Domenico Rotondi,et al. A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..
[20] Antonio F. Gómez-Skarmeta,et al. Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..
[21] Ru-chuan Wang,et al. An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .
[22] Patrice Clemente,et al. An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system , 2014, Future Gener. Comput. Syst..
[23] Genshe Chen,et al. Information fusion in a cloud computing era: A systems-level perspective , 2014, IEEE Aerospace and Electronic Systems Magazine.
[24] Yacine Atif,et al. Securing the Web of Things with Role-Based Access Control , 2015, C2SI.
[25] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[26] Chin-Tser Huang,et al. Poster Abstract: Smart Urban Surveillance Using Fog Computing , 2016, 2016 IEEE/ACM Symposium on Edge Computing (SEC).
[27] Antonio F. Gómez-Skarmeta,et al. DCapBAC: embedding authorization logic into smart things through ECC optimizations , 2016, Int. J. Comput. Math..
[28] Roger Zimmermann,et al. Dynamic Urban Surveillance Video Stream Processing Using Fog Computing , 2016, 2016 IEEE Second International Conference on Multimedia Big Data (BigMM).
[29] Antonio F. Gómez-Skarmeta,et al. TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..
[30] Lauro Snidaro,et al. Context-Enhanced Information Fusion , 2016, Advances in Computer Vision and Pattern Recognition.
[31] Stelios C. A. Thomopoulos,et al. Panel summary of cyber-physical systems (CPS) and Internet of Things (IoT) opportunities with information fusion , 2017, Defense + Security.
[32] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[33] Erik Blasch,et al. Enabling Smart Urban Surveillance at The Edge , 2017, 2017 IEEE International Conference on Smart Cloud (SmartCloud).
[34] Hajar Mousannif,et al. Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.
[35] Haibin Ling,et al. A Container-Based Elastic Cloud Architecture for Pseudo Real-Time Exploitation of Wide Area Motion Imagery (WAMI) Stream , 2016, Journal of Signal Processing Systems.