Access Control Model for AWS Internet of Things
暂无分享,去创建一个
[1] Ramjee Prasad,et al. Identity driven capability based access control (ICAC) scheme for the Internet of Things , 2012, 2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS).
[2] Ravi S. Sandhu,et al. A model for attribute-based user-role assignment , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[3] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[4] Ramjee Prasad,et al. Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.
[5] Domenico Rotondi,et al. A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..
[6] Jing Liu,et al. Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[7] Guoping Zhang,et al. An extended role based access control model for the Internet of Things , 2010, 2010 International Conference on Information, Networking and Automation (ICINA).
[8] Ravi S. Sandhu,et al. Community-Based Secure Information and Resource Sharing in AWS Public Cloud , 2015, 2015 IEEE Conference on Collaboration and Internet Computing (CIC).
[9] Ravi S. Sandhu,et al. Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda , 2016, 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC).
[10] Hajar Mousannif,et al. Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.
[11] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[12] Antonio F. Gómez-Skarmeta,et al. Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..
[13] David F. Ferraiolo,et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .
[14] Ram Krishnan,et al. Integrating Attributes into Role-Based Access Control , 2015, DBSec.
[15] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[16] Yin Lihua,et al. Attribute-Role-Based Hybrid Access Control in the Internet of Things , 2014, APWeb 2014.
[17] Xin Jin,et al. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.
[18] Vijayalakshmi Atluri,et al. The Policy Machine: A novel architecture and framework for access control policy specification and enforcement , 2011, J. Syst. Archit..
[19] David F. Ferraiolo,et al. Policy Machine: Features, Architecture, and Specification , 2014 .
[20] Luigi Atzori,et al. The Virtual Object as a Major Element of the Internet of Things: A Survey , 2016, IEEE Communications Surveys & Tutorials.