TACIoT: multidimensional trust-aware access control system for the Internet of Things
暂无分享,去创建一个
[1] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[2] Ramjee Prasad,et al. Identity driven capability based access control (ICAC) scheme for the Internet of Things , 2012, 2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS).
[3] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[4] Neeli R. Prasad,et al. A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.
[5] Jia Guo,et al. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
[6] Hector Garcia-Molina,et al. Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.
[7] Antonio F. Gómez-Skarmeta,et al. DCapBAC: embedding authorization logic into smart things through ECC optimizations , 2016, Int. J. Comput. Math..
[8] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[9] Antonio F. Gómez-Skarmeta,et al. Privacy-Preserving Security Framework for a Social-Aware Internet of Things , 2014, UCAmI.
[10] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[11] Alessandro Bassi,et al. Enabling Things to Talk , 2013, Springer Berlin Heidelberg.
[12] Douglas Crockford,et al. The application/json Media Type for JavaScript Object Notation (JSON) , 2006, RFC.
[13] Domenico Rotondi,et al. A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..
[14] Ludwig Seitz,et al. Problem Description for Authorization in Constrained Environments , 2015 .
[15] Jin Tong,et al. Attributed based access control (ABAC) for Web services , 2005, IEEE International Conference on Web Services (ICWS'05).
[16] Mark Weiser. The computer for the 21st century , 1991 .
[17] Antonio F. Gómez-Skarmeta,et al. IoT6 - Moving to an IPv6-Based Future IoT , 2013, Future Internet Assembly.
[18] Djamal Zeghlache,et al. Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..
[19] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[20] Antonio F. Gómez-Skarmeta,et al. Shifting Primes on OpenRISC Processors with Hardware Multiplier , 2013, ICT-EurAsia.
[21] David R. Kuhn,et al. Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .
[22] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[23] Antonio F. Gómez-Skarmeta,et al. Mobile digcovery: discovering and interacting with the world through the Internet of things , 2013, Personal and Ubiquitous Computing.
[24] Klaus Wehrle,et al. Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..
[25] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[26] Hans Schaffers,et al. Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation , 2011, Future Internet Assembly.
[27] Guiran Chang,et al. Modeling access control for cyber-physical systems using reputation , 2012, Comput. Electr. Eng..
[28] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[29] Ronald R. Yager,et al. Essentials of fuzzy modeling and control , 1994 .