Delegation of Access Rights
暂无分享,去创建一个
[1] Antonio F. Gómez-Skarmeta,et al. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things , 2015, Sensors.
[2] Genshe Chen,et al. A federated capability-based access control mechanism for internet of things (IoTs) , 2018, Defense + Security.
[3] Francesco Longo,et al. Blockchain-Based IoT-Cloud Authorization and Delegation , 2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP).
[4] Behzad Mozaffari Tazehkand,et al. On the Convergence of Blockchain and Internet of Things (IoT) Technologies , 2019, Journal of Strategic Innovation and Sustainability.
[5] Genshe Chen,et al. Exploration of blockchain-enabled decentralized capability-based access control strategy for space situation awareness , 2018, Optical Engineering.
[6] Hong Chen,et al. On the Security of Delegation in Access Control Systems , 2008, ESORICS.
[7] Trevor Kiviat,et al. Beyond Bitcoin: Issues in Regulating Blockchain Transactions , 2015 .
[8] Genshe Chen,et al. BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs , 2018, 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[9] Wei Ni,et al. Survey on blockchain for Internet of Things , 2019, Comput. Commun..
[10] Michael Kunz,et al. Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises , 2018, TrustBus.
[11] Tam Le,et al. CapChain: A Privacy Preserving Access Control Framework Based on Blockchain for Pervasive Environments , 2018, 2018 IEEE International Conference on Smart Computing (SMARTCOMP).
[12] Jamie Walters,et al. MediaSense - an Internet of Things Platform for Scalable and Decentralized Context Sharing and Control , 2012, ICDT 2012.
[13] Jameela Al-Jaroodi,et al. Blockchain in Industries: A Survey , 2019, IEEE Access.
[14] Salil S. Kanhere,et al. Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing , 2018, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[15] Khaled Salah,et al. A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes , 2018, 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA).
[16] Domenico Rotondi,et al. A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..
[17] Günter Müller,et al. Privacy with Delegation of Rights by Identity Management , 2006, ETRICS.
[18] Masahiro Sasabe,et al. Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework , 2020, IEEE Internet of Things Journal.
[19] Yue Cao,et al. Blockchain based permission delegation and access control in Internet of Things (BACI) , 2019, Comput. Secur..
[20] Hajar Mousannif,et al. Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.
[21] Xiaohong Jiang,et al. Smart Contract-Based Access Control for the Internet of Things , 2018, IEEE Internet of Things Journal.
[22] Oscar Novo,et al. Blockchain Meets IoT: An Architecture for Scalable Access Management in IoT , 2018, IEEE Internet of Things Journal.
[23] Abdellah Ait Ouahman,et al. Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT , 2017 .
[24] Akira Matsushita,et al. Capability-based delegation model in RBAC , 2010, SACMAT '10.
[25] Tiago M. Fernández-Caramés,et al. A Review on the Use of Blockchain for the Internet of Things , 2018, IEEE Access.
[26] Akhil Kumar,et al. A fine-grained, controllable, user-to-user delegation method in RBAC , 2005, SACMAT '05.
[27] Laura Ricci,et al. Blockchain Based Access Control , 2017, DAIS.
[28] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[29] Ayman I. Kayssi,et al. An architecture for the Internet of Things with decentralized data and centralized control , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).
[30] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[31] Simon Duquennoy,et al. Towards Blockchain-based Auditable Storage and Sharing of IoT Data , 2017, CCSW.
[32] Antonio F. Gómez-Skarmeta,et al. DCapBAC: embedding authorization logic into smart things through ECC optimizations , 2016, Int. J. Comput. Math..