Authorization mechanism for MQTT-based Internet of Things
暂无分享,去创建一个
Panita Pongpaibool | Koonlachat Meesublak | Aimaschana Niruntasukrat | Chavee Issariyapat | Pramrudee Aiumsupucgul | Anun Panya | A. Niruntasukrat | P. Pongpaibool | K. Meesublak | C. Issariyapat | Pramrudee Aiumsupucgul | Anun Panya
[1] Benjamin Aziz,et al. Federated Identity and Access Management for the Internet of Things , 2014, 2014 International Workshop on Secure Internet of Things.
[2] Dick Hardt,et al. The OAuth 2.0 Authorization Framework , 2012, RFC.
[3] Carsten Bormann,et al. The Constrained Application Protocol (CoAP) , 2014, RFC.
[4] Eric Rescorla,et al. Datagram Transport Layer Security Version 1.2 , 2012, RFC.
[5] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[6] Tero Kivinen,et al. Signature Authentication in the Internet Key Exchange Version 2 (IKEv2) , 2015, RFC.
[7] Dave Evans,et al. How the Next Evolution of the Internet Is Changing Everything , 2011 .
[8] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[9] Giovanni Emanuele Corazza,et al. Introducing the QEST broker: Scaling the IoT by bridging MQTT and REST , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[10] Ludwig Seitz,et al. Access Control Framework for Constrained Environments , 2014 .
[11] Eran Hammer-Lahav,et al. The OAuth 1.0 Protocol , 2010, RFC.