publication . Preprint . 2018

A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe;
Open Access English
  • Published: 01 May 2018
Comment: the SPIE Defense & Commercial Sensing 2018 (DCS), Conference on Sensors and Systems for Space Applications, Orlando, FL, USA, April 15, 2018. arXiv admin note: text overlap with arXiv:1804.09267
free text keywords: Computer Science - Networking and Internet Architecture
Related Organizations
Download from

[1] Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., and Ayyash, M., \Internet of things: A survey on enabling technologies, protocols, and applications," IEEE Communications Surveys & Tutorials 17(4), 2347{2376 (2015).

[2] Snidaro, L., Garcia-Herrera, J., Llinas, J., and Blasch, E., [Context-Enhanced Information Fusion ], Springer (2016).

[3] Blasch, E., Kadar, I., Grewe, L. L., Brooks, R., Yu, W., Kwasinski, A., Thomopoulos, S., Salerno, J., and Qi, H., \Panel summary of cyber-physical systems (cps) and internet of things (iot) opportunities with information fusion," in [Signal Processing, Sensor/Information Fusion, and Target Recognition XXVI ], 10200, 102000O, International Society for Optics and Photonics (2017). [OpenAIRE]

[4] Alaba, F. A., Othman, M., Hashem, I. A. T., and Alotaibi, F., \Internet of things security: A survey," Journal of Network and Computer Applications 88, 10{28 (2017).

[5] Gusmeroli, S., Piccione, S., and Rotondi, D., \A capability-based security approach to manage access control in the internet of things," Mathematical and Computer Modelling 58(5-6), 1189{1205 (2013).

[6] Ouaddah, A., Mousannif, H., Elkalam, A. A., and Ouahman, A. A., \Access control in the internet of things: big challenges and new opportunities," Computer Networks 112, 237{262 (2017). [OpenAIRE]

[7] Gong, L., \A secure identity-based capability system," in [Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on ], 56{63, IEEE (1989).

[8] Suhendra, V., \A survey on access control deployment," in [International Conference on Security Technology ], 11{20, Springer (2011). [OpenAIRE]

[9] Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E., \Role-based access control models," Computer 29(2), 38{47 (1996).

Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue