메뉴 건너뛰기




Volumn , Issue , 2012, Pages 787-792

IoT access control issues: A capability based approach

Author keywords

Authorization; Capability Based Access Control; Delegation; Internet of Things; Rights Revocation

Indexed keywords

AUTHORIZATION; AUTHORIZATION FRAMEWORKS; CONTROL PROCESS; DELEGATION; DISTRIBUTED SYSTEMS; INFORMATION PROTECTION; INTERACTION DYNAMICS; INTERNET OF THINGS (IOT); RIGHTS REVOCATION; SHOP FLOOR;

EID: 84867696056     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IMIS.2012.38     Document Type: Conference Paper
Times cited : (62)

References (25)
  • 1
    • 84867732736 scopus 로고    scopus 로고
    • See project home page
    • See project home page: http://iot-at-work.eu
  • 2
    • 84867734360 scopus 로고    scopus 로고
    • Available
    • Wikipedia. Capability-based security. Available: http://en.wikipedia.org/ wiki/Capability-based-security
    • Capability-based Security
  • 9
    • 0024089972 scopus 로고
    • The Confused Deputy: (or why capabilities might have been invented)
    • October
    • N. Hardy, "The Confused Deputy: (or why capabilities might have been invented)," ACM SIGOPS Operating Systems Review, vol. 22, no. 4, October 1988
    • (1988) ACM SIGOPS Operating Systems Review , vol.22 , Issue.4
    • Hardy, N.1
  • 14
    • 0003505824 scopus 로고
    • Digital Press, Bedford, Massachusetts, Available
    • H. Levy, "Capability-Based Computer Systems," Digital Press, Bedford, Massachusetts, 1984. Available: http://www.cs.washington.edu/homes/ levy/capabook/
    • (1984) Capability-Based Computer Systems
    • Levy, H.1
  • 16
    • 0003593599 scopus 로고    scopus 로고
    • IETF RFC 2693, September Available
    • SPKI Certificate Theory, IETF RFC 2693, September 1999. Available: http://www.ietf.org/rfc/rfc2693.txt
    • (1999) SPKI Certificate Theory
  • 19
    • 84867732734 scopus 로고    scopus 로고
    • Making the impossible easy: Usable PKI
    • Chap. 16 edited by L. Cranor and S. Garfinkel, O'Reilly
    • D. Balfanz, G. E. Durfee, D. K. Smetters, "Making the impossible easy: usable PKI," in Security and Usability, Chap. 16 edited by L. Cranor and S. Garfinkel, O'Reilly, 2005
    • (2005) Security and Usability
    • Balfanz, D.1    Durfee, G.E.2    Smetters, D.K.3
  • 21
    • 33646166700 scopus 로고    scopus 로고
    • Systems Research Laboratory, Johns Hopkins University, Tech. Report SRL2003-02
    • M. Miller, Ka-Ping Yee, J. Shapiro, "Capability Myths Demolished," Systems Research Laboratory, Johns Hopkins University, Tech. Report SRL2003-02, 2003
    • (2003) Capability Myths Demolished
    • Miller, M.1    Yee, K.-P.2    Shapiro, J.3
  • 25
    • 77953350247 scopus 로고    scopus 로고
    • Adding Attributes to Role-Based Access Control
    • June
    • D. R. Kuhn, E. J. Coyne, T. R. Weil, "Adding Attributes to Role-Based Access Control," IEEE Computer, vol. 43, no. 6, June 2010
    • (2010) IEEE Computer , vol.43 , Issue.6
    • Kuhn, D.R.1    Coyne, E.J.2    Weil, T.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.