메뉴 건너뛰기




Volumn 58, Issue 5-6, 2013, Pages 1189-1205

A capability-based security approach to manage access control in the Internet of Things

Author keywords

Authorization; Capability based access control; Internet of Things; Rights delegation; Rights revocation

Indexed keywords

AUTHORIZATION; CAPABILITY BASED ACCESS CONTROLS; INTERNET OF THINGS (IOT); RIGHTS DELEGATION; RIGHTS REVOCATIONS;

EID: 84880621938     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2013.02.006     Document Type: Article
Times cited : (327)

References (40)
  • 3
    • 70449504689 scopus 로고    scopus 로고
    • Access control for the services oriented architecture
    • in:, SWS'07, November
    • J. Li, A.H. Karp, Access control for the services oriented architecture, in: ACM Workshop on Secure Web Services, SWS'07, November 2007.
    • (2007) ACM Workshop on Secure Web Services
    • Li, J.1    Karp, A.H.2
  • 5
    • 84880620363 scopus 로고    scopus 로고
    • From ABAC to ZBAC: the evolution of access control models, HP laboratories, Tech. Report HPL-2009-30, February
    • A.H. Karp, H. Haury, M.H. Davis, From ABAC to ZBAC: the evolution of access control models, HP laboratories, Tech. Report HPL-2009-30, February 2009, pp. 9-17.
    • (2009) , pp. 9-17
    • Karp, A.H.1    Haury, H.2    Davis, M.H.3
  • 6
    • 77952417674 scopus 로고    scopus 로고
    • Solving the transitive access problem for the services oriented architecture
    • in:, ARES'10, February
    • A.H. Karp, J. Li, Solving the transitive access problem for the services oriented architecture, in: Proc. 2010 Int. Conf. on Availability, Reliability, and Security, ARES'10, February 2010, pp. 46-53.
    • (2010) Proc. 2010 Int. Conf. on Availability, Reliability, and Security , pp. 46-53
    • Karp, A.H.1    Li, J.2
  • 7
    • 77954005785 scopus 로고    scopus 로고
    • Cyber security management of access controls in digital ecosystems and distributed environments
    • in:, ICITA 2009, November
    • G.D. Skinner, Cyber security management of access controls in digital ecosystems and distributed environments, in: Proc. 6th Int. Conf. on Information Technology and Applications, ICITA 2009, November 2009, pp. 77-82.
    • (2009) Proc. 6th Int. Conf. on Information Technology and Applications , pp. 77-82
    • Skinner, G.D.1
  • 8
    • 34748851609 scopus 로고    scopus 로고
    • XPOLA-an extensible capability-based authorization infrastructure for grids
    • in:, April
    • L. Fang, D. Gannon, F. Siebenlist, XPOLA-an extensible capability-based authorization infrastructure for grids, in: 4th Annual PKI R&D Workshop, April 2005, pp. 30-40.
    • (2005) 4th Annual PKI R&D Workshop , pp. 30-40
    • Fang, L.1    Gannon, D.2    Siebenlist, F.3
  • 9
    • 85008532847 scopus 로고    scopus 로고
    • Suppose we got a do-over: a revolution for secure computing
    • Shrobe H., Adams D. Suppose we got a do-over: a revolution for secure computing. IEEE Security and Privacy 2012, 10(6):36-39. 10.1109/MSP.2012.84.
    • (2012) IEEE Security and Privacy , vol.10 , Issue.6 , pp. 36-39
    • Shrobe, H.1    Adams, D.2
  • 10
    • 0024089972 scopus 로고
    • The Confused Deputy: (or why capabilities might have been invented)
    • Hardy N. The Confused Deputy: (or why capabilities might have been invented). ACM SIGOPS Operating Systems Review 1988, 22(4):36-38.
    • (1988) ACM SIGOPS Operating Systems Review , vol.22 , Issue.4 , pp. 36-38
    • Hardy, N.1
  • 13
    • 84880644099 scopus 로고    scopus 로고
    • Information technology requirements for the implementation and interoperability of role based access control, in: ANSI/INCITS Standard 459-2011, January
    • Information technology requirements for the implementation and interoperability of role based access control, in: ANSI/INCITS Standard 459-2011, January 2011.
    • (2011)
  • 14
    • 30344473624 scopus 로고    scopus 로고
    • Federated identity management
    • Shim S.S.Y., Bhalla G., Pendyala V. Federated identity management. Computer 2005, 38(12):120-122. 10.1109/MC.2005.4.
    • (2005) Computer , vol.38 , Issue.12 , pp. 120-122
    • Shim, S.S.Y.1    Bhalla, G.2    Pendyala, V.3
  • 15
    • 84880642539 scopus 로고    scopus 로고
    • eXtensible access control markup language version 3.0, OASIS XACML v. 3.0, August
    • eXtensible access control markup language version 3.0, OASIS XACML v. 3.0, August 2010.
    • (2010)
  • 16
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Adams A., Sasse M.A. Users are not the enemy. Communications of the ACM 1999, 42(12):40-46. 10.1145/322796.322806.
    • (1999) Communications of the ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 20
    • 84880591994 scopus 로고
    • Programming Semantics for multiprogrammed computations, MIT, Tech. Report MIT/LCS/TR-23
    • J.B. Dennis, E.C. Van Horn, Programming Semantics for multiprogrammed computations, MIT, Tech. Report MIT/LCS/TR-23, 1965.
    • (1965)
    • Dennis, J.B.1    Van Horn, E.C.2
  • 21
    • 0003505824 scopus 로고
    • Digital Press, Bedford, Massachusetts, Available:
    • Levy H. Capability-Based Computer Systems 1984, Digital Press, Bedford, Massachusetts, Available: http://www.cs.washington.edu/homes/levy/capabook/.
    • (1984) Capability-Based Computer Systems
    • Levy, H.1
  • 23
    • 84880602222 scopus 로고    scopus 로고
    • SPKI Certificate Theory, IETF RFC 2693, September. Available:
    • SPKI Certificate Theory, IETF RFC 2693, September 1999. Available:. http://www.ietf.org/rfc/rfc2693.txt.
    • (1999)
  • 24
    • 84880630859 scopus 로고    scopus 로고
    • ITU-T recommendation X 509 information technology-open systems interconnection-The directory: public-key and attribute certificate frameworks (also know as ISO/IEC 9594-8), ITU-T Recommendation X.509, November
    • ITU-T recommendation X 509 information technology-open systems interconnection-The directory: public-key and attribute certificate frameworks (also know as ISO/IEC 9594-8), ITU-T Recommendation X.509, November 2008.
    • (2008)
  • 25
    • 84880599206 scopus 로고    scopus 로고
    • An Internet attribute certificate profile for authorization, IETF RFC 3281, April. Available:
    • An Internet attribute certificate profile for authorization, IETF RFC 3281, April 2002. Available:. http://www.ietf.org/rfc/rfc3281.txt.
    • (2002)
  • 26
    • 84867732734 scopus 로고    scopus 로고
    • Making the impossible easy: usable PKI
    • O'Reilly, (Chapter 16), L. Cranor, S. Garfinkel (Eds.)
    • Balfanz D., Durfee G.E., Smetters D.K. Making the impossible easy: usable PKI. Security and Usability 2005, O'Reilly, (Chapter 16). L. Cranor, S. Garfinkel (Eds.).
    • (2005) Security and Usability
    • Balfanz, D.1    Durfee, G.E.2    Smetters, D.K.3
  • 28
    • 34547890289 scopus 로고    scopus 로고
    • Capability-based egress network access control by using DNS server
    • (Special Issue on Information technology)
    • Suzukia S., Shinjoa Y., Hirotsub T., Itanoa K., Katoa K. Capability-based egress network access control by using DNS server. Journal of Network and Computer Applications 2007, 30(4):1275-1282. (Special Issue on Information technology). 10.1016/j.jnca.2006.09.009.
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.4 , pp. 1275-1282
    • Suzukia, S.1    Shinjoa, Y.2    Hirotsub, T.3    Itanoa, K.4    Katoa, K.5
  • 30
    • 84860557540 scopus 로고    scopus 로고
    • Springer-Verlag, Berlin, Heidelberg, D. Uckelman, M. Harrison, F. Michahelles (Eds.)
    • Architecting the Internet of Things 2011, Springer-Verlag, Berlin, Heidelberg. D. Uckelman, M. Harrison, F. Michahelles (Eds.).
    • (2011) Architecting the Internet of Things
  • 33
    • 77953350247 scopus 로고    scopus 로고
    • Adding attributes to role-based access control
    • Kuhn D.R., Coyne E.J., Weil T.R. Adding attributes to role-based access control. IEEE Computer 2010, 43(6).
    • (2010) IEEE Computer , vol.43 , Issue.6
    • Kuhn, D.R.1    Coyne, E.J.2    Weil, T.R.3
  • 35
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials
    • Springer-Verlag, Proc. Eurocrypt 2001
    • Camenisch J., Lysyanskaya A. An efficient system for non-transferable anonymous credentials. LNCS 2001, vol. 2045:93-118. Springer-Verlag.
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 36
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • Springer-Verlag, Proc. Security in Comm. Networks 2002
    • Camenisch J., Lysyanskaya A. A signature scheme with efficient protocols. LNCS 2002, vol. 2576:268-289. Springer-Verlag.
    • (2002) LNCS , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 37
    • 84880625432 scopus 로고    scopus 로고
    • W3C efficient XML interchange (EXI) format 1.0. W3C Recommendation, March
    • W3C efficient XML interchange (EXI) format 1.0. W3C Recommendation, March 2011. http://www.w3.org/TR/exi/.
    • (2011)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.