-
1
-
-
84876371536
-
IoT@Work automation middleware system design and architecture
-
in:, ETFA'12, September
-
S. Gusmeroli, S. Piccione, D. Rotondi, IoT@Work automation middleware system design and architecture, in: Presented at 17th IEEE International Conference on Emerging Technology and Factory Automation, ETFA'12, September 2012.
-
(2012)
Presented at 17th IEEE International Conference on Emerging Technology and Factory Automation
-
-
Gusmeroli, S.1
Piccione, S.2
Rotondi, D.3
-
2
-
-
84867696056
-
IoT access control issues: a capability based approach
-
in:, IMIS-2012, July
-
S. Gusmeroli, S. Piccione, D. Rotondi, IoT access control issues: a capability based approach, in: Proc. 6th Int. Conf. on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS-2012, July 2012, pp. 787-792. http://dx.doi.org/10.1109/IMIS.2012.38.
-
(2012)
Proc. 6th Int. Conf. on Innovative Mobile and Internet Services in Ubiquitous Computing
, pp. 787-792
-
-
Gusmeroli, S.1
Piccione, S.2
Rotondi, D.3
-
3
-
-
70449504689
-
Access control for the services oriented architecture
-
in:, SWS'07, November
-
J. Li, A.H. Karp, Access control for the services oriented architecture, in: ACM Workshop on Secure Web Services, SWS'07, November 2007.
-
(2007)
ACM Workshop on Secure Web Services
-
-
Li, J.1
Karp, A.H.2
-
4
-
-
34547474561
-
Authorization-based access control for the services oriented architecture
-
in:, C5, January
-
A.H. Karp, Authorization-based access control for the services oriented architecture, in: Proc. 4th Int. Conf. on Creating, Connecting, and Collaborating through Computing, C5, January 2006, pp. 160-167,. http://dx.doi.org/10.1109/C5.2006.9.
-
(2006)
Proc. 4th Int. Conf. on Creating, Connecting, and Collaborating through Computing
, pp. 160-167
-
-
Karp, A.H.1
-
5
-
-
84880620363
-
-
From ABAC to ZBAC: the evolution of access control models, HP laboratories, Tech. Report HPL-2009-30, February
-
A.H. Karp, H. Haury, M.H. Davis, From ABAC to ZBAC: the evolution of access control models, HP laboratories, Tech. Report HPL-2009-30, February 2009, pp. 9-17.
-
(2009)
, pp. 9-17
-
-
Karp, A.H.1
Haury, H.2
Davis, M.H.3
-
6
-
-
77952417674
-
Solving the transitive access problem for the services oriented architecture
-
in:, ARES'10, February
-
A.H. Karp, J. Li, Solving the transitive access problem for the services oriented architecture, in: Proc. 2010 Int. Conf. on Availability, Reliability, and Security, ARES'10, February 2010, pp. 46-53.
-
(2010)
Proc. 2010 Int. Conf. on Availability, Reliability, and Security
, pp. 46-53
-
-
Karp, A.H.1
Li, J.2
-
7
-
-
77954005785
-
Cyber security management of access controls in digital ecosystems and distributed environments
-
in:, ICITA 2009, November
-
G.D. Skinner, Cyber security management of access controls in digital ecosystems and distributed environments, in: Proc. 6th Int. Conf. on Information Technology and Applications, ICITA 2009, November 2009, pp. 77-82.
-
(2009)
Proc. 6th Int. Conf. on Information Technology and Applications
, pp. 77-82
-
-
Skinner, G.D.1
-
8
-
-
34748851609
-
XPOLA-an extensible capability-based authorization infrastructure for grids
-
in:, April
-
L. Fang, D. Gannon, F. Siebenlist, XPOLA-an extensible capability-based authorization infrastructure for grids, in: 4th Annual PKI R&D Workshop, April 2005, pp. 30-40.
-
(2005)
4th Annual PKI R&D Workshop
, pp. 30-40
-
-
Fang, L.1
Gannon, D.2
Siebenlist, F.3
-
9
-
-
85008532847
-
Suppose we got a do-over: a revolution for secure computing
-
Shrobe H., Adams D. Suppose we got a do-over: a revolution for secure computing. IEEE Security and Privacy 2012, 10(6):36-39. 10.1109/MSP.2012.84.
-
(2012)
IEEE Security and Privacy
, vol.10
, Issue.6
, pp. 36-39
-
-
Shrobe, H.1
Adams, D.2
-
10
-
-
0024089972
-
The Confused Deputy: (or why capabilities might have been invented)
-
Hardy N. The Confused Deputy: (or why capabilities might have been invented). ACM SIGOPS Operating Systems Review 1988, 22(4):36-38.
-
(1988)
ACM SIGOPS Operating Systems Review
, vol.22
, Issue.4
, pp. 36-38
-
-
Hardy, N.1
-
13
-
-
84880644099
-
-
Information technology requirements for the implementation and interoperability of role based access control, in: ANSI/INCITS Standard 459-2011, January
-
Information technology requirements for the implementation and interoperability of role based access control, in: ANSI/INCITS Standard 459-2011, January 2011.
-
(2011)
-
-
-
14
-
-
30344473624
-
Federated identity management
-
Shim S.S.Y., Bhalla G., Pendyala V. Federated identity management. Computer 2005, 38(12):120-122. 10.1109/MC.2005.4.
-
(2005)
Computer
, vol.38
, Issue.12
, pp. 120-122
-
-
Shim, S.S.Y.1
Bhalla, G.2
Pendyala, V.3
-
15
-
-
84880642539
-
-
eXtensible access control markup language version 3.0, OASIS XACML v. 3.0, August
-
eXtensible access control markup language version 3.0, OASIS XACML v. 3.0, August 2010.
-
(2010)
-
-
-
16
-
-
0043232732
-
Users are not the enemy
-
Adams A., Sasse M.A. Users are not the enemy. Communications of the ACM 1999, 42(12):40-46. 10.1145/322796.322806.
-
(1999)
Communications of the ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, M.A.2
-
17
-
-
70450231631
-
Usability meets access control: challenges and research opportunities
-
in:, SACMAT'09
-
K. Beznosov, P. Inglesant, J. Lobo, R. Reeder, M.E. Zurko, Usability meets access control: challenges and research opportunities, in: Proc. of the 14th ACM Symposium on Access control models and technologies, SACMAT'09, 2009, pp. 73-74. http://dx.doi.org/10.1145/1542207.1542220.
-
(2009)
Proc. of the 14th ACM Symposium on Access control models and technologies
, pp. 73-74
-
-
Beznosov, K.1
Inglesant, P.2
Lobo, J.3
Reeder, R.4
Zurko, M.E.5
-
18
-
-
77953980425
-
Access control for home data sharing: attitudes, needs and practices
-
in:, CHI 2010, April
-
M.L. Mazurek, J.P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. Faith Cranor, G.R. Ganger, Access control for home data sharing: attitudes, needs and practices, in: Proc. of the 28th Int. Conf. on Human Factors in Computing Systems, CHI 2010, April 2010, pp. 645-654. http://dx.doi.org/10.1145/1753326.1753421.
-
(2010)
Proc. of the 28th Int. Conf. on Human Factors in Computing Systems
, pp. 645-654
-
-
Mazurek, M.L.1
Arsenault, J.P.2
Bresee, J.3
Gupta, N.4
Ion, I.5
Johns, C.6
Lee, D.7
Liang, Y.8
Olsen, J.9
Salmon, B.10
Shay, R.11
Vaniea, K.12
Bauer, L.13
Faith Cranor, L.14
Ganger, G.R.15
-
19
-
-
47749138146
-
Usable access control inside home networks
-
in:, WoWMoM 2007, June
-
K. Kostiainen, O. Rantapuska, S. Moloney, V. Roto, U. Holmstrom, K. Karvonen, Usable access control inside home networks, in: IEEE Int. Symposium. on World of Wireless, Mobile and Multimedia Networks, WoWMoM 2007, June 2007, pp. 1-6. http://dx.doi.org/10.1109/WOWMOM.2007.4351809.
-
(2007)
IEEE Int. Symposium. on World of Wireless, Mobile and Multimedia Networks
, pp. 1-6
-
-
Kostiainen, K.1
Rantapuska, O.2
Moloney, S.3
Roto, V.4
Holmstrom, U.5
Karvonen, K.6
-
20
-
-
84880591994
-
-
Programming Semantics for multiprogrammed computations, MIT, Tech. Report MIT/LCS/TR-23
-
J.B. Dennis, E.C. Van Horn, Programming Semantics for multiprogrammed computations, MIT, Tech. Report MIT/LCS/TR-23, 1965.
-
(1965)
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
21
-
-
0003505824
-
-
Digital Press, Bedford, Massachusetts, Available:
-
Levy H. Capability-Based Computer Systems 1984, Digital Press, Bedford, Massachusetts, Available: http://www.cs.washington.edu/homes/levy/capabook/.
-
(1984)
Capability-Based Computer Systems
-
-
Levy, H.1
-
22
-
-
0022561959
-
Using sparse capabilities in a distributed operating system
-
in:, Available:
-
A.S. Tanenbaum, S.J. Mullender, R. van Renesse, Using sparse capabilities in a distributed operating system, in: Proc. 6th Int. Conf. on Distributed Computing Systems, 1986, pp. 558-563. Available:. ftp://ftp.cs.vu.nl/pub/papers/amoeba/dcs86.ps.Z.
-
(1986)
Proc. 6th Int. Conf. on Distributed Computing Systems
, pp. 558-563
-
-
Tanenbaum, A.S.1
Mullender, S.J.2
van Renesse, R.3
-
23
-
-
84880602222
-
-
SPKI Certificate Theory, IETF RFC 2693, September. Available:
-
SPKI Certificate Theory, IETF RFC 2693, September 1999. Available:. http://www.ietf.org/rfc/rfc2693.txt.
-
(1999)
-
-
-
24
-
-
84880630859
-
-
ITU-T recommendation X 509 information technology-open systems interconnection-The directory: public-key and attribute certificate frameworks (also know as ISO/IEC 9594-8), ITU-T Recommendation X.509, November
-
ITU-T recommendation X 509 information technology-open systems interconnection-The directory: public-key and attribute certificate frameworks (also know as ISO/IEC 9594-8), ITU-T Recommendation X.509, November 2008.
-
(2008)
-
-
-
25
-
-
84880599206
-
-
An Internet attribute certificate profile for authorization, IETF RFC 3281, April. Available:
-
An Internet attribute certificate profile for authorization, IETF RFC 3281, April 2002. Available:. http://www.ietf.org/rfc/rfc3281.txt.
-
(2002)
-
-
-
26
-
-
84867732734
-
Making the impossible easy: usable PKI
-
O'Reilly, (Chapter 16), L. Cranor, S. Garfinkel (Eds.)
-
Balfanz D., Durfee G.E., Smetters D.K. Making the impossible easy: usable PKI. Security and Usability 2005, O'Reilly, (Chapter 16). L. Cranor, S. Garfinkel (Eds.).
-
(2005)
Security and Usability
-
-
Balfanz, D.1
Durfee, G.E.2
Smetters, D.K.3
-
27
-
-
70349142100
-
Taming subsystems: capabilities as universal resource access control in L4
-
in:, IIES'09, April
-
A. Lackorzynski, A. Warg, Taming subsystems: capabilities as universal resource access control in L4, in: Proc. 2nd Workshop on Isolation and Integration in Embedded Systems, IIES'09, April 2009, pp. 18-23.
-
(2009)
Proc. 2nd Workshop on Isolation and Integration in Embedded Systems
, pp. 18-23
-
-
Lackorzynski, A.1
Warg, A.2
-
28
-
-
34547890289
-
Capability-based egress network access control by using DNS server
-
(Special Issue on Information technology)
-
Suzukia S., Shinjoa Y., Hirotsub T., Itanoa K., Katoa K. Capability-based egress network access control by using DNS server. Journal of Network and Computer Applications 2007, 30(4):1275-1282. (Special Issue on Information technology). 10.1016/j.jnca.2006.09.009.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.4
, pp. 1275-1282
-
-
Suzukia, S.1
Shinjoa, Y.2
Hirotsub, T.3
Itanoa, K.4
Katoa, K.5
-
29
-
-
47249111384
-
Capability based secure access control to networked storage devices
-
in:, MSST'07, September
-
M. Factor, D. Naor, E. Rom, J. Satran, S. Tal, Capability based secure access control to networked storage devices, in: Proc. of the 24th IEEE Conf. on Mass Storage Systems and Technologies, MSST'07, September 2007, pp. 114-128. http://dx.doi.org/10.1109/MSST.2007.6.
-
(2007)
Proc. of the 24th IEEE Conf. on Mass Storage Systems and Technologies
, pp. 114-128
-
-
Factor, M.1
Naor, D.2
Rom, E.3
Satran, J.4
Tal, S.5
-
30
-
-
84860557540
-
-
Springer-Verlag, Berlin, Heidelberg, D. Uckelman, M. Harrison, F. Michahelles (Eds.)
-
Architecting the Internet of Things 2011, Springer-Verlag, Berlin, Heidelberg. D. Uckelman, M. Harrison, F. Michahelles (Eds.).
-
(2011)
Architecting the Internet of Things
-
-
-
31
-
-
76249133938
-
Towards abundant DiY service creativity successfully leveraging the Internet-of-things in the city and at home
-
in:, ICIN 2009, September
-
L. Trappeniers, M. Roelands, M. Godon, J. Criel, P. Dobbelaere, Towards abundant DiY service creativity successfully leveraging the Internet-of-things in the city and at home, in: Presented at 13th Int. Conf. on Intelligence in Next Generation Networks, ICIN 2009, September 2009.
-
(2009)
Presented at 13th Int. Conf. on Intelligence in Next Generation Networks
-
-
Trappeniers, L.1
Roelands, M.2
Godon, M.3
Criel, J.4
Dobbelaere, P.5
-
33
-
-
77953350247
-
Adding attributes to role-based access control
-
Kuhn D.R., Coyne E.J., Weil T.R. Adding attributes to role-based access control. IEEE Computer 2010, 43(6).
-
(2010)
IEEE Computer
, vol.43
, Issue.6
-
-
Kuhn, D.R.1
Coyne, E.J.2
Weil, T.R.3
-
34
-
-
84954409133
-
Mixminion: design of a type III anonymous remailer protocol
-
in:, May
-
G. Danezis, R. Dingledine, N. Mathewson, Mixminion: design of a type III anonymous remailer protocol, in: Proc. of 2003 Symposium on Security and Privacy, May 2003, pp. 2-15. http://dx.doi.org/10.1109/SECPRI.2003.1199323.
-
(2003)
Proc. of 2003 Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
35
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials
-
Springer-Verlag, Proc. Eurocrypt 2001
-
Camenisch J., Lysyanskaya A. An efficient system for non-transferable anonymous credentials. LNCS 2001, vol. 2045:93-118. Springer-Verlag.
-
(2001)
LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
36
-
-
35248839965
-
A signature scheme with efficient protocols
-
Springer-Verlag, Proc. Security in Comm. Networks 2002
-
Camenisch J., Lysyanskaya A. A signature scheme with efficient protocols. LNCS 2002, vol. 2576:268-289. Springer-Verlag.
-
(2002)
LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
37
-
-
84880625432
-
-
W3C efficient XML interchange (EXI) format 1.0. W3C Recommendation, March
-
W3C efficient XML interchange (EXI) format 1.0. W3C Recommendation, March 2011. http://www.w3.org/TR/exi/.
-
(2011)
-
-
|