-
1
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito The internet of things: a survey Comput. Netw. 54 15 2010 2787 2805
-
(2010)
Comput. Netw.
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
2
-
-
84861997111
-
Survey internet of things: Vision, applications and research challenges
-
D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac Survey internet of things: vision, applications and research challenges Ad Hoc Netw. 10 7 2012 1497 1516
-
(2012)
Ad Hoc Netw.
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
3
-
-
84881312915
-
Standardized protocol stack for the internet of (important) things
-
M. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L. Grieco, G. Boggia, and M. Dohler Standardized protocol stack for the internet of (important) things IEEE Commun. Surv. Tutorials 15 3 2013 1389 1406
-
(2013)
IEEE Commun. Surv. Tutorials
, vol.15
, Issue.3
, pp. 1389-1406
-
-
Palattella, M.1
Accettura, N.2
Vilajosana, X.3
Watteyne, T.4
Grieco, L.5
Boggia, G.6
Dohler, M.7
-
4
-
-
79960590167
-
M2M: The internet of 50 billion devices
-
B. Emmerson M2M: the internet of 50 billion devices Huawei Win-Win Mag. J. 4 2010 19 22
-
(2010)
Huawei Win-Win Mag. J.
, Issue.4
, pp. 19-22
-
-
Emmerson, B.1
-
5
-
-
84891569276
-
-
D. Boswarthick, O. Elloumi, and O. Hersent M2M Communications: A Systems Approach first ed. 2012 Wiley Publishing
-
-
-
-
6
-
-
84891583935
-
-
O. Hersent, D. Boswarthick, and O. Elloumi The Internet of Things: Key Applications and Protocols second ed. 2012 Wiley Publishing
-
-
-
-
7
-
-
84901294182
-
-
L.A. Grieco, M.B. Alaya, T. Monteil, K.K. Drira, Architecting information centric ETSI-M2M systems, in: IEEE PerCom, 2014.
-
-
-
-
8
-
-
74949143896
-
Internet of things - New security and privacy challenges
-
R.H. Weber Internet of things - new security and privacy challenges Comput. Law Secur. Rev. 26 1 2010 23 30
-
(2010)
Comput. Law Secur. Rev.
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
-
10
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
R. Roman, J. Zhou, and J. Lopez On the features and challenges of security and privacy in distributed internet of things Comput. Networks 57 10 2013 2266 2279
-
(2013)
Comput. Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
11
-
-
85033691168
-
-
J. Anderson, L. Rainie, The Internet of Things will Thrive by 2025, PewResearch Internet Project, May 2014. < http://www.pewinternet.org/2014/05/14/internet-of-things/ >.
-
-
-
-
12
-
-
79960321206
-
A survey of middleware for internet of things
-
WiMo 2011 and CoNeCo 2011, Ankara, Turkey
-
S. Bandyopadhyay, M. Sengupta, S. Maiti, S. Dutta, A survey of middleware for internet of things, in: Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey, 2011, pp. 288-296.
-
(2011)
Third International Conferences
, pp. 288-296
-
-
Bandyopadhyay, S.1
Sengupta, M.2
Maiti, S.3
Dutta, S.4
-
13
-
-
84866914974
-
Challenges in middleware solutions for the internet of things
-
Denver, CO
-
M.A. Chaqfeh, N. Mohamed, Challenges in middleware solutions for the internet of things, in: 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, 2012, pp. 21-26.
-
(2012)
2012 International Conference on Collaboration Technologies and Systems (CTS)
, pp. 21-26
-
-
Chaqfeh, M.A.1
Mohamed, N.2
-
14
-
-
79960904737
-
Proposed embedded security framework for internet of things (iot)
-
Wireless VITAE 2011, Chennai, India
-
S. Babar, A. Stango, N. Prasad, J. Sen, R. Prasad, Proposed embedded security framework for internet of things (iot), in: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, Chennai, India, 2011, pp. 1 - 5.
-
(2011)
2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology
, pp. 1-5
-
-
Babar, S.1
Stango, A.2
Prasad, N.3
Sen, J.4
Prasad, R.5
-
15
-
-
84867536674
-
An overview of the internet of underwater things
-
M.C. Domingo An overview of the internet of underwater things J. Network Comput. Appl. 35 6 2012 1879 1890
-
(2012)
J. Network Comput. Appl.
, vol.35
, Issue.6
, pp. 1879-1890
-
-
Domingo, M.C.1
-
16
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami Internet of Things (IoT): a vision, architectural elements, and future directions Future Gener. Comput. Syst. 29 7 2013 1645 1660
-
(2013)
Future Gener. Comput. Syst.
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
18
-
-
84887491747
-
Research on data security technology in internet of things
-
ICMCE 2013, Dalian, China
-
Y. Zhao, Research on data security technology in internet of things, in: 2013 2nd International Conference on Mechatronics and Control Engineering, ICMCE 2013, Dalian, China, 2013, pp. 1752-1755.
-
(2013)
2013 2nd International Conference on Mechatronics and Control Engineering
, pp. 1752-1755
-
-
Zhao, Y.1
-
19
-
-
84885304488
-
Dtls based security and two-way authentication for the internet of things
-
T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle Dtls based security and two-way authentication for the internet of things Ad Hoc Netw. 11 8 2013 2710 2723
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.8
, pp. 2710-2723
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brunig, M.4
Carle, G.5
-
20
-
-
79955712919
-
Key management systems for sensor networks in the context of the internet of things
-
R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos Key management systems for sensor networks in the context of the internet of things Comput. Electrical Eng. 37 2 2011 147 159
-
(2011)
Comput. Electrical Eng.
, vol.37
, Issue.2
, pp. 147-159
-
-
Roman, R.1
Alcaraz, C.2
Lopez, J.3
Sklavos, N.4
-
21
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. Han, P. Varshney, J. Katz, and A. Khalili A pairwise key predistribution scheme for wireless sensor networks ACM Trans. Inf. Syst. Secur. (TISSEC) 8 2 2005 228 258
-
(2005)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
Katz, J.5
Khalili, A.6
-
22
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington, DC, USA
-
D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: CCS '03 Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, 2003, pp. 52-61.
-
(2003)
CCS '03 Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
23
-
-
84883542494
-
Securing and governing access in ad-hoc networks of internet of things
-
EAS 2012, Colombo, Sri Lanka
-
H. Pranata, R. Athauda, G. Skinner, Securing and governing access in ad-hoc networks of internet of things, in: Proceedings of the IASTED International Conference on Engineering and Applied Science, EAS 2012, Colombo, Sri Lanka, 2012, pp. 84-90.
-
(2012)
Proceedings of the IASTED International Conference on Engineering and Applied Science
, pp. 84-90
-
-
Pranata, H.1
Athauda, R.2
Skinner, G.3
-
24
-
-
84875786680
-
A security framework for the internet of things based on public key infrastructure
-
H. Ning A security framework for the internet of things based on public key infrastructure Adv. Mater. Res. 671-674 2013 3223 3226
-
(2013)
Adv. Mater. Res.
, vol.671-674
, pp. 3223-3226
-
-
Ning, H.1
-
26
-
-
84900458661
-
A standard compliant security framework for ieee 802.15.4 networks
-
Seoul, South Korea
-
G. Piro, G. Boggia, L.A. Grieco, A standard compliant security framework for ieee 802.15.4 networks, in: Proc. of IEEE World Forum on Internet of Things (WF-IoT), Seoul, South Korea, 2014, pp. 27-30.
-
(2014)
Proc. of IEEE World Forum on Internet of Things (WF-IoT)
, pp. 27-30
-
-
Piro, G.1
Boggia, G.2
Grieco, L.A.3
-
27
-
-
0036688074
-
A survey on sensor networks
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci A survey on sensor networks IEEE Commun. Mag. 40 8 2002 102 114
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
28
-
-
0142103313
-
Security and privacy in sensor networks
-
H. Chan, and A. Perrig Security and privacy in sensor networks IEEE Commun. Mag. 36 10 2003 103 105
-
(2003)
IEEE Commun. Mag.
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
29
-
-
46449122114
-
Wireless sensor network survey
-
J. Yick, B. Mukherjee, and D. Ghosal Wireless sensor network survey Comput. Netw. 52 12 2008 2292 2330
-
(2008)
Comput. Netw.
, vol.52
, Issue.12
, pp. 2292-2330
-
-
Yick, J.1
Mukherjee, B.2
Ghosal, D.3
-
30
-
-
67650461985
-
Privacy preservation in wireless sensor networks: A state-of-the-art survey
-
N. Li, N. Zhang, S.K. Das, and B. Thuraisingham Privacy preservation in wireless sensor networks: a state-of-the-art survey Ad Hoc Netw. 7 8 2009 1501 1514
-
(2009)
Ad Hoc Netw.
, vol.7
, Issue.8
, pp. 1501-1514
-
-
Li, N.1
Zhang, N.2
Das, S.K.3
Thuraisingham, B.4
-
32
-
-
84904633651
-
Security frameworks for wireless sensor networks-review
-
G.Sharmam, S. Bala, A.K. Verma, Security frameworks for wireless sensor networks-review, in: 2nd International Conference on Communication, Computing & Security, ICCCS-2012, 2012, pp. 978-987.
-
(2012)
2nd International Conference on Communication, Computing & Security, ICCCS-2012
, pp. 978-987
-
-
Sharmam, G.1
Bala, S.2
Verma, A.K.3
-
33
-
-
84903851734
-
A lightweight authentication protocol for internet of things
-
ISNE 2014, Kwei-Shan
-
J.-Y. Lee, W.-C. Lin, Y.-H. Huang, A lightweight authentication protocol for internet of things, in: 2014 International Symposium on Next-Generation Electronics, ISNE 2014, Kwei-Shan, 2014, pp. 1-2.
-
(2014)
2014 International Symposium on Next-Generation Electronics
, pp. 1-2
-
-
Lee, J.-Y.1
Lin, W.-C.2
Huang, Y.-H.3
-
34
-
-
84901188390
-
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion
-
M. Turkanovi, B. Brumen, and M. Hlbl A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion Ad Hoc Netw. 20 2014 96 112
-
(2014)
Ad Hoc Netw.
, vol.20
, pp. 96-112
-
-
Turkanovi, M.1
Brumen, B.2
Hlbl, M.3
-
35
-
-
84894059526
-
An efficient authentication and access control scheme for perception layer of internet of things
-
N. Ye, Y. Zhu, R.-C. b. Wang, R. Malekian, and Q.-M. Lin An efficient authentication and access control scheme for perception layer of internet of things Appl. Math. Inf. Sci. 8 4 2014 1617 1624
-
(2014)
Appl. Math. Inf. Sci.
, vol.8
, Issue.4
, pp. 1617-1624
-
-
Ye, N.1
Zhu, Y.2
Wang, R.-C.B.3
Malekian, R.4
Lin, Q.-M.5
-
36
-
-
84879815746
-
Anonymous authentication for privacy-preserving iot target-driven applications
-
A. Alcaide, E. Palomar, J. Montero-Castillo, and A. Ribagorda Anonymous authentication for privacy-preserving iot target-driven applications Comput. Secur. 37 2013 111 123
-
(2013)
Comput. Secur.
, vol.37
, pp. 111-123
-
-
Alcaide, A.1
Palomar, E.2
Montero-Castillo, J.3
Ribagorda, A.4
-
37
-
-
84880012269
-
A hierarchical access control scheme for perceptual layer of iot
-
J. Ma, Y. Guo, J. Ma, J. Xiong, and T. Zhang A hierarchical access control scheme for perceptual layer of iot Jisuanji Yanjiu yu Fazhan/Comput. Res. Dev. 50 6 2013 1267 1275
-
(2013)
Jisuanji Yanjiu Yu Fazhan/Comput. Res. Dev.
, vol.50
, Issue.6
, pp. 1267-1275
-
-
Ma, J.1
Guo, Y.2
Ma, J.3
Xiong, J.4
Zhang, T.5
-
38
-
-
84863233964
-
An identity-based personal location system with protected privacy in IoT
-
IC-BNMT 2011, Shenzhen, China
-
C. Hu, J. Zhang, Q. Wen, An identity-based personal location system with protected privacy in IoT, in: Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011, Shenzhen, China, 2011, pp. 192-195.
-
(2011)
Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology
, pp. 192-195
-
-
Hu, C.1
Zhang, J.2
Wen, Q.3
-
39
-
-
85033713974
-
-
M. Ali, M. ElTabakh, C. Nita-Rotaru, FT-RC4: A Robust Security Mechanism for Data Stream Systems, Tech. Rep. TR-05-024, Purdue University (November 2005).
-
-
-
-
40
-
-
85012119096
-
Scheduling for shared window joins over data streams
-
VLDB '03, Berlin, Germany
-
M.A. Hammad, M.J. Franklin, W. Aref, A.K. Elmagarmid, Scheduling for shared window joins over data streams, in: Proceedings of the 29th International Conference on Very Large Data Bases, VLDB '03, Berlin, Germany, 2003, pp. 297-308.
-
(2003)
Proceedings of the 29th International Conference on Very Large Data Bases
, pp. 297-308
-
-
Hammad, M.A.1
Franklin, M.J.2
Aref, W.3
Elmagarmid, A.K.4
-
41
-
-
85011016388
-
Cads: Continuous authentication on data streams
-
VLDB '07, Vienna, Austria
-
S. Papadopoulos, Y. Yang, D. Papadias, Cads: continuous authentication on data streams, in: Proceedings of the 33rd International Conference on Very Large Data Bases, VLDB '07, Vienna, Austria, 2007, pp. 135-146.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 135-146
-
-
Papadopoulos, S.1
Yang, Y.2
Papadias, D.3
-
42
-
-
77951939042
-
Continuous authentication on relational data streams
-
S. Papadopoulos, Y. Yang, and D. Papadias Continuous authentication on relational data streams VLDB J. 19 1 2010 161 180
-
(2010)
VLDB J.
, vol.19
, Issue.1
, pp. 161-180
-
-
Papadopoulos, S.1
Yang, Y.2
Papadias, D.3
-
43
-
-
84925873403
-
Lightweight authentication of linear algebraic queries on data streams
-
SIGMOD'13, New York, USA
-
S. Papadopoulos, G. Cormode, A. Deligiannakis, M. Garofalakis, Lightweight authentication of linear algebraic queries on data streams, in: Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, SIGMOD'13, New York, USA, 2013, pp. 881-892.
-
(2013)
Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data
, pp. 881-892
-
-
Papadopoulos, S.1
Cormode, G.2
Deligiannakis, A.3
Garofalakis, M.4
-
44
-
-
34548019652
-
User interactive internet of things privacy preserved access control
-
IDEAS'06, Delhi, 2006
-
W. Lindner, J. Meier, User interactive internet of things privacy preserved access control, in: 10th International Database Engineering and Applications Symposium, 2006, IDEAS'06, Delhi, 2006, pp. 137-147.
-
(2006)
10th International Database Engineering and Applications Symposium
, pp. 137-147
-
-
Lindner, W.1
Meier, J.2
-
45
-
-
34547285007
-
The design of the borealis stream processing engine
-
D.J. Abadi, Y. Ahmad, M. Balazinska, M. Cherniack, J. Hwang, W. Lindner, A.S. Maskey, E. Rasin, E. Ryvkina, N. Tatbul, Y. Xing, S. Zdonik, The design of the borealis stream processing engine, in: CIDR, 2005, pp. 277-289.
-
(2005)
CIDR
, pp. 277-289
-
-
Abadi, D.J.1
Ahmad, Y.2
Balazinska, M.3
Cherniack, M.4
Hwang, J.5
Lindner, W.6
Maskey, A.S.7
Rasin, E.8
Ryvkina, E.9
Tatbul, N.10
Xing, Y.11
Zdonik, S.12
-
46
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman Role-based access control models Computer 29 2 1996 38 47
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
47
-
-
52649140439
-
A security punctuation framework for enforcing access control on streaming data
-
ICDE '08, Cancun, Mexico
-
R. Nehme, E. Rundesteiner, E. Bertino, A security punctuation framework for enforcing access control on streaming data, in: Proceedings of the 24th International Conference on Data Engineering, ICDE '08, Cancun, Mexico, 2008, pp. 406-415.
-
(2008)
Proceedings of the 24th International Conference on Data Engineering
, pp. 406-415
-
-
Nehme, R.1
Rundesteiner, E.2
Bertino, E.3
-
49
-
-
3142686881
-
Dynamic plan migration for continuous queries over data streams
-
Paris, France
-
Y. Zhu, E.A. Rundensteiner, G.T. Heineman, Dynamic plan migration for continuous queries over data streams, in: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD '04, Paris, France, 2004, pp. 431-442.
-
(2004)
Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD '04
, pp. 431-442
-
-
Zhu, Y.1
Rundensteiner, E.A.2
Heineman, G.T.3
-
50
-
-
34548021908
-
Enforcing access control over data streams
-
Sophia Antipolis, France
-
B. Carminati, E. Ferrari, K.L. Tan, Enforcing access control over data streams, in: Proceedings of the 12th ACM symposium on Access control models and technologies, SACMAT '07, Sophia Antipolis, France, 2007, pp. 21-30.
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, SACMAT '07
, pp. 21-30
-
-
Carminati, B.1
Ferrari, E.2
Tan, K.L.3
-
51
-
-
38049121353
-
Specifying access control policies on data streams
-
Bangkok, Thailand
-
B. Carminati, E. Ferrari, K.L. Tan, Specifying access control policies on data streams, in: Proceedings of the Database System for Advanced Applications Conference, DASFAA 2007, Bangkok, Thailand, 2007, pp. 410-421.
-
(2007)
Proceedings of the Database System for Advanced Applications Conference, DASFAA 2007
, pp. 410-421
-
-
Carminati, B.1
Ferrari, E.2
Tan, K.L.3
-
52
-
-
0042014316
-
Aurora: A new model and architecture for data stream management
-
D.J. Abadi, D. Carney, U. Cetintemel, M. Cherniack, C. Convey, S. Lee, M. Stonebraker, N. Tatbul, and S. Zdonik Aurora: a new model and architecture for data stream management VLDB J. 12 2 2003 120 139
-
(2003)
VLDB J.
, vol.12
, Issue.2
, pp. 120-139
-
-
Abadi, D.J.1
Carney, D.2
Cetintemel, U.3
Cherniack, M.4
Convey, C.5
Lee, S.6
Stonebraker, M.7
Tatbul, N.8
Zdonik, S.9
-
54
-
-
84880621938
-
A capability-based security approach to manage access control in the internet of things
-
S. Gusmeroli, S. Piccionea, and D. Rotondi A capability-based security approach to manage access control in the internet of things Math. Comput. Model. 58 5-6 2013 1189 1205
-
(2013)
Math. Comput. Model.
, vol.58
, Issue.56
, pp. 1189-1205
-
-
Gusmeroli, S.1
Piccionea, S.2
Rotondi, D.3
-
55
-
-
85033720227
-
-
European FP7 IoT@Work project. < http://iot-at-work.eu >.
-
-
-
-
56
-
-
77957581415
-
Identity management framework towards internet of things (IoT): Roadmap and key challenges
-
P. Mahalle, S. Babar, N. Prasad, and R. Prasad Identity management framework towards internet of things (IoT): Roadmap and key challenges Commun. Comput. Inf. Sci. 89 2010 430 439
-
(2010)
Commun. Comput. Inf. Sci.
, vol.89
, pp. 430-439
-
-
Mahalle, P.1
Babar, S.2
Prasad, N.3
Prasad, R.4
-
57
-
-
84905671677
-
New paradigms for access control in constrained environments
-
Montpellier
-
A. Cherkaoui, L. Bossuet, L. Seitz, G. Selander, R. Borgaonkar, New paradigms for access control in constrained environments, in: 2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC), Montpellier, 2014, pp. 1-4.
-
(2014)
2014 9th International Symposium on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)
, pp. 1-4
-
-
Cherkaoui, A.1
Bossuet, L.2
Seitz, L.3
Selander, G.4
Borgaonkar, R.5
-
58
-
-
84885311585
-
A novel batch-based group key management protocol applied to the internet of things
-
L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari A novel batch-based group key management protocol applied to the internet of things Ad Hoc Netw. 11 8 2013 2724 2737
-
(2013)
Ad Hoc Netw.
, vol.11
, Issue.8
, pp. 2724-2737
-
-
Veltri, L.1
Cirani, S.2
Busanelli, S.3
Ferrari, G.4
-
59
-
-
84917690758
-
A NFP model for internet of things applications
-
Larnaca, Cyprus
-
S. Sicari, A. Rizzardi, C. Cappiello, A. Coen-Porisini, A NFP model for internet of things applications, in: Proc. of IEEE WiMob, Larnaca, Cyprus, 2014, pp. 164-171.
-
(2014)
Proc. of IEEE WiMob
, pp. 164-171
-
-
Sicari, S.1
Rizzardi, A.2
Cappiello, C.3
Coen-Porisini, A.4
-
60
-
-
84875484343
-
Efficient data tagging for managing privacy in the internet of things
-
CPSCom 2012, Besancon, France
-
D. Evans, D. Eyers, Efficient data tagging for managing privacy in the internet of things, in: Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, iThings 2012 and Conf. on Cyber, Physical and Social Computing, CPSCom 2012, Besancon, France, 2012, pp. 244-248.
-
(2012)
Proceedings - 2012 IEEE Int. Conf. on Green Computing and Communications, GreenCom 2012, Conf. on Internet of Things, IThings 2012 and Conf. on Cyber, Physical and Social Computing
, pp. 244-248
-
-
Evans, D.1
Eyers, D.2
-
61
-
-
84876172823
-
User interactive internet of things privacy preserved access control
-
ICITST 2012, London, United Kingdom
-
X. Huang, R. Fu, B. Chen, T. Zhang, A. Roscoe, User interactive internet of things privacy preserved access control, in: 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, 2012, pp. 597-602.
-
(2012)
7th International Conference for Internet Technology and Secured Transactions
, pp. 597-602
-
-
Huang, X.1
Fu, R.2
Chen, B.3
Zhang, T.4
Roscoe, A.5
-
62
-
-
79952842019
-
CASTLE: Continuously anonymizing data streams
-
J. Cao, B. Carminati, E. Ferrari, and K.L. Tan CASTLE: continuously anonymizing data streams IEEE Trans. Dependable Secure Comput. 8 3 2011 337 352
-
(2011)
IEEE Trans. Dependable Secure Comput.
, vol.8
, Issue.3
, pp. 337-352
-
-
Cao, J.1
Carminati, B.2
Ferrari, E.3
Tan, K.L.4
-
63
-
-
84860302129
-
Security model and key technologies for the internet of things
-
J. Yang, and B. Fang Security model and key technologies for the internet of things J. China Universities Posts Telecommun. 8 2 2011 109 112
-
(2011)
J. China Universities Posts Telecommun.
, vol.8
, Issue.2
, pp. 109-112
-
-
Yang, J.1
Fang, B.2
-
64
-
-
84864960877
-
A privacy enhanced dns scheme for the internet of things
-
Beijing, China
-
Y. Wang, Q. Wen, A privacy enhanced dns scheme for the internet of things, in: IET International Conference on Communication Technology and Application, ICCTA 2011, Beijing, China, 2011, pp. 699-702.
-
(2011)
IET International Conference on Communication Technology and Application, ICCTA 2011
, pp. 699-702
-
-
Wang, Y.1
Wen, Q.2
-
65
-
-
84906994292
-
Performance evaluation of attribute-based encryption: Toward data privacy in the IoT
-
ICC 2014, Sydney, NSW
-
X. Wang, J. Zhang, E. Schooler, M. Ion, Performance evaluation of attribute-based encryption: Toward data privacy in the IoT, in: 2014 IEEE International Conference on Communications, ICC 2014, Sydney, NSW, 2014, pp. 725-730.
-
(2014)
2014 IEEE International Conference on Communications
, pp. 725-730
-
-
Wang, X.1
Zhang, J.2
Schooler, E.3
Ion, M.4
-
66
-
-
84892977444
-
EPASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things
-
J. Su, D. Cao, B. Zhao, X. Wang, and I. You ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the internet of things Future Gener. Comput. Syst. 33 0 2014 11 18
-
(2014)
Future Gener. Comput. Syst.
, vol.33
, pp. 11-18
-
-
Su, J.1
Cao, D.2
Zhao, B.3
Wang, X.4
You, I.5
-
67
-
-
84904685807
-
Privacy protection based on key-changed mutual authentication protocol in internet of things
-
L.b. Peng, W.b. Ru-chuan, S. Xiao-yu, and C. Long Privacy protection based on key-changed mutual authentication protocol in internet of things Commun. Comput. Inf. Sci. 418 CCIS 2014 345 355
-
(2014)
Commun. Comput. Inf. Sci.
, vol.418 CCIS
, pp. 345-355
-
-
Peng, L.B.1
Ru-Chuan, W.B.2
Xiao-Yu, S.3
Long, C.4
-
68
-
-
84904480169
-
Iot-privacy: To be private or not to be private
-
Toronto, ON
-
A. Ukil, S. Bandyopadhyay, A. Pal, Iot-privacy: To be private or not to be private, in: Proceedings - IEEE INFOCOM, Toronto, ON, 2014, pp. 123-124.
-
(2014)
Proceedings - IEEE INFOCOM
, pp. 123-124
-
-
Ukil, A.1
Bandyopadhyay, S.2
Pal, A.3
-
69
-
-
84908425489
-
A security-and quality-aware system architecture for internet of things
-
S. Sicari, C. Cappiello, F.D. Pellegrini, D. Miorandi, and A. Coen-Porisini A security-and quality-aware system architecture for internet of things Inf. Syst. Frontiers 2014 1 13
-
(2014)
Inf. Syst. Frontiers
, pp. 1-13
-
-
Sicari, S.1
Cappiello, C.2
Pellegrini, F.D.3
Miorandi, D.4
Coen-Porisini, A.5
-
70
-
-
84867693994
-
Dynamic trust management for internet of things applications
-
Self-IoT '12, USA, San Jose
-
F. Bao, I. Chen, Dynamic trust management for internet of things applications, in: Proceedings of the 2012 International Workshop on Self-Aware Internet of Things, Self-IoT '12, USA, San Jose, 2012, pp. 1-6.
-
(2012)
Proceedings of the 2012 International Workshop on Self-Aware Internet of Things
, pp. 1-6
-
-
Bao, F.1
Chen, I.2
-
71
-
-
84866382206
-
Trust management for the internet of things and its application to service composition
-
WoWMoM 2012, San Francisco, CA, United States
-
F. Bao, I. Chen, Trust management for the internet of things and its application to service composition, in: 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, United States, 2012, pp. 1-6.
-
(2012)
13th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks
, pp. 1-6
-
-
Bao, F.1
Chen, I.2
-
72
-
-
84871995068
-
A subjective model for trustworthiness evaluation in the social internet of things
-
PIMRC, Australia, Sydney
-
M. Nitti, R. Girau, L. Atzori, A. Iera, G. Morabito, A subjective model for trustworthiness evaluation in the social internet of things, in: 2012 IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications, PIMRC, Australia, Sydney, 2012, pp. 18-23.
-
(2012)
2012 IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications
, pp. 18-23
-
-
Nitti, M.1
Girau, R.2
Atzori, L.3
Iera, A.4
Morabito, G.5
-
73
-
-
84880467894
-
The eigen-trust algorithm for reputation management in p2p networks
-
New York, USA
-
S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigen-trust algorithm for reputation management in p2p networks, in: Proc. WWW'03, New York, USA, 2003, pp. 640-651.
-
(2003)
Proc. WWW'03
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
74
-
-
3142738238
-
Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
L. Xiong, and L. Liu Peertrust: supporting reputation-based trust for peer-to-peer electronic communities IEEE Trans. Knowl. Data Eng. 16 2004 843 857
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
75
-
-
4544372572
-
A reputation-based trust management system for p2p networks
-
Washington, DC, USA
-
A.A. Selcuk, E. Uzun, M.R. Pariente, A reputation-based trust management system for p2p networks, in: Proc. of CCGRID 2004, Washington, DC, USA, 2004, pp. 251-258.
-
(2004)
Proc. of CCGRID 2004
, pp. 251-258
-
-
Selcuk, A.A.1
Uzun, E.2
Pariente, M.R.3
-
76
-
-
17644415405
-
Developing trust in large-scale peer-to-peer systems
-
B. Yu, M.P. Singh, K. Sycara, Developing trust in large-scale peer-to-peer systems, in: Proc. of First IEEE Symposium on Multi-Agent Security and Survivability, 2004, pp. 1-10.
-
(2004)
Proc. of First IEEE Symposium on Multi-Agent Security and Survivability
, pp. 1-10
-
-
Yu, B.1
Singh, M.P.2
Sycara, K.3
-
77
-
-
29844451556
-
Enforcing cooperative resource sharing in untrusted p2p computing environments
-
Z. Liang, and W. Shi Enforcing cooperative resource sharing in untrusted p2p computing environments Mob. Netw. Appl. 10 2005 251 258
-
(2005)
Mob. Netw. Appl.
, vol.10
, pp. 251-258
-
-
Liang, Z.1
Shi, W.2
-
78
-
-
84872848897
-
Internet of things: Where to be is to trust
-
R. Lacuesta, G. Palacios-Navarro, C. Cetina, L. Penalver, and J. Lloret Internet of things: where to be is to trust EURASIP J. Wireless Commun. Networking 2012 1 2012 1 16
-
(2012)
EURASIP J. Wireless Commun. Networking
, vol.2012
, Issue.1
, pp. 1-16
-
-
Lacuesta, R.1
Palacios-Navarro, G.2
Cetina, C.3
Penalver, L.4
Lloret, J.5
-
79
-
-
84887630808
-
A fuzzy approach to trust based access control in internet of things
-
VITAE, NJ, Atlantic City
-
P.N. Mahalle, P.A. Thakre, N.R. Prasad, R. Prasad, A fuzzy approach to trust based access control in internet of things, in: 2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems, VITAE, NJ, Atlantic City, 2013, pp. 1-5.
-
(2013)
2013 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems
, pp. 1-5
-
-
Mahalle, P.N.1
Thakre, P.A.2
Prasad, N.R.3
Prasad, R.4
-
80
-
-
84883144500
-
Distributed trust management mechanism for the internet of things
-
J. Wang, S. Bin, Y. Yu, and X. Niu Distributed trust management mechanism for the internet of things Appl. Mech. Mater. 347-350 4 2013 2463 2467
-
(2013)
Appl. Mech. Mater.
, vol.347-350
, Issue.4
, pp. 2463-2467
-
-
Wang, J.1
Bin, S.2
Yu, Y.3
Niu, X.4
-
81
-
-
84865649356
-
An integrated scheme based on service classification in pervasive mobile services
-
Y. Liu, Z. Chen, F. Xia, X. Lv, and F. Bu An integrated scheme based on service classification in pervasive mobile services Int. J. Commun. Syst. 25 9 2012 1178 1188
-
(2012)
Int. J. Commun. Syst.
, vol.25
, Issue.9
, pp. 1178-1188
-
-
Liu, Y.1
Chen, Z.2
Xia, F.3
Lv, X.4
Bu, F.5
-
82
-
-
79953074982
-
A trust model based on service classification in mobile services
-
CPSCom 2010, Hangzhou, China
-
Y. Liu, Z. Chen, F. Xia, X. Lv, F. Bu, A trust model based on service classification in mobile services, in: Proceedings - 2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010, Hangzhou, China, 2010, pp. 572-576.
-
(2010)
Proceedings - 2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing
, pp. 572-576
-
-
Liu, Y.1
Chen, Z.2
Xia, F.3
Lv, X.4
Bu, F.5
-
84
-
-
84888861197
-
Trust management system design for the internet of things: A context-aware and multi-service approach
-
Y. Saied, A. Olivereau, D. Zeghlache, and M. Laurent Trust management system design for the internet of things: a context-aware and multi-service approach Comput. Secur. 39 2013 351 365
-
(2013)
Comput. Secur.
, vol.39
, pp. 351-365
-
-
Saied, Y.1
Olivereau, A.2
Zeghlache, D.3
Laurent, M.4
-
85
-
-
84866163989
-
Attack-resistant trust management model based on beta function for distributed routing in internet of things
-
P. Dong, J. Guan, X. Xue, and H. Wang Attack-resistant trust management model based on beta function for distributed routing in internet of things China Commun. 9 4 2012 89 98
-
(2012)
China Commun.
, vol.9
, Issue.4
, pp. 89-98
-
-
Dong, P.1
Guan, J.2
Xue, X.3
Wang, H.4
-
86
-
-
84887005524
-
A wsn-oriented key agreement protocol in internet of things
-
ICFMM 2013, LiJiang, China
-
T. Liu, Y. Guan, Y. Yan, L. Liu, Q. Deng, A wsn-oriented key agreement protocol in internet of things, in: 3rd International Conference on Frontiers of Manufacturing Science and Measuring Technology, ICFMM 2013, LiJiang, China, 2012, pp. 1792-1795.
-
(2012)
3rd International Conference on Frontiers of Manufacturing Science and Measuring Technology
, pp. 1792-1795
-
-
Liu, T.1
Guan, Y.2
Yan, Y.3
Liu, L.4
Deng, Q.5
-
87
-
-
84879230262
-
Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the future internet
-
P. Martinez-Julia, and A.F. Skarmeta Beyond the separation of identifier and locator: building an identity-based overlay network architecture for the future internet Comput. Netw. 57 10 2013 2280 2300
-
(2013)
Comput. Netw.
, vol.57
, Issue.10
, pp. 2280-2300
-
-
Martinez-Julia, P.1
Skarmeta, A.F.2
-
88
-
-
85033709378
-
-
G.D. Tormo, F.G. Marmol, G.M. Perez, Dynamic and flexible selection of a reputation mechanism for heterogeneous environments, Future Gener. Comput. Syst. (2014).
-
-
-
-
89
-
-
84902106352
-
Trust management mechanism for internet of things
-
L. Gu, J. Wang, and B.b. Sun Trust management mechanism for internet of things China Commun. 11 2 2014 148 156
-
(2014)
China Commun.
, vol.11
, Issue.2
, pp. 148-156
-
-
Gu, L.1
Wang, J.2
Sun, B.B.3
-
90
-
-
84902819686
-
Trust system based on node behavior detection in internet of things
-
Y.-B. Liu, X.-H. Gong, and Y.-F. Feng Trust system based on node behavior detection in internet of things Tongxin Xuebao/J. Commun. 35 5 2014 8 15
-
(2014)
Tongxin Xuebao/J. Commun.
, vol.35
, Issue.5
, pp. 8-15
-
-
Liu, Y.-B.1
Gong, X.-H.2
Feng, Y.-F.3
-
91
-
-
84857371710
-
Formal security policy implementations in network firewalls
-
R. Macfarlane, W. Buchanan, E. Ekonomou, O. Uthmani, L. Fan, and O. Lo Formal security policy implementations in network firewalls Comput. Secur. 31 2 2012 253 270
-
(2012)
Comput. Secur.
, vol.31
, Issue.2
, pp. 253-270
-
-
Macfarlane, R.1
Buchanan, W.2
Ekonomou, E.3
Uthmani, O.4
Fan, L.5
Lo, O.6
-
92
-
-
80455143726
-
Formal enforcement and management of obligation policies
-
Y. Elrakaiby, F. Cuppens, and N. Cuppens-Boulahia Formal enforcement and management of obligation policies Data Knowl. Eng. 71 1 2012 127 147
-
(2012)
Data Knowl. Eng.
, vol.71
, Issue.1
, pp. 127-147
-
-
Elrakaiby, Y.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
93
-
-
79955663408
-
An innovative simulation environment for cross-domain policy enforcement
-
Z. Wu, and L. Wang An innovative simulation environment for cross-domain policy enforcement Simul. Model. Pract. Theory 19 7 2011 1558 1583
-
(2011)
Simul. Model. Pract. Theory
, vol.19
, Issue.7
, pp. 1558-1583
-
-
Wu, Z.1
Wang, L.2
-
94
-
-
84875268254
-
Hipolds: A hierarchical security policy language for distributed systems
-
M. Dell'Amico, M.S.I.G. Serme, A.S. de Oliveira, and Y. Roudier Hipolds: a hierarchical security policy language for distributed systems Inf. Secur. Technical Rep. 17 3 2013 81 92
-
(2013)
Inf. Secur. Technical Rep.
, vol.17
, Issue.3
, pp. 81-92
-
-
Dell'Amico, M.1
Serme, M.S.I.G.2
De Oliveira, A.S.3
Roudier, Y.4
-
95
-
-
80955142777
-
Enforcing privacy in e-commerce by balancing anonymity and trust
-
G. Bella, R. Giustolisi, and S. Riccobene Enforcing privacy in e-commerce by balancing anonymity and trust Comput. Secur. 30 8 2011 705 718
-
(2011)
Comput. Secur.
, vol.30
, Issue.8
, pp. 705-718
-
-
Bella, G.1
Giustolisi, R.2
Riccobene, S.3
-
96
-
-
79960004098
-
Formal enforcement of security policies on concurrent systems
-
M. Langar, M. Mejri, and K. Adi Formal enforcement of security policies on concurrent systems J. Symbol. Comput. 46 9 2011 997 1016
-
(2011)
J. Symbol. Comput.
, vol.46
, Issue.9
, pp. 997-1016
-
-
Langar, M.1
Mejri, M.2
Adi, K.3
-
97
-
-
17944367389
-
A brief history of process algebra
-
J. Baeten A brief history of process algebra Theoret. Comput. Sci. 335 2-3 2005 131 146
-
(2005)
Theoret. Comput. Sci.
, vol.335
, Issue.23
, pp. 131-146
-
-
Baeten, J.1
-
98
-
-
79954593491
-
The policy machine: A novel architecture and framework for access control policy specification and enforcement
-
D. Ferraiolo, V. Atluri, and S. Gavrila The policy machine: a novel architecture and framework for access control policy specification and enforcement J. Syst. Architec. 57 4 2011 412 424
-
(2011)
J. Syst. Architec.
, vol.57
, Issue.4
, pp. 412-424
-
-
Ferraiolo, D.1
Atluri, V.2
Gavrila, S.3
-
99
-
-
0024663219
-
The chinese wall security policy
-
Oakland, CA
-
D. Brewer, M. Nash, The chinese wall security policy, in: Proceedings. 1989 IEEE Symposium on Security and Privacy, Oakland, CA, 1989, pp. 206-214.
-
(1989)
Proceedings. 1989 IEEE Symposium on Security and Privacy
, pp. 206-214
-
-
Brewer, D.1
Nash, M.2
-
100
-
-
85033727708
-
-
M. Bishop Computer Security: Art and Science 2003 Addison Wesley
-
-
-
-
101
-
-
58049196928
-
A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources
-
J. Rao, A. Sardinha, and N. Sadeh A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources Web Semantics: Sci. Serv. Agents World Wide Web 7 1 2009 40 56
-
(2009)
Web Semantics: Sci. Serv. Agents World Wide Web
, vol.7
, Issue.1
, pp. 40-56
-
-
Rao, J.1
Sardinha, A.2
Sadeh, N.3
-
102
-
-
84903154895
-
Policy enforcement within emerging distributed, event-based systems
-
J. Singh, J. Bacon, D. Eyers, Policy enforcement within emerging distributed, event-based systems, in: DEBS 2014 - Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems, 2014, pp. 246-255.
-
(2014)
DEBS 2014 - Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems
, pp. 246-255
-
-
Singh, J.1
Bacon, J.2
Eyers, D.3
-
103
-
-
84917692605
-
Enforcement of security policy rules for the internet of things
-
Larnaca, Cyprus
-
R. Neisse, G. Steri, G. Baldini, Enforcement of security policy rules for the internet of things, in: Proc. of IEEE WiMob, Larnaca, Cyprus, 2014, pp. 120-127.
-
(2014)
Proc. of IEEE WiMob
, pp. 120-127
-
-
Neisse, R.1
Steri, G.2
Baldini, G.3
-
104
-
-
84890871446
-
Combined secure storage and communication for the internet of things
-
SECON 2013, New Orleans, LA, United States
-
I. Bagci, S. Raza, T. Chung, U. Roedig, T. Voigt, Combined secure storage and communication for the internet of things, in: 2013 IEEE International Conference on Sensing, Communications and Networking, SECON 2013, New Orleans, LA, United States, 2013, pp. 523-631.
-
(2013)
2013 IEEE International Conference on Sensing, Communications and Networking
, pp. 523-631
-
-
Bagci, I.1
Raza, S.2
Chung, T.3
Roedig, U.4
Voigt, T.5
-
105
-
-
84867824901
-
The virtus middleware: An xmpp based architecture for secure IoT communications
-
ICCCN 2012, Munich, Germany
-
D. Conzon, T. Bolognesi, P. Brizzi, A. Lotito, R. Tomasi, M. Spirito, The virtus middleware: an xmpp based architecture for secure IoT communications, in: 2012 21st International Conference on Computer Communications and Networks, ICCCN 2012, Munich, Germany, 2012, pp. 1-6.
-
(2012)
2012 21st International Conference on Computer Communications and Networks
, pp. 1-6
-
-
Conzon, D.1
Bolognesi, T.2
Brizzi, P.3
Lotito, A.4
Tomasi, R.5
Spirito, M.6
-
106
-
-
84889100209
-
Otsopack: Lightweight semantic framework for interoperable ambient intelligence applications
-
A. Gòmez-Goiri, P. Orduna, J. Diego, and D.L. de Ipina Otsopack: lightweight semantic framework for interoperable ambient intelligence applications Comput. Hum. Behav. 30 2014 460 467
-
(2014)
Comput. Hum. Behav.
, vol.30
, pp. 460-467
-
-
Gòmez-Goiri, A.1
Orduna, P.2
Diego, J.3
De Ipina, D.L.4
-
107
-
-
84875745180
-
A lightweight and secure TFTP protocol for smart environment
-
Kota Kinabalu, Malaysia
-
M. Isa, N. Mohamed, H.H.S. Adnan, J. Manan, R. Mahmod, A lightweight and secure TFTP protocol for smart environment, in: ISCAIE 2012 - 2012 IEEE Symposium on Computer Applications and Industrial Electronics 2012, Kota Kinabalu, Malaysia, 2012, pp. 302-306.
-
(2012)
ISCAIE 2012 - 2012 IEEE Symposium on Computer Applications and Industrial Electronics 2012
, pp. 302-306
-
-
Isa, M.1
Mohamed, N.2
Adnan, H.H.S.3
Manan, J.4
Mahmod, R.5
-
108
-
-
84899656447
-
Efficient naming, addressing and profile services in internet-of-things sensory environments
-
C.H. Liu, B. Yang, and T. Liu Efficient naming, addressing and profile services in internet-of-things sensory environments Ad Hoc Netw. 18 0 2013 85 101
-
(2013)
Ad Hoc Netw.
, vol.18
, pp. 85-101
-
-
Liu, C.H.1
Yang, B.2
Liu, T.3
-
109
-
-
84919356820
-
-
oneM2M. < http://www.onem2m.org/ >.
-
-
-
-
110
-
-
84907351769
-
The problem of task allocation in the internet of things and the consensus-based approach
-
G. Colistra, V. Pilloni, and L. Atzori The problem of task allocation in the internet of things and the consensus-based approach Comput. Netw. 73 0 2014 98 111
-
(2014)
Comput. Netw.
, vol.73
, pp. 98-111
-
-
Colistra, G.1
Pilloni, V.2
Atzori, L.3
-
111
-
-
84901671061
-
Middleware development method for internet of things
-
Y. Wang, M. Qiao, H. Tang, and H. Pei Middleware development method for internet of things Liaoning Gongcheng Jishu Daxue Xuebao (Ziran Kexue Ban)/J. Liaoning Tech. Univ. (Nat. Sci. Ed.) 33 5 2014 675 678
-
(2014)
Liaoning Gongcheng Jishu Daxue Xuebao (Ziran Kexue Ban)/J. Liaoning Tech. Univ. (Nat. Sci. Ed.)
, vol.33
, Issue.5
, pp. 675-678
-
-
Wang, Y.1
Qiao, M.2
Tang, H.3
Pei, H.4
-
112
-
-
84906657543
-
Proposal of a secure, deployable and transparent middleware for internet of things
-
Barcelona
-
H. Ferreira, R. De Sousa Jr.; F. De Deus, E. Canedo, Proposal of a secure, deployable and transparent middleware for internet of things, in: Iberian Conference on Information Systems and Technologies, CISTI, Barcelona, 2014, pp. 1-4.
-
(2014)
Iberian Conference on Information Systems and Technologies, CISTI
, pp. 1-4
-
-
Ferreira, H.1
De Sousa, R.2
De Deus, F.3
Canedo, E.4
-
113
-
-
84865157472
-
Rapid identification authentication protocol for mobile nodes in internet of things with privacy protection
-
J. Mao, and L. Wang Rapid identification authentication protocol for mobile nodes in internet of things with privacy protection J. Networks 7 7 2012 1099 1105
-
(2012)
J. Networks
, vol.7
, Issue.7
, pp. 1099-1105
-
-
Mao, J.1
Wang, L.2
-
114
-
-
84881161741
-
Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture
-
A. Jara, V. Kafle, and A. Skarmeta Secure and scalable mobility management scheme for the internet of things integration in the future internet architecture Int. J. Ad Hoc Ubiquitous Comput. 13 3-4 2013 228 242
-
(2013)
Int. J. Ad Hoc Ubiquitous Comput.
, vol.13
, Issue.34
, pp. 228-242
-
-
Jara, A.1
Kafle, V.2
Skarmeta, A.3
-
115
-
-
79951586725
-
A secure mobile rfid architecture for the internet of things
-
Beijing, China
-
T. Yan, Q. Wen, A secure mobile rfid architecture for the internet of things, in: Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, Beijing, China, 2010, pp. 616-619.
-
(2010)
Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010
, pp. 616-619
-
-
Yan, T.1
Wen, Q.2
-
116
-
-
84878126327
-
A security and privacy model for mobile rfid systems in the internet of things
-
W. Zhu, J. Yu, T. Wang, A security and privacy model for mobile rfid systems in the internet of things, in: International Conference on Communication Technology Proceedings, ICCT, 2012, pp. 726-732.
-
(2012)
International Conference on Communication Technology Proceedings, ICCT
, pp. 726-732
-
-
Zhu, W.1
Yu, J.2
Wang, T.3
-
117
-
-
84873341001
-
A review of mobile location privacy in the internet of things
-
Bangkok, Thailand
-
M. Elkhodr, S. Shanhrestani, H. Cheung, A review of mobile location privacy in the internet of things, in: International Conference on ICT and Knowledge Engineering, Bangkok, Thailand, 2012, pp. 266-272.
-
(2012)
International Conference on ICT and Knowledge Engineering
, pp. 266-272
-
-
Elkhodr, M.1
Shanhrestani, S.2
Cheung, H.3
-
118
-
-
84891586095
-
A secure handshake scheme for mobile-hierarchy city intelligent transportation system
-
ICUFN, Da Nang
-
S. Li, P. Gong, Q. Yang, M. Li, J. Kong, P. Li, A secure handshake scheme for mobile-hierarchy city intelligent transportation system, in: International Conference on Ubiquitous and Future Networks, ICUFN, Da Nang, 2013, pp. 190-191.
-
(2013)
International Conference on Ubiquitous and Future Networks
, pp. 190-191
-
-
Li, S.1
Gong, P.2
Yang, Q.3
Li, M.4
Kong, J.5
Li, P.6
-
120
-
-
84893354249
-
Security architecture for mobile e-health applications in medication control
-
SoftCOM 2013, Primosten
-
F. Goncalves, J. Macedo, M. Nicolau, A. Santos, Security architecture for mobile e-health applications in medication control, in: 2013 21st International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2013, Primosten, 2013, pp. 1-8.
-
(2013)
2013 21st International Conference on Software, Telecommunications and Computer Networks
, pp. 1-8
-
-
Goncalves, F.1
Macedo, J.2
Nicolau, M.3
Santos, A.4
-
121
-
-
84903725812
-
Privacy and authentication protocol for mobile rfid systems
-
B. Niu, X. Zhu, H. Chi, and H. Li Privacy and authentication protocol for mobile rfid systems Wireless Pers. Commun. 77 3 2014 1713 1731
-
(2014)
Wireless Pers. Commun.
, vol.77
, Issue.3
, pp. 1713-1731
-
-
Niu, B.1
Zhu, X.2
Chi, H.3
Li, H.4
-
122
-
-
84899414706
-
An efficient and secure m-ips scheme of mobile devices for human-centric computing
-
Y.-S. Jeong, J. Lee, J.-B. Lee, J.-J. Jung, and J. Park An efficient and secure m-ips scheme of mobile devices for human-centric computing J. Appl. Math. Special Issue 2014 2014 1 8
-
(2014)
J. Appl. Math. Special Issue
, vol.2014
, pp. 1-8
-
-
Jeong, Y.-S.1
Lee, J.2
Lee, J.-B.3
Jung, J.-J.4
Park, J.5
-
123
-
-
84905845325
-
Research on mobile information access based on internet of things
-
J. Geng, and X. Xiong Research on mobile information access based on internet of things Appl. Mech. Mater. 539 2014 460 463
-
(2014)
Appl. Mech. Mater.
, vol.539
, pp. 460-463
-
-
Geng, J.1
Xiong, X.2
-
124
-
-
85033663362
-
-
S. Kubler, K. Frmling, A. Buda, A standardized approach to deal with firewall and mobility policies in the iot, Pervasive Mobile Comput. (2014).
-
-
-
-
125
-
-
84902276405
-
Mosden: An internet of things middleware for resource constrained mobile devices
-
Washington, DC, USA
-
C. Perera, P. Jayaraman, A. Zaslavsky, D. Georgakopoulos, P. Christen, Mosden: An internet of things middleware for resource constrained mobile devices, in: Proceedings of the Annual Hawaii International Conference on System Sciences, Washington, DC, USA, 2014, pp. 1053-1062.
-
(2014)
Proceedings of the Annual Hawaii International Conference on System Sciences
, pp. 1053-1062
-
-
Perera, C.1
Jayaraman, P.2
Zaslavsky, A.3
Georgakopoulos, D.4
Christen, P.5
-
126
-
-
84893739171
-
Mobile {IPv6} in internet of things: Analysis, experimentations and optimizations
-
J. Montavont, D. Roth, and T. Nol Mobile {IPv6} in internet of things: analysis, experimentations and optimizations Ad Hoc Netw. 14 0 2014 15 25
-
(2014)
Ad Hoc Netw.
, vol.14
, pp. 15-25
-
-
Montavont, J.1
Roth, D.2
Nol, T.3
-
127
-
-
84900441656
-
A beaconless opportunistic routing based on a cross-layer approach for efficient video dissemination in mobile multimedia IoT applications
-
D. Rosario, Z. Zhao, A. Santos, T. Braun, and E. Cerqueira A beaconless opportunistic routing based on a cross-layer approach for efficient video dissemination in mobile multimedia IoT applications Comput. Commun. 45 0 2014 21 31
-
(2014)
Comput. Commun.
, vol.45
, pp. 21-31
-
-
Rosario, D.1
Zhao, Z.2
Santos, A.3
Braun, T.4
Cerqueira, E.5
-
128
-
-
84904823634
-
Using extended web technologies to develop bluetooth multi-platform mobile applications for interact with smart things
-
J.P. Espada, V.G. Daz, R.G. Crespo, O.S. Martnez, B.P. G-Bustelo, and J.M.C. Lovelle Using extended web technologies to develop bluetooth multi-platform mobile applications for interact with smart things Inf. Fusion 21 0 2014 30 41
-
(2014)
Inf. Fusion
, vol.21
, pp. 30-41
-
-
Espada, J.P.1
Daz, V.G.2
Crespo, R.G.3
Martnez, O.S.4
G-Bustelo, B.P.5
Lovelle, J.M.C.6
-
129
-
-
84874670418
-
Research on social relations cognitive model of mobile nodes in internet of things
-
J. An, X. Gui, W. Zhang, J. Jiang, and J. Yang Research on social relations cognitive model of mobile nodes in internet of things J. Network Comput. Appl. 36 2 2013 799 810
-
(2013)
J. Network Comput. Appl.
, vol.36
, Issue.2
, pp. 799-810
-
-
An, J.1
Gui, X.2
Zhang, W.3
Jiang, J.4
Yang, J.5
-
130
-
-
85033726689
-
-
T.-M. Gronli, P. Pourghomi, and G. Ghinea Towards NFC payments using a lightweight architecture for the web of things Computing 2014
-
-
-
-
131
-
-
85033660869
-
-
BUTLER Project. < http://www.iot-butler.eu >.
-
-
-
-
132
-
-
84888998142
-
-
Berlin, Germany
-
P. Kasinathan, G. Costamagna, H. Khaleel, C. Pastrone, M. Spirito, Demo: An ids Framework for Internet of Things Empowered by 6lowpan, Berlin, Germany, 2013, pp. 1337-1339.
-
(2013)
Demo: An Ids Framework for Internet of Things Empowered by 6lowpan
, pp. 1337-1339
-
-
Kasinathan, P.1
Costamagna, G.2
Khaleel, H.3
Pastrone, C.4
Spirito, M.5
-
133
-
-
85033675699
-
-
HYDRA Project. < http://www.hydramiddleware.eu/ >.
-
-
-
-
134
-
-
85033704590
-
-
Usable Trust in the Internet of Things. < http://www.utrustit.eu/ >.
-
-
-
-
135
-
-
85033711308
-
-
iCORE Project. < http://www.iot-icore.eu >.
-
-
-
-
136
-
-
85033661273
-
-
HACMS Project. < http://www.defenseone.com/technology >.
-
-
-
-
137
-
-
85033696203
-
-
National Science Foundation Project. < http://www.nsf.gov >.
-
-
-
-
138
-
-
85033670582
-
-
Roseline Project. < https://sites.google.com/site/roselineproject/ >.
-
-
-
-
139
-
-
85033716996
-
-
XIA-NP Project. < http://www.cs.cmu.edu/xia/ >.
-
-
-
-
140
-
-
85033698127
-
-
NDN-NP Project. < http://named-data.net/ >.
-
-
-
-
141
-
-
85033730121
-
-
NEBULA Project. < http://nebula-fia.org/ >.
-
-
-
-
142
-
-
85033707633
-
-
MobilityFirst-NP Project. < http://mobilityfirst.winlab.rutgers.edu/ >.
-
-
-
-
143
-
-
84855608079
-
Internet of things: Objectives and scientific challenges
-
H.-D. Ma Internet of things: objectives and scientific challenges J. Comput. Sci. Technol. 26 6 2011 919 924
-
(2011)
J. Comput. Sci. Technol.
, vol.26
, Issue.6
, pp. 919-924
-
-
Ma, H.-D.1
-
144
-
-
85033709977
-
-
FIRE EU-China Project. < http://www.euchina-fire.eu/ >.
-
-
-
-
145
-
-
85033722074
-
-
FIRE EU-Korea Project. < http://eukorea-fire.eu/ >.
-
-
-
-
146
-
-
85033688643
-
-
EU-Japan Project. < http://www.eurojapan-ict.org/ >.
-
-
-
|