-
3
-
-
84898043733
-
Charting past, present, and future research in ubiquitous computing
-
March
-
G. D. Abowd and E. D. Mynatt. (s.d.). Charting past, present, and future research in ubiquitous computing. ACM Trans. Comput.-Hum. Interact., vol. 7, pp. 29-58, March 2000. [Online]. Available: http://doi.acm.orglI0. 1 145/344949.344988
-
(2000)
ACM Trans. Comput.-Hum. Interact
, vol.7
, pp. 29-58
-
-
Abowd, G.D.1
Mynatt, E.D.2
-
4
-
-
84945276725
-
From machine-to-machine to the internet of things: Introduction to a new age of intelligence
-
Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos and David Boyle "From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence" Chapter 16-Conclusion and Looking Ahead, p 307-308
-
Chapter 16-Conclusion and Looking Ahead
, pp. 307-308
-
-
Holler, J.1
Tsiatsis, V.2
Mulligan, C.3
Avesand, S.4
Karnouskos, S.5
Boyle, D.6
-
5
-
-
70349751536
-
Smews: Smart and mobile embedded web server
-
march
-
S. Duquennoy, G. G.-1. (2009). "Smews: Smart and mobile embedded web server," in Complex, Intelligent and Software Intensive Systems, . . CISTS '09. International Conference on, march 2009, pp. 57 1-576
-
(2009)
Complex, Intelligent and Software Intensive Systems, . . CISTS '09. International Conference on
, pp. 571-576
-
-
Duquennoy, S.1
-
6
-
-
0032069469
-
-
may/jun
-
Agranat, ". w. (s.d.). ," Internet Computing, IEEE, vol. 2, no. 3, pp. 40-45, may/jun 1998.
-
(1998)
Internet Computing, IEEE
, vol.2
, Issue.3
, pp. 40-45
-
-
Agranat, W.1
-
7
-
-
0003245835
-
The stick-e document: A framework for creating context-aware applications
-
P. J. Brown. (s.d.). 'The stick-e document: A framework for creating context-aware applications," Electronic Publishing, vol. 8, no. 2 & 3, pp. 259-272, 1996.
-
(1996)
Electronic Publishing
, vol.8
, Issue.2-3
, pp. 259-272
-
-
Brown, P.J.1
-
10
-
-
85002424663
-
Identity authentication and capability based access control (iacac) for the internet of things
-
MAHALLE, Parikshit N., ANGGOROJATI, Bayu, PRASAD, Neeli R., et al. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things. Journal of Cyber Security and Mobility, 20 13, vol. I, no 4, p. 309-348
-
(2013)
Journal of Cyber Security and Mobility
, vol.1
, Issue.4
, pp. 309-348
-
-
Mahalle, P.N.1
Anggorojati, B.2
Prasad, N.R.3
-
11
-
-
84880621938
-
A capability-based security approach to manage access control in the internet of things
-
September
-
S. Gusmeroli, S. Piccione, and D. Rotondi. A capability-based security approach to manage access control in the internet of things. Mathematical and Computer Modelling, 58(5-6): 1 189-1205, September 20 13
-
(2013)
Mathematical and Computer Modelling
, vol.58
, Issue.5-6
, pp. 1189-1205
-
-
Gusmeroli, S.1
Piccione, S.2
Rotondi, D.3
-
12
-
-
84886928358
-
Distributed capability-based access control for the internet of things
-
HERNANDEZ-RAMOS, 1., JARA, Antonio 1., MARIN, Leandro, et al.Distributed capability-based access control for the internet of things. J Internet Serv Inf Secur, 2013, vol. 3, no 3/4, p. 1-16.
-
(2013)
J Internet Serv Inf Secur
, vol.3
, Issue.3-4
, pp. 1-16
-
-
Hernandez-Ramos, J.1
Jara, A.J.2
Marin, L.3
-
14
-
-
84883665974
-
Authorization framework for the internet-of-things
-
Madrid, Spain. IEEE, June
-
L. Seitz, G. Selander, and C. Gehrmann. Authorization Framework for the Internet-of-Things. In Proc. of the 14th IEEE International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM'13), Madrid, Spain, pages 1-6. IEEE, June 20 13.
-
(2013)
Proc. of the 14th IEEE International Symposium and Workshops on A World of Wireless, Mobile and Multimedia Networks (WoWMoM'13)
, pp. 1-6
-
-
Seitz, L.1
Selander, G.2
Gehrmann, C.3
|