-
1
-
-
77956877124
-
The internet of things: A survey
-
Oct.
-
L. Atzori, A. Iera, and G. Morabito. The internet of things: A survey. Computer Networks, 54(15):2787-2805, Oct. 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
2
-
-
34047093851
-
Trust negotiation in identity management
-
March
-
A. Bhargav-Spantzel, A. Squicciarini, and E. Bertino. Trust negotiation in identity management. Security Privacy, IEEE, 5(2):55-63, March 2007.
-
(2007)
Security Privacy, IEEE
, vol.5
, Issue.2
, pp. 55-63
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.2
Bertino, E.3
-
3
-
-
84873946697
-
Revisiting smart dust with RFID sensor networks
-
M. Buettner, B. Greenstein, A. Sample, J. R. Smith, and D. Wetherall. Revisiting smart dust with RFID sensor networks. In Proc. 7th ACM Workshop on Hot Topics in Networks (Hotnets-VII), Calgary, Alberta, Canada, 2008.
-
(2008)
Proc. 7th ACM Workshop on Hot Topics in Networks (Hotnets-VII), Calgary, Alberta, Canada
-
-
Buettner, M.1
Greenstein, B.2
Sample, A.3
Smith, J.R.4
Wetherall, D.5
-
4
-
-
79951760612
-
An identity authentication scheme in wireless peer-to-peer network
-
Nov
-
G. Chen, H. Chen, L. Xie, G. Song, and T. Zhuang. An identity authentication scheme in wireless peer-to-peer network. In Communication Technology (ICCT), 2010 12th IEEE International Conference on, pages 473-476, Nov 2010.
-
(2010)
Communication Technology (ICCT), 2010 12th IEEE International Conference on
, pp. 473-476
-
-
Chen, G.1
Chen, H.2
Xie, L.3
Song, G.4
Zhuang, T.5
-
5
-
-
84924283036
-
Analyzing and specifying reusable security requirements
-
D. G. Firesmith. Analyzing and specifying reusable security requirements. In Proc. Solid Freeform Fabrication Sym, pages 507-514, 2003.
-
(2003)
Proc. Solid Freeform Fabrication Sym
, pp. 507-514
-
-
Firesmith, D.G.1
-
7
-
-
84878388190
-
Privacy in the cloud: Applying nissenbaum's theory of contextual integrity
-
Oct.
-
F. S. Grodzinsky and H. T. Tavani. Privacy in "the Cloud": Applying Nissenbaum's Theory of Contextual Integrity. SIGCAS Comput. Soc., 41(1):38-47, Oct. 2011.
-
(2011)
SIGCAS Comput. Soc.
, vol.41
, Issue.1
, pp. 38-47
-
-
Grodzinsky, F.S.1
Tavani, H.T.2
-
9
-
-
79956038083
-
Research on the architecture of trusted security system based on the internet of things
-
March
-
X. Li, Z. Xuan, and L. Wen. Research on the architecture of trusted security system based on the internet of things. In Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on, volume 2, pages 1172-1175, March 2011.
-
(2011)
Intelligent Computation Technology and Automation (ICICTA), 2011 International Conference on
, vol.2
, pp. 1172-1175
-
-
Li, X.1
Xuan, Z.2
Wen, L.3
-
10
-
-
84866349735
-
Authentication and access control in the internet of things
-
June
-
J. Liu, Y. Xiao, and C. Chen. Authentication and access control in the internet of things. In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, pages 588-592, June 2012.
-
(2012)
Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on
, pp. 588-592
-
-
Liu, J.1
Xiao, Y.2
Chen, C.3
-
12
-
-
84861997111
-
Internet of things: Vision, applications and research challenges
-
Sept.
-
D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac. Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 10(7):1497-1516, Sept. 2012.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
13
-
-
0028430224
-
Network intrusion detection
-
May
-
B. Mukherjee, L. Heberlein, and K. Levitt. Network intrusion detection. Network, IEEE, 8(3):26-41, May 1994.
-
(1994)
Network, IEEE
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.2
Levitt, K.3
-
14
-
-
66649114331
-
Multiparty nonrepudiation: A survey
-
Jan.
-
J. A. Onieva, J. Zhou, and J. Lopez. Multiparty nonrepudiation: A survey. ACM Comput. Surv., 41(1):5:1-5:43, Jan. 2009.
-
(2009)
ACM Comput. Surv.
, vol.41
, Issue.1
, pp. 51-543
-
-
Onieva, J.A.1
Zhou, J.2
Lopez, J.3
-
15
-
-
84885328301
-
Svelte: Real-time intrusion detection in the internet of things
-
S. Raza, L. Wallgren, and T. Voigt. Svelte: Real-time intrusion detection in the internet of things. Ad Hoc Networks, 11(8):2661-2674, 2013.
-
(2013)
Ad Hoc Networks
, vol.11
, Issue.8
, pp. 2661-2674
-
-
Raza, S.1
Wallgren, L.2
Voigt, T.3
-
16
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
July
-
R. Roman, J. Zhou, and J. Lopez. On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10):2266-2279, July 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
17
-
-
84881064838
-
Dynamic aggregation protocol for wireless sensor networks
-
A. M. S. Said, A. W. Ibrahim, A. Soua, and H. Afifi. Dynamic aggregation protocol for wireless sensor networks. 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), 0:356-361, 2013.
-
(2013)
2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA)
, pp. 356-361
-
-
Said, A.M.S.1
Ibrahim, A.W.2
Soua, A.3
Afifi, H.4
-
18
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. Computer, 29(2):38-47, Feb 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
19
-
-
84861882785
-
Inter-domain analysis of smart grid domain dependencies using domain-link matrices
-
H. Suleiman, K. Ahmed, N. Zafar, E. Phillips, D. Svetinovic, and O. de Weck. Inter-domain analysis of smart grid domain dependencies using domain-link matrices. Smart Grid, IEEE Transactions on, 3(2):692-709, 2012.
-
(2012)
Smart Grid, IEEE Transactions on
, vol.3
, Issue.2
, pp. 692-709
-
-
Suleiman, H.1
Ahmed, K.2
Zafar, N.3
Phillips, E.4
Svetinovic, D.5
De Weck, O.6
-
21
-
-
63349085809
-
Technology, standards, and real-world deployments of the epc network
-
March
-
F. Thiesse, C. Floerkemeier, M. Harrison, F. Michahelles, and C. Roduner. Technology, standards, and real-world deployments of the epc network. Internet Computing, IEEE, 13(2):36-43, March 2009.
-
(2009)
Internet Computing, IEEE
, vol.13
, Issue.2
, pp. 36-43
-
-
Thiesse, F.1
Floerkemeier, C.2
Harrison, M.3
Michahelles, F.4
Roduner, C.5
-
22
-
-
77952418081
-
2-clickauth optical challengeresponse authentication
-
Feb
-
A. Vapen, D. Byers, and N. Shahmehri. 2-clickauth optical challengeresponse authentication. In Availability, Reliability, and Security, 2010. ARES '10 International Conference on, pages 79-86, Feb 2010.
-
(2010)
Availability, Reliability, and Security, 2010. ARES '10 International Conference on
, pp. 79-86
-
-
Vapen, A.1
Byers, D.2
Shahmehri, N.3
-
23
-
-
1842538795
-
Privacy as contextual integrity
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li. Privacy as contextual integrity. Washington Law Review, 2004.
-
(2004)
Washington Law Review
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
24
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
May
-
Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li. Enabling public auditability and data dynamics for storage security in cloud computing. Parallel and Distributed Systems, IEEE Transactions on, 22(5):847-859, May 2011.
-
(2011)
Parallel and Distributed Systems, IEEE Transactions on
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
25
-
-
74949143896
-
Internet of things-new security and privacy challenges
-
R. H. Weber. Internet of things-new security and privacy challenges. Computer Law & Security Review, 26(1):23-30, 2010.
-
(2010)
Computer Law & Security Review
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
|