-
1
-
-
85012215377
-
Revisiting unknown RFID tag identification in large-scale Internet of Things
-
May
-
D. Zhang, Z. He, Y. Qian, J.Wan, D. Li, and S. Zhao, "Revisiting unknown RFID tag identification in large-scale Internet of Things," IEEE Wireless Commun., vol. 23, no. 5, pp. 24-29, May 2016
-
(2016)
IEEE Wireless Commun.
, vol.23
, Issue.5
, pp. 24-29
-
-
Zhang, D.1
He, Z.2
Qian, Y.3
Wan, J.4
Li, D.5
Zhao, S.6
-
2
-
-
85000460076
-
An efficient tree-based self-organizing protocol for Internet of Things
-
T. Qiu, X. Liu, L. Feng, Y. Zhou, and K. Zheng, "An efficient tree-based self-organizing protocol for Internet of Things," IEEE Access, vol. 4, no. 6, pp. 3535-3546, 2016
-
(2016)
IEEE Access
, vol.4
, Issue.6
, pp. 3535-3546
-
-
Qiu, T.1
Liu, X.2
Feng, L.3
Zhou, Y.4
Zheng, K.5
-
3
-
-
85000893446
-
Heterogeneous Ad Hoc networks: Architectures, advances and challenges
-
Feb.
-
T. Qiu, N. Chen, K. Li, D. Qiao, and Z. Fu, "Heterogeneous Ad Hoc networks: Architectures, advances and challenges," Ad Hoc Netw., vol. 55, pp. 143-152, Feb. 2017
-
(2017)
Ad Hoc Netw.
, vol.55
, pp. 143-152
-
-
Qiu, T.1
Chen, N.2
Li, K.3
Qiao, D.4
Fu, Z.5
-
4
-
-
85001055287
-
A greedy model with small world for improving the robustness of heterogeneous Internet of Things
-
Jun.
-
T. Qiu, D. Luo, F. Xia, N. Deonauth,W. Si, and A. Tolb, "A greedy model with small world for improving the robustness of heterogeneous Internet of Things," Comput. Netw., vol. 101, pp. 127-143, Jun. 2016
-
(2016)
Comput. Netw.
, vol.101
, pp. 127-143
-
-
Qiu, T.1
Luo, D.2
Xia, F.3
Deonauth, N.4
Si, W.5
Tolb, A.6
-
5
-
-
84881344042
-
Cyber-physical systems for optimal energy management scheme of autonomous electric vehicle
-
J. Wan, H. Yan, D. Li, K. Zhou, and L. Zeng, "Cyber-physical systems for optimal energy management scheme of autonomous electric vehicle," Comput. J., vol. 56, no. 8, pp. 947-956, 2013
-
(2013)
Comput. J.
, vol.56
, Issue.8
, pp. 947-956
-
-
Wan, J.1
Yan, H.2
Li, D.3
Zhou, K.4
Zeng, L.5
-
6
-
-
84991071444
-
Software-de-ned industrial Internet of Things in the con-text of industry 4.0
-
Oct.
-
J. Wan et al., "Software-de-ned industrial Internet of Things in the con-text of industry 4.0," IEEE Sensors J., vol. 16, no. 20, pp. 7373-7380, Oct. 2016
-
(2016)
IEEE Sensors J.
, vol.16
, Issue.20
, pp. 7373-7380
-
-
Wan, J.1
-
7
-
-
84956858823
-
Towards smart fac-tory for Industry 4.0: A self-organized multi-agent system with big data based feedback and coordination
-
Jun.
-
S. Wang, J. Wan, D. Zhang, D. Li, and C. Zhang, "Towards smart fac-tory for Industry 4.0: A self-organized multi-agent system with big data based feedback and coordination," Comput. Netw., vol. 101, pp. 158-168, Jun. 2016
-
(2016)
Comput. Netw.
, vol.101
, pp. 158-168
-
-
Wang, S.1
Wan, J.2
Zhang, D.3
Li, D.4
Zhang, C.5
-
8
-
-
84904116461
-
Interconnection framework for mHealth and remote monitoring based on the Internet of Things
-
Sep.
-
A. J. Jara, M. A. Zamora-Izquierdo, and A. F. Skarmeta, "Interconnection framework for mHealth and remote monitoring based on the Internet of Things," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 47-65, Sep. 2013
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 47-65
-
-
Jara, A.J.1
Zamora-Izquierdo, M.A.2
Skarmeta, A.F.3
-
9
-
-
84910149653
-
Security of the Internet of Things: Perspectives and challenges
-
Nov.
-
Q. Jing, A. V. Vasilakos, J.Wan, J. Lu, and D. Qiu, "Security of the Internet of Things: Perspectives and challenges," Wireless Netw., vol. 20, no. 8, pp. 2481-2501, Nov. 2014
-
(2014)
Wireless Netw.
, vol.20
, Issue.8
, pp. 2481-2501
-
-
Jing, Q.1
Vasilakos, A.V.2
Wan, J.3
Lu, J.4
Qiu, D.5
-
10
-
-
81355147383
-
A survey on facilities for experimental Internet of Things
-
Nov.
-
A. Gluhak, S. Krco, and M. Nati, "A survey on facilities for experimental Internet of Things," IEEE Commun. Mag., vol. 49, no. 11, pp. 58-67, Nov. 2011
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.11
, pp. 58-67
-
-
Gluhak, A.1
Krco, S.2
Nati, M.3
-
11
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models," IEEE Comput., vol. 29, no. 2, pp. 38-47, Feb. 1996
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
12
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
R. Sandhu, R. Bhamidipati, and R. Munawer, "The ARBAC97 model for role-based administration of roles," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 105-135, 1999
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, R.2
Munawer, R.3
-
14
-
-
33751549311
-
An organizational structure-based administration model for decentralized access control
-
S. Oh, C. W. Byun, and S. Park, "An organizational structure-based administration model for decentralized access control," J. Inf. Sci. Eng., vol. 22, no. 6, pp. 1465-1483, 2006
-
(2006)
J. Inf. Sci. Eng.
, vol.22
, Issue.6
, pp. 1465-1483
-
-
Oh, S.1
Byun, C.W.2
Park, S.3
-
15
-
-
0016984825
-
Protection in operating systems
-
M. Harrison,W. Ruzzo, and J. Ullman, "Protection in operating systems," Commun. ACM, vol. 19, no. 8, pp. 461-471, 1976
-
(1976)
Commun. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
16
-
-
30544438141
-
Beyond proof-of-compliance: Safety and availability analysis in trust management
-
N. Li, J. Mitchell, and W. Winsborough, "Beyond proof-of-compliance: Safety and availability analysis in trust management," J. ACM, vol. 52, no. 3, pp. 474-514, 2005
-
(2005)
J. ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
17
-
-
33845517298
-
Security analysis in role-based access control
-
N. Li and M. V. Tripunitara, "Security analysis in role-based access control," ACM Trans. Inf. Syst. Secur. (TISSEC), vol. 9, no. 4, pp. 391-420, 2006
-
(2006)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.9
, Issue.4
, pp. 391-420
-
-
Li, N.1
Tripunitara, M.V.2
-
18
-
-
55949085989
-
Towards formal verification of role-based access control policies
-
Oct.
-
S. Jha, N. Li, M. Tripunitara, Q. Wang, and W. Winsborough, "Towards formal verification of role-based access control policies," IEEE Trans. Depend. Sec. Comput., vol. 5, no. 4, pp. 242-255, Oct. 2008
-
(2008)
IEEE Trans. Depend. Sec. Comput.
, vol.5
, Issue.4
, pp. 242-255
-
-
Jha, S.1
Li, N.2
Tripunitara, M.3
Wang, Q.4
Winsborough, W.5
-
19
-
-
85089792319
-
Policy analysis for administrative role based access control
-
Venice, Italy, Jul.
-
A. Sasturkar et al., "Policy analysis for administrative role based access control," in Proc. IEEE Workshop Comput. Secur. Found., Venice, Italy, Jul. 2006, pp. 183-196
-
(2006)
Proc. IEEE Workshop Comput. Secur. Found
, pp. 183-196
-
-
Sasturkar, A.1
-
20
-
-
77952403780
-
Efficient policy analysis for administrative role based access control
-
Alexandria, Egypt
-
S. D. Stoller, P. Yang, C. Ramakrishnan, and M. I. Gofman, "Efficient policy analysis for administrative role based access control," in Proc. 14th ACM Conf. Comput. Commun. Secur., Alexandria, Egypt, 2007, pp. 445-455
-
(2007)
Proc. 14th ACM Conf. Comput. Commun. Secur
, pp. 445-455
-
-
Stoller, S.D.1
Yang, P.2
Ramakrishnan, C.3
Gofman, M.I.4
-
21
-
-
0030705406
-
Analyzing consistency of security policies
-
Oakland, CA, USA, May
-
L. Cholvy and F. Cuppens, "Analyzing consistency of security policies," in Proc. IEEE Symp. Secur. Privacy, Oakland, CA, USA, May 1997, pp. 103-112
-
(1997)
Proc. IEEE Symp. Secur. Privacy
, pp. 103-112
-
-
Cholvy, L.1
Cuppens, F.2
-
22
-
-
24644445703
-
Conformance checking of RBAC policy and its implementation
-
H. Frode and O. Vladimir, "Conformance checking of RBAC policy and its implementation," Lect. Notes Comput. Sci., vol. 34, no. 39, pp. 144-155, 2005
-
(2005)
Lect. Notes Comput. Sci.
, vol.34
, Issue.39
, pp. 144-155
-
-
Frode, H.1
Vladimir, O.2
-
23
-
-
72249084717
-
A DL-based method for access control policy con-ict detecting
-
Beijing, China
-
F. Huang, Z. Huang, and L. Liu, "A DL-based method for access control policy con-ict detecting," in Proc. 1st Asia-Pacific Symp. Internetware, Beijing, China, 2009, pp. 1-5
-
(2009)
Proc. 1st Asia-Pacific Symp. Internetware
, pp. 1-5
-
-
Huang, F.1
Huang, Z.2
Liu, L.3
-
24
-
-
70849095525
-
A framework for enforcing con-strained RBAC policies
-
Vancouver, BC, Canada
-
J. Crampton and H. Khambhammett, "A framework for enforcing con-strained RBAC policies," in Proc. Int. Conf. Comput. Sci. Eng., Vancouver, BC, Canada, 2009, pp. 195-200
-
(2009)
Proc. Int. Conf. Comput. Sci. Eng
, pp. 195-200
-
-
Crampton, J.1
Khambhammett, H.2
-
25
-
-
11044223672
-
Access-control language for multidomain environments
-
Dec.
-
J. B. D. Joshi, "Access-control language for multidomain environments," IEEE Internet Comput., vol. 8, no. 6, pp. 40-50, Dec. 2004
-
(2004)
IEEE Internet Comput.
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.D.1
-
26
-
-
28244460211
-
Secure interop-eration in a multidomain environment employing RBAC policies
-
Nov.
-
B. Sha-q, J. B. D. Joshi, E. Bertino, and A. Ghafoor, "Secure interop-eration in a multidomain environment employing RBAC policies," IEEE Trans. Knowl. Data Eng., vol. 17, no. 11, pp. 1557-1577, Nov. 2005
-
(2005)
IEEE Trans. Knowl. Data Eng.
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Sha-Q, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
27
-
-
67349124845
-
Specification and enforcement of-exible security policy for active cooperation
-
Y. Q. Sun, X. Meng, B. Gong, Z. Lin, and E. Bertino, "Specification and enforcement of-exible security policy for active cooperation," Inf. Sci., vol. 179, no. 15, pp. 2629-2642, 2009
-
(2009)
Inf. Sci.
, vol.179
, Issue.15
, pp. 2629-2642
-
-
Sun, Y.Q.1
Meng, X.2
Gong, B.3
Lin, Z.4
Bertino, E.5
-
28
-
-
0031074857
-
Fast planning through planning graph analysis
-
A. Blum and M. L. Furst, "Fast planning through planning graph analysis," Artif. Intell., vol. 90, nos. 1-2, pp. 281-300, 1995
-
(1995)
Artif. Intell.
, vol.90
, Issue.1-2
, pp. 281-300
-
-
Blum, A.1
Furst, M.L.2
-
29
-
-
0040258260
-
Complexity results for planning
-
San Francisco, CA, USA
-
T. Bylander, "Complexity results for planning," in Proc. Int. Joint Conf. Artif. Intell., San Francisco, CA, USA, 1991, pp. 274-279
-
(1991)
Proc. Int. Joint Conf. Artif. Intell
, pp. 274-279
-
-
Bylander, T.1
-
30
-
-
49049096543
-
The ASCAA principles for next-generation role-based access control
-
Spain
-
R. Sandhu and V. Bhamidipati, "The ASCAA principles for next-generation role-based access control," in Proc. 3rd Int. Conf. Availability, Rel. Secur. Barcelona, Spain, 2008, pp. 27-32.
-
(2008)
Proc. 3rd Int. Conf. Availability, Rel. Secur. Barcelona
, pp. 27-32
-
-
Sandhu, R.1
Bhamidipati, V.2
|