메뉴 건너뛰기




Volumn 5, Issue , 2017, Pages 7001-7011

An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things

Author keywords

Access control model; authorization route; manufacturing internet of things; role based access control

Indexed keywords

DECISION SUPPORT SYSTEMS; DISTRIBUTED COMPUTER SYSTEMS; INTERNET OF THINGS; MANUFACTURE;

EID: 85026348843     PISSN: None     EISSN: 21693536     Source Type: Journal    
DOI: 10.1109/ACCESS.2017.2693380     Document Type: Article
Times cited : (75)

References (30)
  • 1
    • 85012215377 scopus 로고    scopus 로고
    • Revisiting unknown RFID tag identification in large-scale Internet of Things
    • May
    • D. Zhang, Z. He, Y. Qian, J.Wan, D. Li, and S. Zhao, "Revisiting unknown RFID tag identification in large-scale Internet of Things," IEEE Wireless Commun., vol. 23, no. 5, pp. 24-29, May 2016
    • (2016) IEEE Wireless Commun. , vol.23 , Issue.5 , pp. 24-29
    • Zhang, D.1    He, Z.2    Qian, Y.3    Wan, J.4    Li, D.5    Zhao, S.6
  • 2
    • 85000460076 scopus 로고    scopus 로고
    • An efficient tree-based self-organizing protocol for Internet of Things
    • T. Qiu, X. Liu, L. Feng, Y. Zhou, and K. Zheng, "An efficient tree-based self-organizing protocol for Internet of Things," IEEE Access, vol. 4, no. 6, pp. 3535-3546, 2016
    • (2016) IEEE Access , vol.4 , Issue.6 , pp. 3535-3546
    • Qiu, T.1    Liu, X.2    Feng, L.3    Zhou, Y.4    Zheng, K.5
  • 3
    • 85000893446 scopus 로고    scopus 로고
    • Heterogeneous Ad Hoc networks: Architectures, advances and challenges
    • Feb.
    • T. Qiu, N. Chen, K. Li, D. Qiao, and Z. Fu, "Heterogeneous Ad Hoc networks: Architectures, advances and challenges," Ad Hoc Netw., vol. 55, pp. 143-152, Feb. 2017
    • (2017) Ad Hoc Netw. , vol.55 , pp. 143-152
    • Qiu, T.1    Chen, N.2    Li, K.3    Qiao, D.4    Fu, Z.5
  • 4
    • 85001055287 scopus 로고    scopus 로고
    • A greedy model with small world for improving the robustness of heterogeneous Internet of Things
    • Jun.
    • T. Qiu, D. Luo, F. Xia, N. Deonauth,W. Si, and A. Tolb, "A greedy model with small world for improving the robustness of heterogeneous Internet of Things," Comput. Netw., vol. 101, pp. 127-143, Jun. 2016
    • (2016) Comput. Netw. , vol.101 , pp. 127-143
    • Qiu, T.1    Luo, D.2    Xia, F.3    Deonauth, N.4    Si, W.5    Tolb, A.6
  • 5
    • 84881344042 scopus 로고    scopus 로고
    • Cyber-physical systems for optimal energy management scheme of autonomous electric vehicle
    • J. Wan, H. Yan, D. Li, K. Zhou, and L. Zeng, "Cyber-physical systems for optimal energy management scheme of autonomous electric vehicle," Comput. J., vol. 56, no. 8, pp. 947-956, 2013
    • (2013) Comput. J. , vol.56 , Issue.8 , pp. 947-956
    • Wan, J.1    Yan, H.2    Li, D.3    Zhou, K.4    Zeng, L.5
  • 6
    • 84991071444 scopus 로고    scopus 로고
    • Software-de-ned industrial Internet of Things in the con-text of industry 4.0
    • Oct.
    • J. Wan et al., "Software-de-ned industrial Internet of Things in the con-text of industry 4.0," IEEE Sensors J., vol. 16, no. 20, pp. 7373-7380, Oct. 2016
    • (2016) IEEE Sensors J. , vol.16 , Issue.20 , pp. 7373-7380
    • Wan, J.1
  • 7
    • 84956858823 scopus 로고    scopus 로고
    • Towards smart fac-tory for Industry 4.0: A self-organized multi-agent system with big data based feedback and coordination
    • Jun.
    • S. Wang, J. Wan, D. Zhang, D. Li, and C. Zhang, "Towards smart fac-tory for Industry 4.0: A self-organized multi-agent system with big data based feedback and coordination," Comput. Netw., vol. 101, pp. 158-168, Jun. 2016
    • (2016) Comput. Netw. , vol.101 , pp. 158-168
    • Wang, S.1    Wan, J.2    Zhang, D.3    Li, D.4    Zhang, C.5
  • 8
    • 84904116461 scopus 로고    scopus 로고
    • Interconnection framework for mHealth and remote monitoring based on the Internet of Things
    • Sep.
    • A. J. Jara, M. A. Zamora-Izquierdo, and A. F. Skarmeta, "Interconnection framework for mHealth and remote monitoring based on the Internet of Things," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 47-65, Sep. 2013
    • (2013) IEEE J. Sel. Areas Commun. , vol.31 , Issue.9 , pp. 47-65
    • Jara, A.J.1    Zamora-Izquierdo, M.A.2    Skarmeta, A.F.3
  • 9
    • 84910149653 scopus 로고    scopus 로고
    • Security of the Internet of Things: Perspectives and challenges
    • Nov.
    • Q. Jing, A. V. Vasilakos, J.Wan, J. Lu, and D. Qiu, "Security of the Internet of Things: Perspectives and challenges," Wireless Netw., vol. 20, no. 8, pp. 2481-2501, Nov. 2014
    • (2014) Wireless Netw. , vol.20 , Issue.8 , pp. 2481-2501
    • Jing, Q.1    Vasilakos, A.V.2    Wan, J.3    Lu, J.4    Qiu, D.5
  • 10
    • 81355147383 scopus 로고    scopus 로고
    • A survey on facilities for experimental Internet of Things
    • Nov.
    • A. Gluhak, S. Krco, and M. Nati, "A survey on facilities for experimental Internet of Things," IEEE Commun. Mag., vol. 49, no. 11, pp. 58-67, Nov. 2011
    • (2011) IEEE Commun. Mag. , vol.49 , Issue.11 , pp. 58-67
    • Gluhak, A.1    Krco, S.2    Nati, M.3
  • 12
    • 0001549660 scopus 로고    scopus 로고
    • The ARBAC97 model for role-based administration of roles
    • R. Sandhu, R. Bhamidipati, and R. Munawer, "The ARBAC97 model for role-based administration of roles," ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp. 105-135, 1999
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 105-135
    • Sandhu, R.1    Bhamidipati, R.2    Munawer, R.3
  • 14
    • 33751549311 scopus 로고    scopus 로고
    • An organizational structure-based administration model for decentralized access control
    • S. Oh, C. W. Byun, and S. Park, "An organizational structure-based administration model for decentralized access control," J. Inf. Sci. Eng., vol. 22, no. 6, pp. 1465-1483, 2006
    • (2006) J. Inf. Sci. Eng. , vol.22 , Issue.6 , pp. 1465-1483
    • Oh, S.1    Byun, C.W.2    Park, S.3
  • 15
    • 0016984825 scopus 로고
    • Protection in operating systems
    • M. Harrison,W. Ruzzo, and J. Ullman, "Protection in operating systems," Commun. ACM, vol. 19, no. 8, pp. 461-471, 1976
    • (1976) Commun. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.1    Ruzzo, W.2    Ullman, J.3
  • 16
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Safety and availability analysis in trust management
    • N. Li, J. Mitchell, and W. Winsborough, "Beyond proof-of-compliance: Safety and availability analysis in trust management," J. ACM, vol. 52, no. 3, pp. 474-514, 2005
    • (2005) J. ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.2    Winsborough, W.3
  • 17
    • 33845517298 scopus 로고    scopus 로고
    • Security analysis in role-based access control
    • N. Li and M. V. Tripunitara, "Security analysis in role-based access control," ACM Trans. Inf. Syst. Secur. (TISSEC), vol. 9, no. 4, pp. 391-420, 2006
    • (2006) ACM Trans. Inf. Syst. Secur. (TISSEC) , vol.9 , Issue.4 , pp. 391-420
    • Li, N.1    Tripunitara, M.V.2
  • 19
    • 85089792319 scopus 로고    scopus 로고
    • Policy analysis for administrative role based access control
    • Venice, Italy, Jul.
    • A. Sasturkar et al., "Policy analysis for administrative role based access control," in Proc. IEEE Workshop Comput. Secur. Found., Venice, Italy, Jul. 2006, pp. 183-196
    • (2006) Proc. IEEE Workshop Comput. Secur. Found , pp. 183-196
    • Sasturkar, A.1
  • 21
    • 0030705406 scopus 로고    scopus 로고
    • Analyzing consistency of security policies
    • Oakland, CA, USA, May
    • L. Cholvy and F. Cuppens, "Analyzing consistency of security policies," in Proc. IEEE Symp. Secur. Privacy, Oakland, CA, USA, May 1997, pp. 103-112
    • (1997) Proc. IEEE Symp. Secur. Privacy , pp. 103-112
    • Cholvy, L.1    Cuppens, F.2
  • 22
    • 24644445703 scopus 로고    scopus 로고
    • Conformance checking of RBAC policy and its implementation
    • H. Frode and O. Vladimir, "Conformance checking of RBAC policy and its implementation," Lect. Notes Comput. Sci., vol. 34, no. 39, pp. 144-155, 2005
    • (2005) Lect. Notes Comput. Sci. , vol.34 , Issue.39 , pp. 144-155
    • Frode, H.1    Vladimir, O.2
  • 23
    • 72249084717 scopus 로고    scopus 로고
    • A DL-based method for access control policy con-ict detecting
    • Beijing, China
    • F. Huang, Z. Huang, and L. Liu, "A DL-based method for access control policy con-ict detecting," in Proc. 1st Asia-Pacific Symp. Internetware, Beijing, China, 2009, pp. 1-5
    • (2009) Proc. 1st Asia-Pacific Symp. Internetware , pp. 1-5
    • Huang, F.1    Huang, Z.2    Liu, L.3
  • 24
    • 70849095525 scopus 로고    scopus 로고
    • A framework for enforcing con-strained RBAC policies
    • Vancouver, BC, Canada
    • J. Crampton and H. Khambhammett, "A framework for enforcing con-strained RBAC policies," in Proc. Int. Conf. Comput. Sci. Eng., Vancouver, BC, Canada, 2009, pp. 195-200
    • (2009) Proc. Int. Conf. Comput. Sci. Eng , pp. 195-200
    • Crampton, J.1    Khambhammett, H.2
  • 25
    • 11044223672 scopus 로고    scopus 로고
    • Access-control language for multidomain environments
    • Dec.
    • J. B. D. Joshi, "Access-control language for multidomain environments," IEEE Internet Comput., vol. 8, no. 6, pp. 40-50, Dec. 2004
    • (2004) IEEE Internet Comput. , vol.8 , Issue.6 , pp. 40-50
    • Joshi, J.B.D.1
  • 26
    • 28244460211 scopus 로고    scopus 로고
    • Secure interop-eration in a multidomain environment employing RBAC policies
    • Nov.
    • B. Sha-q, J. B. D. Joshi, E. Bertino, and A. Ghafoor, "Secure interop-eration in a multidomain environment employing RBAC policies," IEEE Trans. Knowl. Data Eng., vol. 17, no. 11, pp. 1557-1577, Nov. 2005
    • (2005) IEEE Trans. Knowl. Data Eng. , vol.17 , Issue.11 , pp. 1557-1577
    • Sha-Q, B.1    Joshi, J.B.D.2    Bertino, E.3    Ghafoor, A.4
  • 27
    • 67349124845 scopus 로고    scopus 로고
    • Specification and enforcement of-exible security policy for active cooperation
    • Y. Q. Sun, X. Meng, B. Gong, Z. Lin, and E. Bertino, "Specification and enforcement of-exible security policy for active cooperation," Inf. Sci., vol. 179, no. 15, pp. 2629-2642, 2009
    • (2009) Inf. Sci. , vol.179 , Issue.15 , pp. 2629-2642
    • Sun, Y.Q.1    Meng, X.2    Gong, B.3    Lin, Z.4    Bertino, E.5
  • 28
    • 0031074857 scopus 로고
    • Fast planning through planning graph analysis
    • A. Blum and M. L. Furst, "Fast planning through planning graph analysis," Artif. Intell., vol. 90, nos. 1-2, pp. 281-300, 1995
    • (1995) Artif. Intell. , vol.90 , Issue.1-2 , pp. 281-300
    • Blum, A.1    Furst, M.L.2
  • 29
    • 0040258260 scopus 로고
    • Complexity results for planning
    • San Francisco, CA, USA
    • T. Bylander, "Complexity results for planning," in Proc. Int. Joint Conf. Artif. Intell., San Francisco, CA, USA, 1991, pp. 274-279
    • (1991) Proc. Int. Joint Conf. Artif. Intell , pp. 274-279
    • Bylander, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.