-
1
-
-
84883725153
-
-
Low power link layer security for IoT: Implementation and performance analysis. In Proceedings of International Wireless Communications and Mobile Computing Conference (IWCMC)
-
Altolini, D., Lakkundi, V., Bui, N., Tapparello, C., Rossi, M. (2013). Low power link layer security for IoT: Implementation and performance analysis. In Proceedings of International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 919–925.
-
(2013)
, pp. 919-925
-
-
Altolini, D.1
Lakkundi, V.2
Bui, N.3
Tapparello, C.4
Rossi, M.5
-
2
-
-
84962781973
-
-
Access control for multi-tenancy in cloud-based health information systems. In Proceedings of IEEE International Conference on Cyber Security and Cloud Computing
-
Anwar, M., Imran, A. (2015). Access control for multi-tenancy in cloud-based health information systems. In Proceedings of IEEE International Conference on Cyber Security and Cloud Computing, pp. 104–110.
-
(2015)
, pp. 104-110
-
-
Anwar, M.1
Imran, A.2
-
4
-
-
77956877124
-
The internet of things: A survey
-
Atzori, L., Iera, A., Morabito, G., The internet of things: A survey. Comput Network 54:15 (2010), 2787–2805.
-
(2010)
Comput Network
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
5
-
-
79960904737
-
-
Proposed embedded security framework for internet of things (iot). In Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, Chennai, India
-
Babar, S., Stango, A., Prasad, N., Sen, J., Prasad, R. (2011). Proposed embedded security framework for internet of things (iot). In Proceedings of the 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology, Wireless VITAE 2011, Chennai, India, pp. 1 – 5.
-
(2011)
, pp. 1-5
-
-
Babar, S.1
Stango, A.2
Prasad, N.3
Sen, J.4
Prasad, R.5
-
6
-
-
79960321206
-
-
A survey of middleware for internet of things. In In WiMo 2011 and CoNeCo 2011, Ankara, Turkey
-
Bandyopadhyay, S., Sengupta, M., Maiti, S., Dutta, S. (2011). A survey of middleware for internet of things. In In Proceedings of the Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey, pp. 288–296.
-
(2011)
Proceedings of the Third International Conferences
, pp. 288-296
-
-
Bandyopadhyay, S.1
Sengupta, M.2
Maiti, S.3
Dutta, S.4
-
7
-
-
85162466379
-
-
Towards the definition of a framework for service development in the agrofood domain: A conceptual model. In WEBIST 2012, Porto, Portugal.
-
Barbagallo, D., Cappiello, C., Coen-Porisini, A., Colombo, P., Comerio, M., Paoli, F.D., Francalanci, C., Sicari, S. (2012). Towards the definition of a framework for service development in the agrofood domain: A conceptual model. In WEBIST 2012, Porto, Portugal.
-
(2012)
-
-
Barbagallo, D.1
Cappiello, C.2
Coen-Porisini, A.3
Colombo, P.4
Comerio, M.5
Paoli, F.D.6
Francalanci, C.7
Sicari, S.8
-
8
-
-
79960586120
-
-
Peace: An efficient and secure patient-centric access control scheme for ehealth care system. In Proceedings of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
-
Barua, M., Liang, X., Lu, R., Shen, X. (2011). Peace: An efficient and secure patient-centric access control scheme for ehealth care system. In Proceedings of IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 970–975.
-
(2011)
, pp. 970-975
-
-
Barua, M.1
Liang, X.2
Lu, R.3
Shen, X.4
-
9
-
-
84891569276
-
M2M communications: A systems approach
-
1st Edition Wiley Publishing New York, USA
-
Boswarthick, D., Elloumi, O., Hersent, O., M2M communications: A systems approach. 1st Edition, 2012, Wiley Publishing, New York, USA.
-
(2012)
-
-
Boswarthick, D.1
Elloumi, O.2
Hersent, O.3
-
10
-
-
84961620802
-
An iot-aware architecture for smart healthcare systems
-
Catarinucci, L., de Donno, D., Mainetti, L., Palano, L., Patrono, L., Stefanizzi, M.L., Tarricone, L., An iot-aware architecture for smart healthcare systems. IEEE Internet of Things Journal 2:6 (2015), 515–526.
-
(2015)
IEEE Internet of Things Journal
, vol.2
, Issue.6
, pp. 515-526
-
-
Catarinucci, L.1
de Donno, D.2
Mainetti, L.3
Palano, L.4
Patrono, L.5
Stefanizzi, M.L.6
Tarricone, L.7
-
11
-
-
84866914974
-
-
Challenges in middleware solutions for the internet of things. In 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO
-
Chaqfeh, M.A., Mohamed, N. (2012). Challenges in middleware solutions for the internet of things. In 2012 International Conference on Collaboration Technologies and Systems (CTS), Denver, CO, pp. 21–26.
-
(2012)
, pp. 21-26
-
-
Chaqfeh, M.A.1
Mohamed, N.2
-
12
-
-
85103229175
-
-
Privacy aware systems: from models to patterns. igi global Edition.
-
Coen Porisini, A., Colombo, P., Sicari, S. (2011). Privacy aware systems: from models to patterns. igi global Edition.
-
(2011)
-
-
Coen Porisini, A.1
Colombo, P.2
Sicari, S.3
-
13
-
-
84875268254
-
-
Hipolds: A hierarchical security policy language for distributed systems. Information Security Technical Report 17 (3).
-
Dell'Amico, M., Serme, M.S.I.G., de Oliveira, A.S., Roudier, Y. (2013). Hipolds: A hierarchical security policy language for distributed systems. Information Security Technical Report 17 (3) pp. 81–92.
-
(2013)
, pp. 81-92
-
-
Dell'Amico, M.1
Serme, M.S.I.G.2
de Oliveira, A.S.3
Roudier, Y.4
-
14
-
-
84858738793
-
-
Access control for healthcare data using extended xacml-srbac model. In Proceedings of International Conference on Computer Communication and Informatics
-
El-Aziz, A.A.A., Kannan, A. (2012). Access control for healthcare data using extended xacml-srbac model. In Proceedings of International Conference on Computer Communication and Informatics, pp. 1–4.
-
(2012)
, pp. 1-4
-
-
El-Aziz, A.A.A.1
Kannan, A.2
-
15
-
-
79960590167
-
M2M: The Internet of 50 billion devices
-
Emmerson, B., M2M: The Internet of 50 billion devices. Huawei Win-Win Magazine Journal 4 (2010), 19–22.
-
(2010)
Huawei Win-Win Magazine Journal
, vol.4
, pp. 19-22
-
-
Emmerson, B.1
-
16
-
-
79954593491
-
-
The policy machine: A novel architecture and framework for access control policy specification and enforcement. Journal of Systems Architecture 57 (4).
-
Ferraiolo, D., Atluri, V. and Gavrila, S. (2011). The policy machine: A novel architecture and framework for access control policy specification and enforcement. Journal of Systems Architecture 57 (4) pp. 412–424.
-
(2011)
, pp. 412-424
-
-
Ferraiolo, D.1
Atluri, V.2
Gavrila, S.3
-
17
-
-
34547273527
-
-
Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Goyal, V., Pandey, O., Sahai, A., Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98.
-
(2006)
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
18
-
-
84891583935
-
The internet of things: Key applications and protocols
-
2nd Edition Wiley Publishing New York, USA
-
Hersent, O., Boswarthick, D., Elloumi, O., The internet of things: Key applications and protocols. 2nd Edition, 2012, Wiley Publishing, New York, USA.
-
(2012)
-
-
Hersent, O.1
Boswarthick, D.2
Elloumi, O.3
-
19
-
-
84946921719
-
The internet of things for health care: A comprehensive survey
-
Islam, S.M.R., Kwak, D., Kabir, M.H., Hossain, M., Kwak, K.S., The internet of things for health care: A comprehensive survey. IEEE Access 3 (2015), 678–708, 10.1109/ACCESS.2015.2437951.
-
(2015)
IEEE Access
, vol.3
, pp. 678-708
-
-
Islam, S.M.R.1
Kwak, D.2
Kabir, M.H.3
Hossain, M.4
Kwak, K.S.5
-
20
-
-
84957922466
-
-
Fine-grained access control to medical records in digital healthcare enterprises. In Computers and Communications (ISNCC)
-
Khan, M.F.F., Sakamura, K. (2015). Fine-grained access control to medical records in digital healthcare enterprises. In Proceedings of International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6.
-
(2015)
Proceedings of International Symposium on Networks
, pp. 1-6
-
-
Khan, M.F.F.1
Sakamura, K.2
-
21
-
-
84974603425
-
The internet of things in healthcare: Potential applications and challenges
-
Laplante, P.A., Laplante, N., The internet of things in healthcare: Potential applications and challenges. IT Professional 18:3 (2016), 2–4.
-
(2016)
IT Professional
, vol.18
, Issue.3
, pp. 2-4
-
-
Laplante, P.A.1
Laplante, N.2
-
22
-
-
84861997111
-
Survey internet of things: Vision, applications and research challenges
-
Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I., Survey internet of things: Vision, applications and research challenges. Ad Hoc Network 10:7 (2012), 1497–1516.
-
(2012)
Ad Hoc Network
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
23
-
-
85103229108
-
-
Enforcement of security policy rules for the internet of things. In Proceedings of IEEE WiMob, Larnaca, Cyprus
-
Neisse, R., Steri, G., Baldini, G. (2014). Enforcement of security policy rules for the internet of things. In Proceedings of IEEE WiMob, Larnaca, Cyprus, pp. 120–127.
-
(2014)
, pp. 120-127
-
-
Neisse, R.1
Steri, G.2
Baldini, G.3
-
24
-
-
34548016110
-
-
Privacy-aware role based access control. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, ACM, New York, USA.
-
Ni, Q., Trombetta, A., Bertino, E., Lobo, J. (2007). Privacy-aware role based access control. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, ACM, New York, USA.
-
(2007)
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
25
-
-
84881312915
-
Standardized protocol stack for the internet of (important) things
-
Palattella, M., Accettura, N., Vilajosana, X., Watteyne, T., Grieco, L., Boggia, G., Dohler, M., Standardized protocol stack for the internet of (important) things. IEEE Communications Surveys Tutorials 15:3 (2013), 1389–1406.
-
(2013)
IEEE Communications Surveys Tutorials
, vol.15
, Issue.3
, pp. 1389-1406
-
-
Palattella, M.1
Accettura, N.2
Vilajosana, X.3
Watteyne, T.4
Grieco, L.5
Boggia, G.6
Dohler, M.7
-
26
-
-
84991325371
-
Hybrid cryptographic access control for cloud-based ehr systems
-
Premarathne, U., Abuadbba, A., Alabdulatif, A., Khalil, I., Tari, Z., Zomaya, A., Buyya, R., Hybrid cryptographic access control for cloud-based ehr systems. IEEE Cloud Computing 3:4 (2016), 58–64.
-
(2016)
IEEE Cloud Computing
, vol.3
, Issue.4
, pp. 58-64
-
-
Premarathne, U.1
Abuadbba, A.2
Alabdulatif, A.3
Khalil, I.4
Tari, Z.5
Zomaya, A.6
Buyya, R.7
-
27
-
-
85006339796
-
-
An attribute based access control scheme for secure sharing of electronic health records. In Proceedings of IEEE International Conference on e-Health Networking, Applications and Services (Healthcom)
-
Pussewalage, H.S.G., Oleshchuk, V.A. (2016). An attribute based access control scheme for secure sharing of electronic health records. In Proceedings of IEEE International Conference on e-Health Networking, Applications and Services (Healthcom), pp. 1–6. http://dx.doi.org/10.1109/HealthCom.2016.7749516.
-
(2016)
, pp. 1-6
-
-
Pussewalage, H.S.G.1
Oleshchuk, V.A.2
-
28
-
-
58049196928
-
A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources
-
Rao, J., Sardinha, A., Sadeh, N., A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources. Web Semantics: Science, Services and Agents on the World Wide Web 7:1 (2009), 40–56.
-
(2009)
Web Semantics: Science, Services and Agents on the World Wide Web
, vol.7
, Issue.1
, pp. 40-56
-
-
Rao, J.1
Sardinha, A.2
Sadeh, N.3
-
29
-
-
84879225866
-
On the features and challenges of security and privacy in distributed internet of things
-
Roman, R., Zhou, J., Lopez, J., On the features and challenges of security and privacy in distributed internet of things. Computer Networks 57:10 (2013), 2266–2279.
-
(2013)
Computer Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
30
-
-
80755190141
-
Dydap: A dynamic data aggregation scheme for privacy aware wireless sensor networks
-
Sicari, S., Grieco, L.A., Boggia, G., Coen-Porsini, A., Dydap: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software 88:1 (2012), 152–166.
-
(2012)
Journal of Systems and Software
, vol.88
, Issue.1
, pp. 152-166
-
-
Sicari, S.1
Grieco, L.A.2
Boggia, G.3
Coen-Porsini, A.4
-
31
-
-
84919372488
-
Security, privacy and trust in internet of things: The road ahead
-
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A., Security, privacy and trust in internet of things: The road ahead. Computer Networks 76 (2015), 146–164.
-
(2015)
Computer Networks
, vol.76
, pp. 146-164
-
-
Sicari, S.1
Rizzardi, A.2
Grieco, L.A.3
Coen-Porisini, A.4
-
32
-
-
84960156424
-
A secure and quality-aware prototypical architecture for the Internet of Things
-
Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A., A secure and quality-aware prototypical architecture for the Internet of Things. Information Systems 58 (2016), 43–55.
-
(2016)
Information Systems
, vol.58
, pp. 43-55
-
-
Sicari, S.1
Rizzardi, A.2
Miorandi, D.3
Cappiello, C.4
Coen-Porisini, A.5
-
33
-
-
84982221118
-
Security policy enforcement for networked smart objects
-
Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A., Security policy enforcement for networked smart objects. Computer Networks 108 (2016), 133–147.
-
(2016)
Computer Networks
, vol.108
, pp. 133-147
-
-
Sicari, S.1
Rizzardi, A.2
Miorandi, D.3
Cappiello, C.4
Coen-Porisini, A.5
-
34
-
-
84884208871
-
-
Dare: evaluating data accuracy using node reputation, Elsevier Computer Networks 57, (15)
-
Sicari, S., Coen-Porisini, A., Riggio, R. (2013). Dare: evaluating data accuracy using node reputation, Elsevier Computer Networks 57, (15), pp. 3098–3111.
-
(2013)
, pp. 3098-3111
-
-
Sicari, S.1
Coen-Porisini, A.2
Riggio, R.3
-
35
-
-
84891684101
-
-
SETA: A secure sharing of tasks in clustered wireless sensor networks. In Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2013, Lyon, France
-
Sicari, S., Grieco, L., Rizzardi, A., Boggia, G., Coen-Porisini, A. (2013). SETA: A secure sharing of tasks in clustered wireless sensor networks. In Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2013, Lyon, France, pp. 239–246.
-
(2013)
, pp. 239-246
-
-
Sicari, S.1
Grieco, L.2
Rizzardi, A.3
Boggia, G.4
Coen-Porisini, A.5
-
36
-
-
85103229149
-
-
Privacy and Trust Management in the Internet of Things era- SePriT, 11th Edition, Special Issue of Ad Hoc networks, Elsevier.
-
Sicari, S., Hailes, S., Turgut, D., Sharaffedine, S., Desai, D.U. (2013). Privacy and Trust Management in the Internet of Things era- SePriT, 11th Edition, Special Issue of Ad Hoc networks, Elsevier.
-
(2013)
-
-
Sicari, S.1
Hailes, S.2
Turgut, D.3
Sharaffedine, S.4
Desai, D.U.5
-
37
-
-
84917690758
-
-
A NFP model for internet of things applications. In Proceedings of the 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, Larnaca, Cyprus
-
Sicari, S., Rizzardi, A., Coen-Porisini, A., Cappiello, C. (2014). A NFP model for internet of things applications. In Proceedings of the 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), IEEE, Larnaca, Cyprus, pp. 265–272.
-
(2014)
, pp. 265-272
-
-
Sicari, S.1
Rizzardi, A.2
Coen-Porisini, A.3
Cappiello, C.4
-
38
-
-
84961805878
-
-
Secure om2m service platform. In Proceedings of IEEE International Conference on Autonomic Computing (ICAC)
-
Sicari, S., Rizzardi, A., Coen-Porisini, A., Grieco, L.A., Monteil, T. (2015). Secure om2m service platform. In Proceedings of IEEE International Conference on Autonomic Computing (ICAC), pp. 313–318.
-
(2015)
, pp. 313-318
-
-
Sicari, S.1
Rizzardi, A.2
Coen-Porisini, A.3
Grieco, L.A.4
Monteil, T.5
-
39
-
-
84974578142
-
-
Effective ways to use Internet of Things in the field of medical and smart health care. In Proceedings of IEEE International Conference on Intelligent Systems Engineering (ICISE)
-
Ullah, K., Shah, M.A., Zhang, S. (2016). Effective ways to use Internet of Things in the field of medical and smart health care. In Proceedings of IEEE International Conference on Intelligent Systems Engineering (ICISE), pp. 372–379.
-
(2016)
, pp. 372-379
-
-
Ullah, K.1
Shah, M.A.2
Zhang, S.3
-
40
-
-
84863085349
-
Decision-cache based XACML authorisation and anonymisation for XML documents
-
Ulltveit-Moe, N., Oleshchuk, V., Decision-cache based XACML authorisation and anonymisation for XML documents. Computer Standards Interfaces 34:6 (2012), 527–534.
-
(2012)
Computer Standards Interfaces
, vol.34
, Issue.6
, pp. 527-534
-
-
Ulltveit-Moe, N.1
Oleshchuk, V.2
-
41
-
-
74949143896
-
Internet of things - new security and privacy challenges
-
Weber, R.H., Internet of things - new security and privacy challenges. Computer Law Security Review 26:1 (2010), 23–30.
-
(2010)
Computer Law Security Review
, vol.26
, Issue.1
, pp. 23-30
-
-
Weber, R.H.1
-
42
-
-
79955663408
-
An innovative simulation environment for cross-domain policy enforcement
-
Wu, Z., Wang, L., An innovative simulation environment for cross-domain policy enforcement. Simulation Modelling Practice and Theory 19:7 (2011), 1558–1583.
-
(2011)
Simulation Modelling Practice and Theory
, vol.19
, Issue.7
, pp. 1558-1583
-
-
Wu, Z.1
Wang, L.2
-
43
-
-
84900834753
-
Ubiquitous data accessing method in iot-based information system for emergency medical services
-
Xu, B., Xu, L.D., Cai, H., Xie, C., Hu, J., Bu, F., Ubiquitous data accessing method in iot-based information system for emergency medical services. IEEE Transactions on Industrial Informatics 10:2 (2014), 1578–1586.
-
(2014)
IEEE Transactions on Industrial Informatics
, vol.10
, Issue.2
, pp. 1578-1586
-
-
Xu, B.1
Xu, L.D.2
Cai, H.3
Xie, C.4
Hu, J.5
Bu, F.6
-
44
-
-
84901427258
-
A survey on trust management for internet of things
-
Yan, Z., Zhang, P., Vasilakos, A.V., A survey on trust management for internet of things. Journal of Network and Computer Applications 42:0 (2014), 120–134.
-
(2014)
Journal of Network and Computer Applications
, vol.42
, pp. 120-134
-
-
Yan, Z.1
Zhang, P.2
Vasilakos, A.V.3
-
45
-
-
85009412677
-
The internet of things in healthcare: An overview
-
YIN, Y., Zeng, Y., Chen, X., Fan, Y., The internet of things in healthcare: An overview. Journal of Industrial Information Integration 1 (2016), 3–13.
-
(2016)
Journal of Industrial Information Integration
, vol.1
, pp. 3-13
-
-
YIN, Y.1
Zeng, Y.2
Chen, X.3
Fan, Y.4
|