1 |
Rolf H. Weber,"Internet of Things-New security and privacy challenges," Computer Law & Security Review, Volume 26, Issue 1, pp. 23-30, Jan. 2010.
DOI
ScienceOn
|
2 |
S. Gusmeroli, S. Piccione, and D. Rotondi, "IoT access control issues: a capability based approach," IMIS-2012, pp.787-792, July 2012.
|
3 |
Gi-hyen Kim, Access Control Technology Overview, Korea Information Security Agency, June 2011.
|
4 |
L.J.Janczewski and A.M.Colarik, Cyber Warfare and Cyber Terrorism, IGI Global, Hershey,PA, pp.318-326, Sept. 2008.
|
5 |
Pierangela Samarati, Sabrina de Capitani di Vimercati, "Access Control: Policies, Models, and Mechanisms, Foundations of Security Analysis and Design," FOSAD 2000, LNCS 2171, pp.137-196, 2001.
|
6 |
C.P.Pfleeger, Security in Computing, Prentice-Hall, Inc., New Jersey, 1997.
|
7 |
Ministry of Public Administration and Security Department of personal information protection, A homepage privacy exposure protect guide-line, July 2012.
|
8 |
Sergio Gusmeroli, Salvatore Piccione, and Domenico Rotondi, "A capability-based security approach to manage access control in the Internet of Things," Mathematical and Computer Modelling 58, pp.1189-1205, Sept. 2013.
DOI
|
9 |
M. Miller, Ka-Ping Yee, and J. Shapiro, "Capability Myths Demolished," Tech.Report SRL 2003-02, Johns Hopkins University, 2003.
|
10 |
L. Fang, D. Gannon, and F. Siebenlist, "XPOLA-an extensible capability based authorization infrastructure for grids," 4th Annual PKI R&D Workshop, pp. 30-40, Apr. 2005.
|