The Access Control Platform of the IoT Service Using the CapSG |
Kim, Jin-Bo
(목포대학교 정보보호기술학협동과정)
Jang, Deresa (목포대학교 정보보호기술학협동과정) Kim, Mi-Sun (목포대학교 정보보호학과) Seo, Jae-Hyun (목포대학교 정보보호학과) |
1 | L Sancheza, L Munoza, Jose Antonio Galachea, P Sotresa, J R. Santanaa, V Gutierreza, R Ramdhanyb, A Gluhakc, S Krcod, E Theodoridise, and D Pfistererf, "SmartSantander: IoT experimentation over a smart city testbed," Computer Networks, Vol.61, pp.217-238, 2014. DOI |
2 | L Atzoria, A Ierab, and G Morabito, "The internet of things: A survey," Computer Networks, Vol. 4, Issue.15, pp.2787-2805, 2010. |
3 | Rolf H. Weber, "Internet of Things-New security and privacy challenges," Computer Law & Security Review, Vol. 26, Issue.1, pp.23-30, 2010. DOI ScienceOn |
4 | S. Gusmeroli, S. Piccione, and D. Rotondi, "IoT access control issues: a capability based approach," IMIS-2012, pp.787-792, 2012. |
5 | Bum-Ki Lee, Mi-Sun Kim, and Jae-Hyun Seo, "Design and Implementation of The Capability Token based Access Control System in the Internet of Things," Journal of The Korea Institute of Information Security & Cryptology, Vol.25, No.2, pp.439-448, 2015. DOI |
6 | Romuald Thion, "Access Control Models," in Cyber Warfare and Cyber Terrorism, Hershey, pp.318-326, 2008. |
7 | Pierangela Samarati and Sabrina De Capitani di Vimercati, "Access Control: Policies, Models, and Mechanisms," in Foundations of Security Analysis and Design, pp.137-196, 2001. |
8 | Chao Lee, Yunchuan Guo, and Lihua Yin, "A Location Temporal based Access Control Model for IoTs," AASRI Procedia, Vol.5, pp.15-20, 2013. DOI |
9 | Sergio Gusmeroli, Salvatore Piccione, and Domenico Rotondi, "A capability-based security approach to manage access control in the Internet of Things," Mathematical and Computer Modelling, Vol.58, pp.1189-1205, 2013. DOI |
10 | Jose L. Hernandez-Ramos, Antonio J. Jara, Leandro Marin, and Antonio F. Skarmetal, "Distributed Capabilitybased Access Control for the Internet of Things," Journal of Internet Services and Information Security, Vol.3, Num.3/4, pp.1-16, 2013. DOI |
11 | L. Fang, D. Gannon, and F. Siebenlist, "XPOLA-an extensible capability based authorization infrastructure for grids," 4th Annual PKI R&D Workshop, pp.30-40, 2005. |
12 | Mark S. Miller, Ka-Ping Yee, and J. Shapiro, "Capability Myths Demolished," Systems Research Laboratory, Johns Hopkins University, Tech.Report SRL 2003-02, 2003. |