iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/CPE.5614
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,8]],"date-time":"2023-09-08T09:41:19Z","timestamp":1694166079915},"reference-count":21,"publisher":"Wiley","issue":"9","license":[{"start":{"date-parts":[[2019,12,30]],"date-time":"2019-12-30T00:00:00Z","timestamp":1577664000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB0801803"],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836203"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2020,5,10]]},"abstract":"Summary<\/jats:title>The publish\/subscribe paradigm provides loosely coupled and scalable communication for the Internet of Things (IoT). In this paradigm, access control is an efficient approach to guaranteeing security. However, existing access control methods are not suitable for the publish\/subscribe paradigm in the sensing layer of the IoT due to their coarse\u2010grained controls and lack of self\u2010configuration. To address these problems, in this paper, we propose a topic\u2010centric access control model (TCAC) to realize fine\u2010grained authorization for the sensing layer of the IoT. First, we use topics, a fundamental concept for the publish\/subscribe paradigm, as the basic access control unit to dynamically authorize access according to the attributes of devices, users, and topics. Second, an administration model for TCAC is proposed to manage these attributes and configure access policies to effectively implement user\u2010driven access controls. Finally, a healthcare case is used to demonstrate the security of the proposed TCAC. The results show that our model is dynamic, fine\u2010grained, and user driven.<\/jats:p>","DOI":"10.1002\/cpe.5614","type":"journal-article","created":{"date-parts":[[2019,12,30]],"date-time":"2019-12-30T10:31:58Z","timestamp":1577701918000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A topic\u2010centric access control model for the publish\/subscribe paradigm"],"prefix":"10.1002","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8971-7360","authenticated-orcid":false,"given":"Rongna","family":"Xie","sequence":"first","affiliation":[{"name":"School of Cyber Engineering Xidian University Xi'an China"}]},{"given":"Guozhen","family":"Shi","sequence":"additional","affiliation":[{"name":"Beijing Electronic Science and Technology Institute Beijing China"}]},{"given":"Yunchuan","family":"Guo","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering CAS Beijing China"}]},{"given":"Fenghua","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Engineering Xidian University Xi'an China"},{"name":"Institute of Information Engineering CAS Beijing China"}]}],"member":"311","published-online":{"date-parts":[[2019,12,30]]},"reference":[{"key":"e_1_2_9_2_1","unstructured":"TorchiaM ShirerM.IDC forecasts worldwide spending on the Internet of Things.2019."},{"key":"e_1_2_9_3_1","unstructured":"PesonenLIW EyersDM BaconJ.A capability\u2010based access control architecture for multi\u2010domain publish\/subscribe systems. In: Proceedings of the International Symposium on Applications and the Internet (SAINT'06);2008;Phoenix AZ."},{"issue":"2","key":"e_1_2_9_4_1","first-page":"57","article-title":"Access control in decentralised publish\/subscribe systems","volume":"2","author":"Pesonen LIW","year":"2007","journal-title":"J Netw"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18681-8_2"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080416"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.6.4.724-731"},{"key":"e_1_2_9_8_1","first-page":"1","article-title":"Efficient and confidentiality\u2010preserving content\u2010based publish\/subscribe with prefiltering","volume":"99","author":"Barazzutti R","year":"2017","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"e_1_2_9_9_1","unstructured":"MalerE ErdtmanS WahlstroemE TschofenigH.Authentication and authorization for constrained environments using OAuth and UMA.1997."},{"key":"e_1_2_9_10_1","doi-asserted-by":"crossref","unstructured":"RiveraD Cruz\u2010PirisL Lopez\u2010CiveraG de laHozE Marsa\u2010MaestreI.Applying an unified access control for IoT\u2010based intelligent agent systems. In: Proceedings of the IEEE International Conference on Service\u2010Oriented Computing and Applications;2015;Rome Italy.","DOI":"10.1109\/SOCA.2015.40"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33124-9_11"},{"key":"e_1_2_9_12_1","first-page":"1","article-title":"RAAC: robust and auditable access control with multiple attribute authorities for public cloud storage","volume":"99","author":"Xue K","year":"2017","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"e_1_2_9_14_1","doi-asserted-by":"crossref","unstructured":"ServosD OsbornSL.HGABAC: towards a formal model of hierarchical attribute\u2010based access control. In: Proceedings of the International Symposium on Foundations and Practice of Security;2014;Montreal Canada.","DOI":"10.1007\/978-3-319-17040-4_12"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46298-1_21"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108906.1108908"},{"key":"e_1_2_9_17_1","doi-asserted-by":"crossref","unstructured":"ParkJ SandhuR.Towards usage control models: beyond traditional access control. In: Proceedings of the ACM Symposium on Access Control MODELS and Technologies;2002;Monterey CA.","DOI":"10.1145\/507711.507722"},{"key":"e_1_2_9_18_1","volume-title":"Usage Control: A Unified Framework for Next Generation Access Control","author":"Park J","year":"2003"},{"key":"e_1_2_9_19_1","first-page":"309","article-title":"Identity authentication and capability based access control (IACAC) for the Internet of Things","volume":"1","author":"Mahalle PN","year":"2013","journal-title":"J Cyber Secur Mobil"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.006"},{"key":"e_1_2_9_21_1","doi-asserted-by":"crossref","unstructured":"ZhangY DuanL SunCA ChengB ChenJ.A cross\u2010layer security solution for publish\/subscribe\u2010based IoT services communication infrastructure. In: Proceedings of the IEEE International Conference on Web Services;2017;Honolulu HI.","DOI":"10.1109\/ICWS.2017.68"},{"key":"e_1_2_9_22_1","unstructured":"MalerE CatalanoD MachulakM HardjonoT.User\u2010managed access (UMA) profile of OAuth 2.0.2015."}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.5614","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5614","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.5614","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.5614","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T08:48:00Z","timestamp":1694076480000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.5614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,30]]},"references-count":21,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020,5,10]]}},"alternative-id":["10.1002\/cpe.5614"],"URL":"http:\/\/dx.doi.org\/10.1002\/cpe.5614","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,30]]},"assertion":[{"value":"2018-07-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}