Citations (89)
Keep up to date with the latest research on this topic with citation updates for this article.
Articles from other publishers (89)
Jing Liang & Yan Gong. (2024) Security and privacy protection protocol based on edge computing in smart campus. Expert Systems.
Crossref
Crossref
Samia Oukemeni & Muslim Elkotob. (2023) Adaptative Access Management in 5G IoE using Device Fingerprinting: Discourse, Mechanisms, Challenges, and Opportunities. Adaptative Access Management in 5G IoE using Device Fingerprinting: Discourse, Mechanisms, Challenges, and Opportunities.
Rahma Trabelsi, Ghofrane Fersi & Mohamed Jmaiel. (2023) Access control in Internet of Things: A survey. Computers & Security 135, pages 103472.
Crossref
Crossref
Jesús García-Rodríguez & Antonio Skarmeta. (2023) A privacy-preserving attribute-based framework for IoT identity lifecycle management. Computer Networks 236, pages 110039.
Crossref
Crossref
Alian Yu, Jian Kang, Wei Jiang & Dan Lin. (2023) FACT: A Flexible Access Control Technique for Very Large Scale Public IoT Services. FACT: A Flexible Access Control Technique for Very Large Scale Public IoT Services.
Yepeng Ding & Hiroyuki Sato. (2022) Bloccess: Enabling Fine-Grained Access Control Based on Blockchain. Journal of Network and Systems Management 31:1.
Crossref
Crossref
S. Deepthi & Shrey Khandwekar. 2023. Applications and Techniques in Information Security. Applications and Techniques in Information Security
258
266
.
Sameeka Saini, Abhilasha Chauhan, Gesu Thakur & Luxmi Sapra. 2023. Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities. Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities
1
27
.
Himadri Nath Saha & Subhradip Debnath. 2022. Smart Healthcare System Design. Smart Healthcare System Design
143
165
.
Abid Khan, Awais Ahmad, Mansoor Ahmed, Jadran Sessa & Marco Anisetti. (2022) Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends. Complex & Intelligent Systems 8:5, pages 3919-3941.
Crossref
Crossref
Haifaa Ahmed Hasan, Hassan F. Al-Layla & Farah N. Ibraheem. (2022) A Review of Hash Function Types and their Applications. Wasit Journal of Computer and Mathematics Science 1:3, pages 75-88.
Crossref
Crossref
Sophie Dramé-Maigné, Maryline Laurent, Laurent Castillo & Hervé Ganem. (2021) Centralized, Distributed, and Everything in between. ACM Computing Surveys 54:7, pages 1-34.
Crossref
Crossref
Mohammad Amiri-Zarandi, Rozita A. Dara, Emily Duncan & Evan D. G. Fraser. (2022) Big Data Privacy in Smart Farming: A Review. Sustainability 14:15, pages 9120.
Crossref
Crossref
Hien Truong, José L. Hernández-Ramos, Juan A. Martinez, Jorge Bernal Bernabe, Wenting Li, Agustin Marin Frutos & Antonio Skarmeta. (2022) Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts. Security and Communication Networks 2022, pages 1-14.
Crossref
Crossref
Ahmad Khalil, Nader Mbarek & Olivier Togni. 2022. Intelligent Security Management and Control in the IoT. Intelligent Security Management and Control in the IoT
163
196
.
Jeonghwa Heo, Heewoong Jang & Heejo Lee. (2022) How to divide a permission token in the delegation process of blockchain-based access control for IoT. How to divide a permission token in the delegation process of blockchain-based access control for IoT.
Vidyadhar Jinnappa Aski, Vijaypal Singh Dhaka, Sunil Kumar, Sahil Verma & Danda B. Rawat. (2022) Advances on networked ehealth information access and sharing: Status, challenges and prospects. Computer Networks 204, pages 108687.
Crossref
Crossref
Naeem Firdous Syed, Syed W. Shah, Arash Shaghaghi, Adnan Anwar, Zubair Baig & Robin Doss. (2022) Zero Trust Architecture (ZTA): A Comprehensive Survey. IEEE Access 10, pages 57143-57179.
Crossref
Crossref
Haohui Wang, Xiubo Chen, Haseeb Ahmad, Gang Xu & Yixian Yang. 2022. Advances in Artificial Intelligence and Security. Advances in Artificial Intelligence and Security
119
133
.
Gustavo H. C. de Oliveira, Agnaldo de Souza Batista, Michele Nogueira & Aldri L. dos Santos. (2021) An access control for IoT based on network community perception and social trust against Sybil attacks. International Journal of Network Management 32:1.
Crossref
Crossref
Poonam N. Railkar, Parikshit Mahalle & Dr. Gitanjali Rahul Shinde. (2021) Rethinking Blockchain for Access Control in the Internet of Things. International Journal of Engineering and Advanced Technology 11:1, pages 99-108.
Crossref
Crossref
Said Daoudagh, Eda Marchetti, Vincenzo Savarino, Jorge Bernal Bernabe, Jesús García-Rodríguez, Rafael Torres Moreno, Juan Antonio Martinez & Antonio F. Skarmeta. (2021) Data Protection by Design in the Context of Smart Cities: A Consent and Access Control Proposal. Sensors 21:21, pages 7154.
Crossref
Crossref
Faiza Loukil, Chirine Ghedira-Guegan, Khouloud Boukadi, Aïcha-Nabila Benharkat & Elhadj Benkhelifa. (2021) Data Privacy Based on IoT Device Behavior Control Using Blockchain. ACM Transactions on Internet Technology 21:1, pages 1-20.
Crossref
Crossref
H Mostafaa, S M Eisaa, H H Issaa & N H Shaker. (2021) Lightweight Hybrid Encryption System with FPGA Design Proposal. IOP Conference Series: Materials Science and Engineering 1051:1, pages 012023.
Crossref
Crossref
Seyyed Keyvan Mousavi, Ali Ghaffari, Sina Besharat & Hamed Afshari. (2021) Security of internet of things based on cryptographic algorithms: a survey. Wireless Networks 27:2, pages 1515-1555.
Crossref
Crossref
Jose L. Hernandez-Ramos, Juan A. Martinez, Vincenzo Savarino, Marco Angelini, Vincenzo Napolitano, Antonio F. Skarmeta & Gianmarco Baldini. (2021) Security and Privacy in Internet of Things-Enabled Smart Cities: Challenges and Future Directions. IEEE Security & Privacy 19:1, pages 12-23.
Crossref
Crossref
Shantanu PalShantanu Pal. 2021. Internet of Things and Access Control. Internet of Things and Access Control
143
176
.
Shantanu PalShantanu Pal. 2021. Internet of Things and Access Control. Internet of Things and Access Control
103
122
.
Shantanu PalShantanu Pal. 2021. Internet of Things and Access Control. Internet of Things and Access Control
59
101
.
Shantanu PalShantanu Pal. 2021. Internet of Things and Access Control. Internet of Things and Access Control
1
12
.
Ashraf Alkhresheh, Khalid Elgazzar & Hossam S. Hassanein. (2020) DACIoT: Dynamic Access Control Framework for IoT Deployments. IEEE Internet of Things Journal 7:12, pages 11401-11419.
Crossref
Crossref
Jorge Sasiain, Ane Sanz, Jasone Astorga & Eduardo Jacob. (2020) Towards Flexible Integration of 5G and IIoT Technologies in Industry 4.0: A Practical Use Case. Applied Sciences 10:21, pages 7670.
Crossref
Crossref
Ahmad Kamran Malik, Naina Emmanuel, Sidra Zafar, Hasan Ali Khattak, Basit Raza, Sarmadullah Khan, Ali H. Al-Bayatti, Madini O. Alassafi, Ahmed S. Alfakeeh & Mohammad A. Alqarni. (2020) From Conventional to State-of-the-Art IoT Access Control Models. Electronics 9:10, pages 1693.
Crossref
Crossref
Nuray Baltaci Akhuseyinoglu & James Joshi. (2020) A constraint and risk-aware approach to attribute-based access control for cyber-physical systems. Computers & Security 96, pages 101802.
Crossref
Crossref
Yepeng Ding & Hiroyuki Sato. (2020) Bloccess: Towards Fine-Grained Access Control Using Blockchain in a Distributed Untrustworthy Environment. Bloccess: Towards Fine-Grained Access Control Using Blockchain in a Distributed Untrustworthy Environment.
Ronghua Xu, Yu Chen & Erik Blasch. 2020. Modeling and Design of Secure Internet of Things. Modeling and Design of Secure Internet of Things
505
528
.
Yu Liu, Kaiping Xue, Peixuan He, David S. L. Wei & Mohsen Guizani. (2020) An Efficient, Accountable, and Privacy-Preserving Access Control Scheme for Internet of Things in a Sharing Economy Environment. IEEE Internet of Things Journal 7:7, pages 6634-6646.
Crossref
Crossref
Otto Julio Ahlert Pinno, André Ricardo Abed Grégio & Luis C.E. De Bona. (2019) ControlChain: A new stage on the IoT access control authorization. Concurrency and Computation: Practice and Experience 32:12.
Crossref
Crossref
N Sivaselvan, Waqar Asif, Bhat K Vivekananda & Muttukrishnan Rajarajan. (2020) Authentication and Capability-based Access Control: An Integrated Approach for IoT Environment. Authentication and Capability-based Access Control: An Integrated Approach for IoT Environment.
Shantanu Pal, Tahiry Rabehaja, Michael Hitchens, Vijay Varadharajan & Ambrose Hill. (2020) On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain. IEEE Transactions on Industrial Informatics 16:5, pages 3521-3530.
Crossref
Crossref
Chang-Seop Park. (2020) Security Architecture for Secure Multicast CoAP Applications. IEEE Internet of Things Journal 7:4, pages 3441-3452.
Crossref
Crossref
Sara N. Matheu, Alberto Robles Enciso, Alejandro Molina Zarca, Dan Garcia-Carrillo, José Luis Hernández-Ramos, Jorge Bernal Bernabe & Antonio F. Skarmeta. (2020) Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems. Sensors 20:7, pages 1882.
Crossref
Crossref
Yi Jiang, Yong Shen & Qingyi Zhu. (2020) A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes. Sensors 20:5, pages 1357.
Crossref
Crossref
Angel Ruiz-Zafra & Roberto Magán-Carrión. 2020. Optimization and Learning. Optimization and Learning
195
205
.
Nabeela Hasan, Akshay Chamoli & Mansaf Alam. 2020. Internet of Things (IoT). Internet of Things (IoT)
219
231
.
Moez Krichen, Mariam Lahami, Omar Cheikhrouhou, Roobaea Alroobaea & Afef Jmal Maâlej. 2020. Smart Infrastructure and Applications. Smart Infrastructure and Applications
629
653
.
Rich Wolski, Chandra Krintz, Fatih Bakir, Gareth George & Wei-Tsung Lin. (2019) CSPOT. CSPOT.
Moez Krichen & Roobaea Alroobaea. (2019) Towards Optimizing the Placement of Security Testing Components for Internet of Things Architectures. Towards Optimizing the Placement of Security Testing Components for Internet of Things Architectures.
Roberto Girau, Raimondo Cossu, Massimo Farina, Virginia Pilloni & Luigi Atzori. (2019) Virtual User in the IoT: Definition, Technologies and Experiments. Sensors 19:20, pages 4489.
Crossref
Crossref
Tahiry Rabehaja, Shantanu Pal & Michael Hitchens. (2019) Design and implementation of a secure and flexible access-right delegation for resource constrained environments. Future Generation Computer Systems 99, pages 593-608.
Crossref
Crossref
Shantanu Pal, Michael Hitchens, Vijay Varadharajan & Tahiry Rabehaja. (2019) Policy-based access control for constrained healthcare resources in the context of the Internet of Things. Journal of Network and Computer Applications 139, pages 57-74.
Crossref
Crossref
Emmanuel Bertin, Dina Hussein, Cigdem Sengul & Vincent Frey. (2019) Access control in the Internet of Things: a survey of existing approaches and open research questions. Annals of Telecommunications 74:7-8, pages 375-388.
Crossref
Crossref
Rafael Marin-Perez, Iakovos Michailidis, Dan Garcia-Carrillo, Christos Korkas, Elias Kosmatopoulos & Antonio Skarmeta. (2019) PLUG-N-HARVEST Architecture for Secure and Intelligent Management of Near-Zero Energy Buildings. Sensors 19:4, pages 843.
Crossref
Crossref
Geovane Fedrecheski, Laisa Caroline Costa De Biase, Pablo C. Calcina-Ccori & Marcelo Knorich Zuffo. (2019) Attribute-Based Access Control for the Swarm With Distributed Policy Management. IEEE Transactions on Consumer Electronics 65:1, pages 90-98.
Crossref
Crossref
Mehdi Sookhak, Helen Tang, Ying He & F. Richard Yu. (2019) Security and Privacy of Smart Cities: A Survey, Research Issues and Challenges. IEEE Communications Surveys & Tutorials 21:2, pages 1718-1743.
Crossref
Crossref
Sara Nieves Matheu, Jose Luis Hernandez-Ramos, Salvador Perez & Antonio F. Skarmeta. (2019) Extending MUD Profiles Through an Automated IoT Security Testing Methodology. IEEE Access 7, pages 149444-149463.
Crossref
Crossref
Sheng Ding, Jin Cao, Chen Li, Kai Fan & Hui Li. (2019) A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 7, pages 38431-38441.
Crossref
Crossref
Hanan Aldowah, Shafiq Ul Rehman & Irfan Umar. 2019. Recent Trends in Data Science and Soft Computing. Recent Trends in Data Science and Soft Computing
396
405
.
Mikel Uriarte, Jasone Astorga, Eduardo Jacob, Maider Huarte & Oscar López. 2019. Cyber-Physical Systems: Architecture, Security and Application. Cyber-Physical Systems: Architecture, Security and Application
103
152
.
Antonio Skarmeta, José L. Hernández-Ramos & Juan A. Martinez. 2019. Internet of Things Security and Data Protection. Internet of Things Security and Data Protection
191
209
.
Ahmed F. Hussein, N. ArunKumar, Gustavo Ramirez-Gonzalez, Enas Abdulhay, João Manuel R.S. Tavares & Victor Hugo C. de Albuquerque. (2018) A medical records managing and securing blockchain based system supported by a Genetic Algorithm and Discrete Wavelet Transform. Cognitive Systems Research 52, pages 1-11.
Crossref
Crossref
Poonam N. Railkar, Parikshit N. Mahalle & Gitanjali R. Shinde. (2018) Access Control Schemes for Machine to Machine Communication in IoT: Comparative Analysis and Discussion. Access Control Schemes for Machine to Machine Communication in IoT: Comparative Analysis and Discussion.
Chang-Seop Park & Wang-Seok Park. (2018) A Group-Oriented DTLS Handshake for Secure IoT Applications. IEEE Transactions on Automation Science and Engineering 15:4, pages 1920-1929.
Crossref
Crossref
Shikha Chaudhry. (2018) An Encryption-based Secure Framework for Data Transmission in IoT. An Encryption-based Secure Framework for Data Transmission in IoT.
Ronghua Xu, Yu Chen, Erik Blasch & Genshe Chen. (2018) BlendCAC: A Smart Contract Enabled Decentralized Capability-Based Access Control Mechanism for the IoT. Computers 7:3, pages 39.
Crossref
Crossref
Ronghua Xu, Yu Chen, Erik Blasch & Genshe Chen. (2018) BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs. BlendCAC: A BLockchain-Enabled Decentralized Capability-Based Access Control for IoTs.
Lakshya Tandon, Philip W. L. Fong & Reihaneh Safavi-Naini. (2018) HCAP. HCAP.
Yu Chen, Ronghua Xu, Erik Blasch & Genshe Chen. (2018) A federated capability-based access control mechanism for Internet of Things (IoTs). A federated capability-based access control mechanism for Internet of Things (IoTs).
Bruhadeshwar Bezawada, Kyle Haefner & Indrakshi Ray. (2018) Securing Home IoT Environments with Attribute-Based Access Control. Securing Home IoT Environments with Attribute-Based Access Control.
Mikel Uriarte, Jasone Astorga, Eduardo Jacob, Maider Huarte & Manuel Carnerero. (2018) Expressive Policy-Based Access Control for Resource-Constrained Devices. IEEE Access 6, pages 15-46.
Crossref
Crossref
Pauline Sia Wen Shieng, Jack Jansen & Steven Pemberton. (2018) Fine-grained Access Control Framework for Igor, a Unified Access Solution to The Internet of Things. Procedia Computer Science 134, pages 385-392.
Crossref
Crossref
Shashank Khobragade, N. V. Narendra Kumar & R. K. Shyamasundar. 2018. Distributed Computing and Internet Technology. Distributed Computing and Internet Technology
86
104
.
Sumod Sundar & S. Sumathy. 2018. Cognitive Computing for Big Data Systems Over IoT. Cognitive Computing for Big Data Systems Over IoT
289
306
.
Shantanu Pal, Michael Hitchens & Vijay Varadharajan. (2017) On the design of security mechanisms for the Internet of Things. On the design of security mechanisms for the Internet of Things.
Otto Julio Ahlert Pinno, Andre Ricardo Abed Gregio & Luis C. E. De Bona. (2017) ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT. ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT.
Shantanu Pal, Michael Hitchens, Vijay Varadharajan & Tahiry Rabehaja. (2017) On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems. On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems.
Juan A Martínez, José L Hernández-Ramos, Victoria Beltrán, Antonio Skarmeta & Pedro M Ruiz. (2017) A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy. International Journal of Distributed Sensor Networks 13:8, pages 155014771772797.
Crossref
Crossref
V. Beltran, J. A. Martinez & A. F. Skarmeta. (2017) User-centric access control for efficient security in smart cities. User-centric access control for efficient security in smart cities.
V. Beltran, A. F. Skarmeta & P. M. Ruiz. (2017) An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT. Wireless Communications and Mobile Computing 2017, pages 1-13.
Crossref
Crossref
Saad El Jaouhari, Ahmed Bouabdallah & Jean-Marie Bonnin. 2017. Managing the Web of Things. Managing the Web of Things
389
424
.
Aafaf Ouaddah, Anas Abou Elkalam & Abdellah Ait Ouahman. 2017. Europe and MENA Cooperation Advances in Information and Communication Technologies. Europe and MENA Cooperation Advances in Information and Communication Technologies
523
533
.
Ichrak Amdouni, Fatma Hrizi, Anis Laouiti, Eduard Grasa & Hakima Chaouchi. (2016) Exploring the flexibility of network access control in the recursive InterNetwork Architecture. Exploring the flexibility of network access control in the recursive InterNetwork Architecture.
Jorge Bernal Bernabe, Jose Luis Hernandez Ramos & Antonio F. Skarmeta Gomez. (2015) TACIoT: multidimensional trust-aware access control system for the Internet of Things. Soft Computing 20:5, pages 1763-1779.
Crossref
Crossref
Jose L. Hernandez-Ramos, Dan Garcia Carrillo, Rafael Marin-Lopez & Antonio F. Skarmeta. (2015) Dynamic security credentials PANA-based provisioning for IoT smart objects. Dynamic security credentials PANA-based provisioning for IoT smart objects.
José Hernández-Ramos, Jorge Bernabe, M. Moreno & Antonio Skarmeta. (2015) Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things. Sensors 15:7, pages 15611-15639.
Crossref
Crossref
Jens-Matthias Bohli, Antonio Skarmeta, M. Victoria Moreno, Dan Garcia & Peter Langendorfer. (2015) SMARTIE project: Secure IoT data management for smart cities. SMARTIE project: Secure IoT data management for smart cities.
Jose L. Hernandez-Ramos, Marcin Piotr Pawlowski, Antonio J. Jara, Antonio F. Skarmeta & Latif Ladid. (2015) Toward a Lightweight Authentication and Authorization Framework for Smart Objects. IEEE Journal on Selected Areas in Communications 33:4, pages 690-702.
Crossref
Crossref
Jose L. Hernandez Ramos, Jorge Bernal Bernabe & Antonio F. Skarmeta. (2015) Managing Context Information for Adaptive Security in IoT Environments. Managing Context Information for Adaptive Security in IoT Environments.
Jorge Bernal Bernabe, Jose Luis Hernández, M. Victoria Moreno & Antonio F. Skarmeta Gomez. 2014. Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services
408
415
.