Security, privacy and trust in Internet of Things: The road ahead
Top Cited Papers
- 1 January 2015
- journal article
- Published by Elsevier BV in Computer Networks
- Vol. 76, 146-164
- https://doi.org/10.1016/j.comnet.2014.11.008
Abstract
No abstract availableKeywords
This publication has 100 references indexed in Scilit:
- A WSN-Oriented Key Agreement Protocol in Internet of ThingsApplied Mechanics and Materials, 2013
- Research on social relations cognitive model of mobile nodes in Internet of ThingsJournal of Network and Computer Applications, 2013
- An overview of the internet of underwater thingsJournal of Network and Computer Applications, 2012
- An integrated scheme based on service classification in pervasive mobile servicesInternational Journal of Communication Systems, 2012
- Formal enforcement of security policies on concurrent systemsJournal of Symbolic Computation, 2011
- A framework to enforce access control over data streamsACM Transactions on Information and System Security, 2010
- Continuous authentication on relational streamsThe VLDB Journal, 2009
- A meta-control architecture for orchestrating policy enforcement across heterogeneous information sourcesJournal of Web Semantics, 2009
- Aurora: a new model and architecture for data stream managementThe VLDB Journal, 2003
- Role-based access control modelsComputer, 1996