[1] |
JIN J , GUBBI J , MARUSIC S ,et al. An information framework for creating a smart city through Internet of things[J]. IEEE Internet of Things Journal, 2016,1(2): 112-121.
|
[2] |
MC-KINLAY P . Make way for smart cities:opportunities,challenges and capacities of New Zealand local governments[J]. Asia Pacific Journal of Public Administration, 2017,39(4): 297-303.
|
[3] |
SANDHU R S , COYNE E J , FEINSTEIN H L ,et al. Role-based access control models[J]. Computer, 1996,29(2): 38-47.
|
[4] |
ZHANG G , TIAN J . An extended role based access control model for the Internet of things[C]// 2010 International Conference on Information Networking and Automation (ICINA). 2010: 319-323.
|
[5] |
FU Y , YE C . Using XACML to define access control policy in information system[C]// IET Conference on Wireless,Mobile and Sensor Networks (CCWMSN 17). 2017: 676-679.
|
[6] |
LI N , WINSBOROUGH W H , MITCHELL J C . Distributed credential chain discovery in trust management:extended abstract[C]// ACM Conference on Computer and Communications Security. 2016: 156-165.
|
[7] |
KOLEV A , ?OBANOV S , . Trustbac—integrating trust relationships into the rbac model for access control in open systems[C]// ACM Symposium on Access Control Models and Technologies. 2016: 49-58.
|
[8] |
翟征德, 冯登国, 徐震 . 细粒度的基于信任度的可控委托授权模型[J]. 软件学报, 2017,18(8).
|
|
ZHAI Z D , FENG D G , XU Z . Fine-grained controllable delegation authorization model based on trustworthiness[J]. Journal of Software, 2017,18(8).
|
[9] |
YU J , WANG G , MU Y ,et al. An efficient generic framework for three-factor authentication with provably secure instantiation[J]. IEEE Transactions on Information Forensics and Security, 2016,9(12): 2302-2313.
|
[10] |
XUE K , MA C , HONG P ,et al. A temporal credential based mutual authentication and key agreement scheme for wireless sensor networks[J]. Journal of Network and Computer Applications, 2017,36(1): 316-323.
|
[11] |
JIANG Q , MA J , LU X ,et al. An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks[J]. Peer-to-Peer Networking and Applications, 2016,8(6): 1070-1081.
|