[1] |
Ericsson. Erisson mobility report[R]. 2021.
|
[2] |
周悦芝, 张迪 . 近端云计算:后云计算时代的机遇与挑战[J]. 计算机学报, 2019,42(4): 677-700.
|
|
ZHOU Y Z , ZHANG D . Near-end cloud computing:opportunities and challenges in the post-cloud computing era[J]. Chinese Journal of Computers, 2019,42(4): 677-700.
|
[3] |
邱宇, 王持, 齐开悦 ,等. 智慧健康研究综述:从云端到边缘的系统[J]. 计算机研究与发展, 2020,57(1): 53-73.
|
|
QIU Y , WANG C , QI K Y ,et al. A survey of smart health:system de-sign from the cloud to the edge[J]. Journal of Computer Research and Development, 2020,57(1): 53-73.
|
[4] |
THAKARE A , LEE E , KUMAR A ,et al. PARBAC:priority-attribute-based RBAC model for azure IoT cloud[J]. IEEE Internet of Things Journal, 2020,7(4): 2890-2900.
|
[5] |
杜瑞忠, 刘妍, 田俊峰 . 物联网中基于智能合约的访问控制方法[J]. 计算机研究与发展, 2019,56(10): 2287-2298.
|
|
DU R Z , LIU Y , TIAN J F . An access control method using smart con-tract for Internet of Things[J]. Journal of Computer Research and De-velopment, 2019,56(10): 2287-2298.
|
[6] |
NAKAMURA Y , ZHANG Y , SASABE M ,et al. Exploiting smart contracts for capability-based access control in the Internet of Things[J]. Sensors, 2020,20(6): 1793.
|
[7] |
NAKAMURA Y , ZHANG Y , SASABE M ,et al. Capability-based access control for the Internet of things:an Ethereum blockchain-based scheme[C]// 2019 IEEE Global Communications Conference. Piscataway:IEEE Press, 2019: 1-6.
|
[8] |
TAPAS N , LONGO F , MERLINO G ,et al. Experimenting with smart contracts for access control and delegation in IoT[J]. Future Generation Computer Systems, 2020,111: 324-338.
|
[9] |
张玉清, 周威, 彭安妮 . 物联网安全综述[J]. 计算机研究与发展, 2017,54(10): 2130-2143.
|
|
ZHANG Y Q , ZHOU W , PENG A N . Survey of Internet of things se-curity[J]. Journal of Computer Research and Development, 2017,54(10): 2130-2143.
|
[10] |
FAROOQ A , Al-SHARE E , MOYER T . IoTC2:a formal method approach for detecting conflicts in large scale IoT systems[C]// 2019 IFIP/IEEE Symposium on Integrated Network and Service Management. Piscataway:IEEE Press, 2019: 442-447.
|
[11] |
W3C. Time ontology in OWL[R]. 2020.
|
[12] |
GUSMEROLI S , PICCIONE S , ROTONDI D . IoT@Work automation middleware system design and architecture[C]// Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies &Factory Automation. Piscataway:IEEE Press, 2012: 1-8.
|
[13] |
NAKAMURA S , ENOKIDO T , TAKIZAWA M . Time-based legality of information flow in the capability-based access control model for the Internet of Things[J]. Concurrency and Computation:Practice and Experience, 2020:e5944.
|
[14] |
NAKAMURA S , ENOKIDO T , TAKIZAWA M . Information flow control based on the CapBAC (capability-based access control) model in the IoT[J]. International Journal of Mobile Computing and Multimedia Communications, 2019,10(4): 13-25.
|
[15] |
VANNUCCHI C , DIAMANTI M , MAZZANTE G ,et al. Symbolic verification of event-condition-action rules in intelligent environments[J]. Journal of Reliable Intelligent Environments, 2017,3(2): 117-130.
|
[16] |
SCHERP A , FRANZ T , SAATHOFF C . F——a model of events based on the foundational ontology dolce+DNS ultralight[C]// Proceedings of the Fifth International Conference on Knowledge Capture. Piscataway:IEEE Press, 2009: 137-144.
|
[17] |
RODRIGUES M , ROCHA SILVA R , BERNARDINO J . Linking open descriptions of social events (LODSE):a new ontology for social event classification[J]. Information, 2018,9(7): 164.
|
[18] |
LI F , DU J C , HE Y Q ,et al. Time event ontology (TEO):to support semantic representation and reasoning of complex temporal relations of clinical events[J]. Journal of the American Medical Informatics Association, 2020,27(7): 1046-1056.
|
[19] |
ERMOLAYEV V , BATSAKIS S , KEVERLE N . Ontologies of time:review and trends[J]. International Journal of Computer Science &Applications, 2014,11(3): 57-115.
|
[20] |
SIKOS L F . OWL ontologies in cybersecurity:conceptual modeling of cyber-knowledge[M]. Berlin: Springer, 2019.
|
[21] |
BAUMANN R , LOEBE F , HERRE H . Axiomatic theories of the ontology of time in GFO[J]. Applied Ontology, 2014,9(3): 171-215.
|
[22] |
ELMALLAH E S , GOUDA M G . Hardness of firewall analysis[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(3): 339-349.
|
[23] |
ZAMANIAN M , HEYDARI P . Readability of texts:state of the art[J]. Theory and Practice in Language Studies, 2012,2(1): 43-53.
|
[24] |
VORONKOV A , IWAYA L H , MARTUCCI L A ,et al. Systematic literature review on usability of firewall configuration[J]. ACM Computing Surveys, 2018,50(6): 1-35.
|