Access control in the Internet of Things: Big challenges and new opportunities

A Ouaddah, H Mousannif, A Abou Elkalam… - Computer Networks, 2017 - Elsevier
In this paper, an extensive state of the art review of different access control solutions in IoT
within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An …

Survey of Authentication and Authorization for the Internet of Things

M Trnka, T Cerny, N Stickney - Security and Communication …, 2018 - Wiley Online Library
The Internet of Things is currently getting significant interest from the scientific community.
Academia and industry are both focused on moving ahead in attempts to enhance usability …

A survey of secure middleware for the Internet of Things

P Fremantle, P Scott - PeerJ Computer Science, 2017 - peerj.com
The rapid growth of small Internet connected devices, known as the Internet of Things (IoT),
is creating a new set of challenges to create secure, private infrastructures. This paper …

Smart cities as hubs: Connect, collect and control city flows

LG Anthopoulos, Z Pourzolfaghar, K Lemmer… - Cities, 2022 - Elsevier
Abstract Regardless the Smart City (SC) broad scope, which ranges from a service-oriented
ecosystem with the use of almost all the emerging technologies to a resilient urban …

Identification of practices and capabilities in API management: a systematic literature review

M Mathijssen, M Overeem, S Jansen - arxiv preprint arxiv:2006.10481, 2020 - arxiv.org
Traditional organizations are increasingly becoming software producing organizations. This
software is enabling them to integrate business processes between different departments …

Smart Cities as Hubs: A Use Case in Public School Buildings

I Nikolaou, L Anthopoulos - Buildings, 2024 - mdpi.com
Contextual data are receiving increasing attention in Smart Cities as they enable the
development and delivery of smart services for their citizens. The homogenization of …

Issues in IoT healthcare platforms: A critical study and review

S Sonune, D Kalbande, A Yeole… - … Conference on Intelligent …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) devices has limited resource capacity. They have limited power
supply, CPU capacity, memory, constrained bandwidth, throughput etc. However, these IoT …

Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system

T Ahmad, U Morelli, S Ranise, N Zannone - International Journal of …, 2022 - Springer
In recent years, the design of effective authorization mechanisms for IoT and, in particular,
for smart home applications has gained increasing attention from researchers and …

[PDF][PDF] Collaboro: a collaborative (meta) modeling tool

JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …

Oauthing: privacy-enhancing federation for the internet of things

P Fremantle, B Aziz - 2016 Cloudification of the Internet of …, 2016 - ieeexplore.ieee.org
The Internet of Things (IoT) has significant security and privacy risks. Currently, most devices
connect to a cloud service that is provided by the manufacturer of the device. We outline a …