Systems and methods for secure communications between devices

K Bhalerao - US Patent 10,114,939, 2018 - Google Patents
The disclosed computer-implemented method for secure communications between devices
may include (1) receiving, from a control device that is capable of providing instructions to …

Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services

D Ventura, A Gómez-Goiri, V Catania… - Logic Journal of …, 2016 - academic.oup.com
We extend and analyse a previous access control solution for wireless network services with
group-based authorization. Authentication and encryption are provided, and access control …

Spatiotemporal access model based on reputation for the sensing layer of the IoT

Y Guo, L Yin, C Li, J Qian - The Scientific World Journal, 2014 - Wiley Online Library
Access control is a key technology in providing security in the Internet of Things (IoT). The
mainstream security approach proposed for the sensing layer of the IoT concentrates only …

Extending a user access control proposal for wireless network services with hierarchical user credentials

JÁM Naranjo, A Gómez-Goiri, P Orduna… - … Joint Conference SOCO …, 2014 - Springer
We extend a previous access control solution for wireless network services with group-
based authorization and encryption capabilities. Both the basic solution and this novel …

Semantic tuple spaces for constrained devices: a web-compliant vision

AG Goiri - 2014 - search.proquest.com
Abstract Ubiquitous Computing (UbiComp) envisions environments where devices interact
among themselves to work seamlessly together on behalf of humans. In recent years, the …

[CITAZIONE][C] SEMANTIC TUPLE SPACES FOR CONSTRAINED DEVICES: A WEB-COMPLIANT VISION

ÍG Presa