{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:57:53Z","timestamp":1775199473772,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030381806","type":"print"},{"value":"9783030381813","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38181-3_2","type":"book-chapter","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T06:04:48Z","timestamp":1583129088000},"page":"7-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Capability-Based Non-fungible Tokens Approach for a Decentralized AAA Framework in IoT"],"prefix":"10.1007","author":[{"given":"A.","family":"Sghaier Omar","sequence":"first","affiliation":[]},{"given":"O.","family":"Basir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"key":"2_CR1","unstructured":"Gartners, Inc. The value and impact of IoT on business, 2015. \nhttp:\/\/www.gartner.com\/newsroom\/id\/3114217"},{"issue":"2","key":"2_CR2","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2017.62","volume":"50","author":"E Bertino","year":"2017","unstructured":"E. Bertino, N. Islam, Botnets and internet of things security. Computer 50(2), 76\u201379 (2017)","journal-title":"Computer"},{"issue":"3","key":"2_CR3","doi-asserted-by":"publisher","first-page":"817","DOI":"10.3390\/s18030817","volume":"18","author":"B Ali","year":"2018","unstructured":"B. Ali, A.I. Awad, Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors (Basel, Switzerland) 18(3), 817 (2018)","journal-title":"Sensors (Basel, Switzerland)"},{"key":"2_CR4","unstructured":"OAuth 2.0. \nhttps:\/\/oauth.net\/2"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"D. Recordon, D. Reed, OpenID 2.0: a platform for user centric identity management, in DIM \u201906: Proceedings of the 2nd ACM Workshop on Digital Identity Management, 2006, pp. 11\u201316","DOI":"10.1145\/1179529.1179532"},{"key":"2_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/0470017465","volume-title":"AAA and Network Security for Mobile Access","author":"Madjid Nakhjiri","year":"2005","unstructured":"M. Nakhjiri, M. Nakhjiri, AAA and network security for mobile access: radius, diameter, EAP, PKI and IP mobility. (Wiley, New York, 2005), pp. 1\u201324"},{"key":"2_CR7","unstructured":"General Data Protection Regulation, 2018. \nhttps:\/\/gdpr-info.eu"},{"key":"2_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-812458-1.00001-0","volume-title":"Cellular Internet of Things: Technologies, Standards, and Performance","author":"O Liberg","year":"2018","unstructured":"O. Liberg, M. Sundberg, E. Wang, J. Bergman, J. Sachs, Cellular Internet of Things: Technologies, Standards, and Performance (Academic Press, London, 2018)"},{"key":"2_CR9","unstructured":"V. Buterin, Ethereum: a next-generation smart contract and decentralized application platform. Ethereum Foundation. 2014. \nhttps:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"2_CR10","unstructured":"A. Sghaier Omar, O. Basir, Identity management in IoT networks using Blockchain and smart contracts, in Proceedings of the 2018 IEEE International Conference on Blockchain, Halifax, NS, Canada, 2018"},{"key":"2_CR11","unstructured":"G. Wood, Ethereum: a secure decentralised generalised transaction ledger, 2014. \nhttp:\/\/gavwood.com\/paper.pdf"},{"key":"2_CR12","unstructured":"Solidity Documentation. \nhttps:\/\/solidity.readthedocs.io\/en\/v0.4.25\/"},{"key":"2_CR13","unstructured":"F. Vogelsteller, V. Buterin, ERC 20 Token Standard, 2015. \nhttps:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-20.md"},{"key":"2_CR14","unstructured":"W. Entriken, D. Shirley, J. Evans, N. Sachs. ERC-721 Non-fungible token standard, 2018. \nhttps:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-721.md"},{"key":"2_CR15","unstructured":"Non-fungible token Market. \nhttps:\/\/nonfungible.com"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"R. Xu, Y. Chen, E. Blasch, G. Chen, Blendcac: a Blockchain-enabled decentralized capability-based access control for iots, in IEEE International Conference on Blockchain, Selected Areas in IoT and Blockchain, 2018","DOI":"10.20944\/preprints201805.0079.v1"},{"key":"2_CR17","unstructured":"D. Ferraiolo, R. Kuhn, Role-based access controls, in Proceedings of the 15th National Computer Security Conference, 1992, pp. 554\u2013563"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"S. Gavrila, J. Barkley, Formal specification for role based access control user\/role and role\/role relationship management, in Proceedings of the 3rd ACM Workshop on Role-Based Access Control (RBAC\u201998), 1998, pp. 81\u201390","DOI":"10.1145\/286884.286902"},{"key":"2_CR19","unstructured":"G. Zhang, J. Tian, An extended role based access control model for the internet of things, in Proceedings of the International Conference on Information, Networking and Automation, Proceedings, 2010, pp. 319\u2013323"},{"issue":"3\/4","key":"2_CR20","first-page":"1","volume":"3","author":"JL Hernandez-Ramos","year":"2013","unstructured":"J.L. Hernandez-Ramos, A.J. Jara, L. Marin, A.F. Skarmeta, Distributed capability-based access control for the internet of things. J. Internet Serv. Inform. Secur. 3(3\/4), 1\u201316 (2013)","journal-title":"J. Internet Serv. Inform. Secur."},{"issue":"18","key":"2_CR21","doi-asserted-by":"publisher","first-page":"5943","DOI":"10.1002\/sec.1748","volume":"9","author":"A Ouaddah","year":"2016","unstructured":"A. Ouaddah, A. Abou Elkalam, A. Ait Ouahman, Fairaccess: a new Blockchain-based access control framework for the internet of things. Secur. Comm. Network. 9(18), 5943\u20135964 (2016)","journal-title":"Secur. Comm. Network."},{"key":"2_CR22","unstructured":"R. Xu, Y. Chen, E. Blasch, G. Chen, A federated capability-based access control mechanism for internet of things (iots), in SPIE Defense & Commercial Sensing. Conference on Sensors and Systems for Space Applications, 2018"},{"issue":"5-6","key":"2_CR23","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1016\/j.mcm.2013.02.006","volume":"58","author":"Sergio Gusmeroli","year":"2013","unstructured":"S. Gusmeroli, S. Piccione, D. Rotondi, A capability-based security approach to manage access control in the internet of things. Math. Comput. Model., 1189\u20131205 (2013)","journal-title":"Mathematical and Computer Modelling"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/j.comnet.2016.11.007","volume":"112","author":"A Ouaddah","year":"2017","unstructured":"A. Ouaddah, H. Mousannif, A.A. Elkalam, A.A. Ouahman, Access control in the internet of things: big challenges and new opportunities. Comput. Netw. 112, 237\u2013262 (2017)","journal-title":"Comput. Netw."},{"key":"2_CR25","unstructured":"Study of Authorization Architecture for Supporting Heterogeneous Access Control Policies (2016) OneM2M Technical Report, TR-0016-V-2.0"},{"key":"2_CR26","unstructured":"IPFS Documentation, Protocol Labs, \nhttps:\/\/docs.ipfs.io"},{"key":"2_CR27","doi-asserted-by":"publisher","DOI":"10.1201\/b12078","volume-title":"Communication System Security","author":"L Chen","year":"2012","unstructured":"L. Chen, G. Guang, Communication System Security (Chapman & Hall\/CRC, London\/Boca Raton, 2012)"},{"key":"2_CR28","unstructured":"M. Collina, COAP Node.js Library, \nhttps:\/\/github.com\/mcollina\/node-coap"},{"key":"2_CR29","unstructured":"Web3.js Ethereum Javascript API. \nhttps:\/\/github.com\/ethereum\/wiki\/wiki\/JavaScript-API"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Z. Shelby, K. Hartke, C. Bormann, The Constrained Application Protocol (CoAP), IETF RFC 7252, 2014. \nhttp:\/\/tools.ietf.org\/html\/rfc7252","DOI":"10.17487\/rfc7252"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"S. Deering, R. Hinden, Internet Protocol, Version 6 (IPv6) Specification, Internet Engineering Task Force (IETF) RFC 8200, 2017. \nhttps:\/\/tools.ietf.org\/html\/rfc8200","DOI":"10.17487\/RFC8200"}],"container-title":["Advances in Information Security","Blockchain Cybersecurity, Trust and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38181-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T06:05:36Z","timestamp":1583129136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-38181-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030381806","9783030381813"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38181-3_2","relation":{},"ISSN":["1568-2633","2512-2193"],"issn-type":[{"value":"1568-2633","type":"print"},{"value":"2512-2193","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}