{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T19:40:00Z","timestamp":1769974800315,"version":"3.49.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319568768","type":"print"},{"value":"9783319568775","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-56877-5_8","type":"book-chapter","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T02:50:57Z","timestamp":1491360657000},"page":"123-138","source":"Crossref","is-referenced-by-count":16,"title":["Attribute-Based Access Control Scheme in Federated IoT Platforms"],"prefix":"10.1007","author":[{"given":"Savio","family":"Sciancalepore","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Micha\u0142","family":"Pilc","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Svenja","family":"Schr\u00f6der","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gennaro","family":"Boggia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marek","family":"Paw\u0142owski","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giuseppe","family":"Piro","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcin","family":"P\u0142\u00f3ciennik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hannes","family":"Weisgrab","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,4,5]]},"reference":[{"key":"8_CR1","first-page":"97","volume":"22","author":"K Ashton","year":"2009","unstructured":"Ashton, K.: That Internet of Things thing. RFID J. 22, 97\u2013114 (2009)","journal-title":"RFID J."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Gershenfeld, N., Krikorian, R., Cohen, D.: The Internet-of-Things. Technical report, Scientific American (2004)","DOI":"10.1038\/scientificamerican1004-76"},{"key":"8_CR3","unstructured":"Gross, M.: Smart house and home automation technologies. Technical report, Encyclopedia of Housing (1998)"},{"issue":"3","key":"8_CR4","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MCE.2016.2556879","volume":"5","author":"SP Mohanty","year":"2016","unstructured":"Mohanty, S.P., Choppali, U., Kougianos, E.: Everything you wanted to know about smart cities. IEEE Consum. Electron. Mag. 5(3), 60\u201370 (2016)","journal-title":"IEEE Consum. Electron. Mag."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Hu, V., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) definition and considerations. NIST special publication 800-162. NIST, January 2014","DOI":"10.6028\/NIST.SP.800-162"},{"issue":"5","key":"8_CR6","first-page":"613","volume":"7","author":"A Khan","year":"2012","unstructured":"Khan, A.: Access control in cloud computing environment. ARPN J. Eng. Appl. Sci. 7(5), 613\u2013615 (2012)","journal-title":"ARPN J. Eng. Appl. Sci."},{"key":"8_CR7","unstructured":"Juniper-Networks: Architecture for secure SCADA and distributed control system networks. Juniper Networks White Paper (2010)"},{"key":"8_CR8","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan, Z., Zhang, P., Vasilakos, A.: A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42, 120\u2013134 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR9","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Birgisson, A., Gibbs Politz, J., Erlingisson, U., Lentczner, M.: Macaroons: cookies with contextual caveats for decentralized authorization in the cloud. In: Proceedings of the Conference on Network and Distributed System Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23212"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Jones, M., Bradley, J., Sakimura, N.: JSON Web Token (JWT). RFC 5719, IETF, May 2015","DOI":"10.17487\/RFC7519"},{"key":"8_CR12","unstructured":"Seitz, L., Selander, G., Wahlstroem, E., Erdtman, S., Tschofenig, H.: Authorization for the Internet of Things for constrained environments draft-ietf-ace-oauth-authz-04. Internet draft, IETF (2016)"},{"key":"8_CR13","unstructured":"Hennebert, C., et al.: IoT governance. privacy and security issues. Technical report, European Research Cluster on the Internet of Things, January 2015"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Hardt, D.: The OAuth 2.0 authorization framework. RFC 6749, IETF, October 2012","DOI":"10.17487\/rfc6749"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The transport layer security protocol Version 1.1. IETF, April 2006","DOI":"10.17487\/rfc4346"}],"container-title":["Lecture Notes in Computer Science","Interoperability and Open-Source Solutions for the Internet of Things"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56877-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T12:29:47Z","timestamp":1568982587000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56877-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319568768","9783319568775"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56877-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}