{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:17:23Z","timestamp":1740169043487,"version":"3.37.3"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Training and Research Unit through UPV\/EHU","award":["UFI11\/16"],"award-info":[{"award-number":["UFI11\/16"]}]},{"name":"Department of Economic Development and Competitiveness of the Basque Government through the Security Technologies SEKUTEK Collaborative Research Project"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2017.2730958","type":"journal-article","created":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T18:10:41Z","timestamp":1500919841000},"page":"15-46","source":"Crossref","is-referenced-by-count":7,"title":["Expressive Policy-Based Access Control for Resource-Constrained Devices"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0053-8815","authenticated-orcid":false,"given":"Mikel","family":"Uriarte","sequence":"first","affiliation":[]},{"given":"Jasone","family":"Astorga","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Jacob","sequence":"additional","affiliation":[]},{"given":"Maider","family":"Huarte","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Carnerero","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Delegated CoAP authentication and authorization framework (DCAF) Internet Engineering Task Force Internet-Draft","year":"2015","author":"gerdes","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2014.915316"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.006"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031518"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.09.014"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44569-2_2"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.12.021"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803122"},{"key":"ref35","first-page":"1","article-title":"Distributed capability-based access control for the Internet of Things","volume":"3","author":"hern\u00e1ndez-ramos","year":"2013","journal-title":"J Internet Services Inf Secur"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/365230.365252"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.4108\/tridentcom.2008.10409"},{"journal-title":"MEMSIC&#x2019;s TelosB Mote (TPR2420CA) Datasheet","year":"2017","key":"ref62"},{"journal-title":"Cryptographic Algorithms&#x2019; Speed Benchmarking in an AMD64 CPU","year":"2017","key":"ref61"},{"year":"2011","key":"ref63","article-title":"Network performance objectives for IP-based services"},{"journal-title":"Extensible Access Control Markup Language (XACML)","year":"2013","author":"parducci","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BF02283186"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206958"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7228"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","first-page":"197","article-title":"Random key predistribution schemes for sensor networks","author":"chan","year":"2003","journal-title":"Proc IEEE Symp Security Privacy"},{"journal-title":"Security assertions markup language SAML 2 0 OASIS","year":"2005","author":"cantor","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/11776178_19"},{"journal-title":"OpenID Authentication 2 0&#x2014;Final","year":"2007","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6749"},{"journal-title":"Universal 2nd Factor (U2F) Overview","year":"2015","author":"srinivas","key":"ref26"},{"journal-title":"FIDO UAF Protocol Specification v1 0","year":"2014","author":"lindemann","key":"ref25"},{"article-title":"A short SPAN+AVISPA tutorial","year":"2015","author":"genet","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_27"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428758"},{"journal-title":"The M\/G\/1 System and Inside the Mentioned Theorem is Explained The Pollaczek Khinchin (P-K) Theorem","year":"2005","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1163610.1163619"},{"key":"ref56","first-page":"1","article-title":"Improvements on the genet and klay technique to automatically verify security protocols","author":"boichut","year":"2004","journal-title":"Proc Int Workshop Autom Verification Infinite-State Syst (AVIS)"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30227-8_68"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/11805618_21"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0055-7"},{"key":"ref52","first-page":"13","article-title":"A high level protocol specification language for industrial security-sensitive protocols","author":"chevalier","year":"2004","journal-title":"Proc Workshop Specification Autom Process Security Requirements (SAPS)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"journal-title":"An Architecture for Authorization in Constrained Environments","year":"2015","author":"gerdes","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7049"},{"journal-title":"2016 DYN Cyberattack From Wikipedia the free encyclopedia","year":"2016","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3460"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2494091.2497583"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6606"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"journal-title":"Survey Analysis The Internet of Things is a Revolution Waiting to Happen","year":"2015","author":"rivera","key":"ref18"},{"key":"ref19","first-page":"749","article-title":"LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks","author":"zhu","year":"2003","journal-title":"Proc 23rd Int Conf Distrib Comput Syst Workshops"},{"journal-title":"Past Present Future","year":"2017","author":"gargini","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/6.591665"},{"journal-title":"Final Architectural Reference Model for the IoT-A V3 0","year":"2013","author":"carrez","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/530144a"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.01.006"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.05.010"},{"journal-title":"EBNF A Notation to Describe Syntax (PDF)","year":"2017","author":"pattis","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7452"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0259"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2013.10.002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.12.005"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/IEEESTD.2006.232110"},{"key":"ref43","article-title":"On attribute-based usage control policy ratification for cooperative computing context","volume":"abs 1305 1727","author":"su","year":"2013","journal-title":"CoRR"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/07990134.pdf?arnumber=7990134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T03:00:17Z","timestamp":1633921217000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7990134\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":63,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2730958","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}