{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T05:26:55Z","timestamp":1732771615062,"version":"3.29.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T00:00:00Z","timestamp":1727913600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T00:00:00Z","timestamp":1727913600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,3]]},"DOI":"10.1109\/comm62355.2024.10741422","type":"proceedings-article","created":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T18:37:59Z","timestamp":1730918279000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Access Management in IoT: Implementing a Secure Access Control System"],"prefix":"10.1109","author":[{"given":"R\u0103zvan-Sebastian","family":"Neculai","sequence":"first","affiliation":[{"name":"Transilvania University of Brasov, &#x0026; Eviden,Faculty of Electrical Engineering and Computer Science,Department of Cybersecurity,Bra&#x015F;ov,Romania"}]},{"given":"Ioana-Corina","family":"Bogdan","sequence":"additional","affiliation":[{"name":"Transilvania University of Brasov,Faculty of Electrical Engineering and Computer Science,Department of Electronics and Computers,Bra&#x015F;ov,Romania"}]},{"given":"Marian","family":"Alexandru","sequence":"additional","affiliation":[{"name":"Transilvania University of Brasov,Faculty of Electrical Engineering and Computer Science,Department of Electronics and Computers,Bra&#x015F;ov,Romania"}]},{"given":"Dan-Nicolae","family":"Robu","sequence":"additional","affiliation":[{"name":"Transilvania University of Brasov,Faculty of Electrical Engineering and Computer Science,Department of Electronics and Computers,Bra&#x015F;ov,Romania"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IRTM54583.2022.9791563"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.08.218"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCM56405.2022.10009534"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2312\/1\/012092"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/IEECON.2017.8075909"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET45539.2019.9032715"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNTE51185.2021.9487704"},{"volume-title":"Types of smart door locks-YAMIRY","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC3N56670.2022.10074243"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSSIT48917.2020.9214288"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INDISCON54605.2022.9862840"},{"issue":"6","key":"ref12","first-page":"705","article-title":"Effect of vulnerability assessment in network security","volume":"2","author":"Muhammad","year":"2020","journal-title":"International Journal of Advances in Engineering and Management"},{"journal-title":"Kali Linux|Penetration Testing and Ethical Hacking Linux Distribution","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103067"},{"volume":"4","article-title":"Vulnerability Management","volume-title":"CRR Supplemental Resource Guide","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTCC.2018.8540687"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/etfa.2015.7301570"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MECO58584.2023.10154999"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IEECON.2017.8075909"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASEW52652.2021.00016"},{"journal-title":"PostgreSQL 13 Cookbook: Over 120 recipes to build high-performance and fault-tolerant PostgreSQL database solutions","year":"2021","author":"Naga Avinash Kumar","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/iccsmt58129.2022.00019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00017"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00017"},{"key":"ref25","first-page":"44","article-title":"Remotely accessible smart lock security system with essential features","author":"Le","year":"2021","journal-title":"Developing Modern Database Applications with PostgreSQL: Use the highly available and object-relational PostgreSQL to build scalable and reliable apps"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNTE51185.2021.9487704"}],"event":{"name":"2024 15th International Conference on Communications (COMM)","start":{"date-parts":[[2024,10,3]]},"location":"Bucharest, Romania","end":{"date-parts":[[2024,10,4]]}},"container-title":["2024 15th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10741366\/10741389\/10741422.pdf?arnumber=10741422","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T11:57:59Z","timestamp":1732708679000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10741422\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,3]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/comm62355.2024.10741422","relation":{},"subject":[],"published":{"date-parts":[[2024,10,3]]}}}