{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:09:15Z","timestamp":1730221755364,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1109\/fmec62297.2024.10710274","type":"proceedings-article","created":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T17:22:38Z","timestamp":1728926558000},"page":"204-211","source":"Crossref","is-referenced-by-count":0,"title":["Just the FACTS: Flexible and Energy Efficient Federated Access Control for the Edge"],"prefix":"10.1109","author":[{"given":"Shereen","family":"Elsayed","sequence":"first","affiliation":[{"name":"University of California Santa Barbara,Department of Computer Science,Santa Barbara,USA,93106"}]},{"given":"Chandra","family":"Krintz","sequence":"additional","affiliation":[{"name":"University of California Santa Barbara,Department of Computer Science,Santa Barbara,USA,93106"}]},{"given":"Rich","family":"Wolski","sequence":"additional","affiliation":[{"name":"University of California Santa Barbara,Department of Computer Science,Santa Barbara,USA,93106"}]}],"member":"263","reference":[{"year":"2018","key":"ref1","article-title":"Azure IoT Edge"},{"year":"2024","key":"ref2","article-title":"Alibaba IoT Edge"},{"key":"ref4","article-title":"AWS Greengrass"},{"year":"2018","key":"ref5","article-title":"MQTT"},{"year":"2017","key":"ref6","article-title":"AWS Lambda"},{"author":"Alliance","key":"ref7","article-title":"ZigBee Alliance"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s18082660"},{"key":"ref9","first-page":"1","article-title":"Security evaluation of the z-wave wireless protocol","volume":"24","author":"Fouladi","year":"2013","journal-title":"Blackhat USA"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TELFOR.2016.7818915"},{"article-title":"Lorawan\u2013a low power wan protocol for internet of things: A review and opportunities","volume-title":"International multidisciplinary conference on computer and energy science (SpliTech)","author":"de Carvalho Silva","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAIE47305.2020.9108808"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.126"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GIOTS.2018.8534575"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3145584"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3453142.3491289"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23212"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/2.53354"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3546933"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487830"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SEC.2018.00013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988126"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3144457.3144485"},{"issue":"6832","key":"ref24","article-title":"Protocol-based and hybrid access control for the iot","volume":"21","author":"Pal","year":"2021","journal-title":"Sensors"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2316\/P.2012.785-070"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.04.013"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205986"},{"issue":"6","key":"ref28","article-title":"A brief review on mqtt\u2019s security issues within the internet of things (iot)","volume":"14","author":"Hintaw","year":"2019","journal-title":"Communications"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9528"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8613"},{"year":"2024","key":"ref31","article-title":"AWS IAM"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2020.100292"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/EmergiTech.2016.7737367"},{"key":"ref34","article-title":"Analog discovery 2 reference manual","author":"Dabacan","year":"2018","journal-title":"Analog Discovery 2 Reference Manual-Digilent Reference"}],"event":{"name":"2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2024,9,2]]},"location":"Malm\u00f6, Sweden","end":{"date-parts":[[2024,9,5]]}},"container-title":["2024 9th International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10710134\/10710180\/10710274.pdf?arnumber=10710274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,15]],"date-time":"2024-10-15T04:57:37Z","timestamp":1728968257000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10710274\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/fmec62297.2024.10710274","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]}}}