{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T12:00:09Z","timestamp":1757592009257},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/iscc.2017.8024606","type":"proceedings-article","created":{"date-parts":[[2017,9,4]],"date-time":"2017-09-04T16:26:54Z","timestamp":1504542414000},"source":"Crossref","is-referenced-by-count":60,"title":["OAuth-IoT: An access control framework for the Internet of Things based on open standards"],"prefix":"10.1109","author":[{"given":"Savio","family":"Sciancalepore","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Piro","sequence":"additional","affiliation":[]},{"given":"Daniele","family":"Caldarola","sequence":"additional","affiliation":[]},{"given":"Gennaro","family":"Boggia","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","year":"2012","journal-title":"Constrained RESTful Environments (CoRE) Link Format"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.111412.00158"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6750"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7519"},{"key":"ref14","article-title":"OAuth 2.0 Proof-of-Possession (PoP) Security Architecture draft-ietf-oauth-pop-architecture-Ox.txt","author":"hunt","year":"2016","journal-title":"IETF Internet Draft"},{"key":"ref15","first-page":"211","author":"vilajosana","year":"2015","journal-title":"Open Mote Open-Source Prototyping Platform for the Industrial IoT"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2558"},{"key":"ref17","article-title":"Minimal 6TiSCH Configuration, draft-ietf-6tisch-minimal-21","author":"villajosana","year":"2017","journal-title":"IETF Internet Draft"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6749"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2323395"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2361406"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2015.7354740"},{"key":"ref8","article-title":"CBOR Web Token (CWT) draft-ietf-ace-cbor-web-token-03","author":"jones","year":"2017","journal-title":"IETF Internet Draft"},{"key":"ref7","article-title":"Authorization for the Internet of Things using OAuth 2.0 draft-ietf-ace-oauth-authz-Oo","author":"seitz","year":"2017","journal-title":"IETF Internet Draft"},{"key":"ref2","year":"2016","journal-title":"IEEE Recommended Practice for Transport of Key Management Protocol (KMP) Datagrams"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2015.2393436"}],"event":{"name":"2017 IEEE Symposium on Computers and Communications (ISCC)","location":"Heraklion, Greece","start":{"date-parts":[[2017,7,3]]},"end":{"date-parts":[[2017,7,6]]}},"container-title":["2017 IEEE Symposium on Computers and Communications (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8016448\/8024490\/08024606.pdf?arnumber=8024606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T22:20:54Z","timestamp":1506982854000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8024606\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iscc.2017.8024606","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}