{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:57:17Z","timestamp":1764997037282,"version":"3.37.3"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Spanish Seneca Foundation"},{"name":"FPI","award":["(15493\/FPI\/10)"],"award-info":[{"award-number":["(15493\/FPI\/10)"]}]},{"name":"Swiss national government"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Select. Areas Commun."],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/jsac.2015.2393436","type":"journal-article","created":{"date-parts":[[2015,1,16]],"date-time":"2015-01-16T14:58:18Z","timestamp":1421420298000},"page":"690-702","source":"Crossref","is-referenced-by-count":120,"title":["Toward a Lightweight Authentication and Authorization Framework for Smart Objects"],"prefix":"10.1109","volume":"33","author":[{"given":"Jose L.","family":"Hernandez-Ramos","sequence":"first","affiliation":[]},{"given":"Marcin Piotr","family":"Pawlowski","sequence":"additional","affiliation":[]},{"given":"Antonio J.","family":"Jara","sequence":"additional","affiliation":[]},{"given":"Antonio F.","family":"Skarmeta","sequence":"additional","affiliation":[]},{"given":"Latif","family":"Ladid","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"187","article-title":"Identity Establishment and Capability based Access Control (IECAC) scheme for Internet of things","author":"mahalle","year":"0","journal-title":"Proc 15th Int Symp WPMC"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.25"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4764"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/s131114888"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462117"},{"year":"2013","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080416"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s140814786"},{"key":"ref35","first-page":"241","article-title":"Role-Based Access Control (RBAC): Features and motivations","author":"ferraiolo","year":"0","journal-title":"Proc 11th Annu Comput Security Appl Conf"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.23"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5216"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77690-1_19"},{"journal-title":"The Design of Rijndael AES&#x2014;The Advanced Encryption Standard","year":"2002","author":"daemen","key":"ref61"},{"journal-title":"ACE use cases","year":"2014","author":"seitz","key":"ref63"},{"key":"ref28","first-page":"259","article-title":"Slimfit&#x2014;A HIP DEX compression layer for the IP-based Internet of things","author":"hummen","year":"0","journal-title":"Proc IEEE 9th Int Conf WiMob"},{"journal-title":"Security bootstrapping solution for resource-constrained devices","year":"2012","author":"sarikaya","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5191"},{"journal-title":"Big Data A Revolution That Will Transform How We Live Work and Think","year":"2013","author":"mayer-sch\u00f6nberger","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14478-3_42"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.291"},{"key":"ref21","first-page":"67","article-title":"A decentralized approach for security and privacy challenges in the Internet of things","author":"skarmeta","year":"0","journal-title":"Proc IEEE WF-IoT'14"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/357430"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.11.008"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4347"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1007\/978-3-319-13102-3_67","article-title":"Privacy-preserving security framework for a social-aware Internet of things","author":"bernabe","year":"2014","journal-title":"Ubiquitous Computing and Ambient Intelligence Personalisation and User Adapted Services"},{"journal-title":"Problem description for authorization in constrained environments","year":"2014","author":"seitz","key":"ref51"},{"journal-title":"XACML v3 0 multiple decision profile version 1 0","year":"2014","author":"rissanen","key":"ref59"},{"journal-title":"Actors in the ACE architecture","year":"2014","author":"gerdes","key":"ref58"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4492"},{"key":"ref56","first-page":"2368","article-title":"Multiplication and squaring with shifting primes on OpenRISC processors with hardware multiplier","volume":"19","author":"marin","year":"2013","journal-title":"J Universal Comput Sci"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/365230.365252"},{"key":"ref54","first-page":"1","article-title":"Lightweight IKEv2: A key management solution for both the compressed IPSec and the IEEE 802.15.4 security","author":"raza","year":"0","journal-title":"Proceedings of the IETF Workshop on Smart Object Security"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/563274"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5996"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2012.02.016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.006"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0385-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0194-0"},{"year":"2004","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3748"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2865"},{"journal-title":"Extensible Access Control Markup Language (XACML) Version 3 0 oasis Standard","year":"2012","author":"rissanen","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2014.915316"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40403-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4919"},{"journal-title":"Smart Cities and the Future Internet Towards Cooperation Frameworks for Open Innovation","year":"2011","author":"schaffers","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/819250"},{"key":"ref8","first-page":"1","article-title":"Security and privacy challenges in the Internet of things","volume":"17","author":"mayer","year":"2009","journal-title":"Electron Commun Eur Assoc Sci Technol"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2014.060260"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2013.6701578"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38082-2_14"},{"journal-title":"The Internet of Things Initiative (IoT-I) Deliverable 1 5 Iot Reference Model White Paper","year":"2011","author":"bauer","key":"ref45"},{"key":"ref48","first-page":"247","article-title":"The sensei real world Internet architecture","author":"tsiatsis","year":"0","journal-title":"Future Internet Assembly"},{"journal-title":"Butler Deliverable 3 2 Integrated System Architecture and Initial Pervasive Butler Proof of Concept","year":"2013","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4627"},{"key":"ref41","first-page":"1","article-title":"Authorization framework for the Internet-of-things","author":"seitz","year":"0","journal-title":"Proc IEEE 14th Int Symp WoWMoM"},{"key":"ref44","first-page":"155","article-title":"Trust extension protocol for authentication in networks oriented to management (TEPANOM)","author":"jara","year":"2014","journal-title":"Availability, Reliability, and Security in Information Systems and HCI"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.008"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/49\/7086108\/07012039.pdf?arnumber=7012039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:51:15Z","timestamp":1641988275000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7012039\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":63,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jsac.2015.2393436","relation":{},"ISSN":["0733-8716"],"issn-type":[{"type":"print","value":"0733-8716"}],"subject":[],"published":{"date-parts":[[2015,4]]}}}