{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:16Z","timestamp":1772039476415,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/spw54247.2022.9833873","type":"proceedings-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T20:14:47Z","timestamp":1658780087000},"page":"222-228","source":"Crossref","is-referenced-by-count":23,"title":["Capabilities-based access control for IoT devices using Verifiable Credentials"],"prefix":"10.1109","author":[{"given":"Nikos","family":"Fotiou","sequence":"first","affiliation":[{"name":"Athens University of Economics and Business,Mobile Multimedia Laboratory,Department of Informatics,Greece"}]},{"given":"Vasilios A.","family":"Siris","sequence":"additional","affiliation":[{"name":"Athens University of Economics and Business,Mobile Multimedia Laboratory,Department of Informatics,Greece"}]},{"given":"George C.","family":"Polyzos","sequence":"additional","affiliation":[{"name":"Athens University of Economics and Business,Mobile Multimedia Laboratory,Department of Informatics,Greece"}]},{"given":"Yki","family":"Kortesniemi","sequence":"additional","affiliation":[{"name":"Aalto University,School of Electrical Engineering,Department of Communications and Networking,Finland"}]},{"given":"Dmitrij","family":"Lagutin","sequence":"additional","affiliation":[{"name":"Aalto University,School of Electrical Engineering,Department of Communications and Networking,Finland"}]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/C5.2006.9"},{"key":"ref10","first-page":"255","article-title":"Rethinking access control and authentication for the home internet of things (iot)","author":"he","year":"2018","journal-title":"27th USENIX Security Symposium (USENIX Security 18)"},{"key":"ref11","first-page":"1169","article-title":"All things considered: an analysis of IoT devices on home networks","author":"kumar","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref12","first-page":"361","article-title":"Smartauth: User-centered authorization for the Internet of Things","author":"tian","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref13","first-page":"159","article-title":"Understanding and improving security and privacy in multi-user smart homes: a design exploration and in-home user study","author":"zeng","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.006"},{"key":"ref15","first-page":"1","article-title":"Distributed capability-based access control for the internet of things","volume":"3","author":"hern\u00e1ndez-ramos","year":"2013","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"ref16","article-title":"Authorization certificate based access control in embedded environments","author":"af heurlin","year":"2015"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8485944"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2019.23005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8706760"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6749"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1456424.1456428"},{"key":"ref27","year":"2020","journal-title":"Revocation list 2020"},{"key":"ref3","author":"sporny","year":"2019","journal-title":"Verifiable Credentials Data Model 1 0"},{"key":"ref6","article-title":"The did:key method","author":"longley","year":"2020"},{"key":"ref29","article-title":"OAuth 2.0 Demonstrating of Proof-of-Possession at the Application Layer (DPoP)","author":"fett","year":"2020","journal-title":"RFC Draft"},{"key":"ref5","article-title":"Decentralized identifiers (dids) v1.0","author":"reed","year":"2020","journal-title":"W3C Working Draft"},{"key":"ref8","article-title":"did:web method specification","author":"p","year":"2021","journal-title":"W3C Editor's Draft"},{"key":"ref7","article-title":"Sovrin did method specification","author":"lodder","year":"2020","journal-title":"W3C Editor's Draft"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.017"},{"key":"ref9","article-title":"Peer did method specification","author":"h","year":"2020","journal-title":"DIF Editor&#x2019;s Draft"},{"key":"ref1","article-title":"Centralized, distributed, and everything in between: Reviewing access control solutions for the iot","volume":"54","author":"dram\u00e9-maign\u00e9","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00191"},{"key":"ref22","article-title":"Authorization capabilities for linked data","author":"webber","year":"2020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23212"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7519"},{"key":"ref23","first-page":"1375","article-title":"WAVE: A Decentralized Authorization Framework with Transitive Delegation","author":"andersen","year":"2019","journal-title":"Proceedings of the 28th USENIX Conference on Security Symposium ser SEC&#x2019;19"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24084"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7515"}],"event":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","location":"San Francisco, CA, USA","start":{"date-parts":[[2022,5,22]]},"end":{"date-parts":[[2022,5,26]]}},"container-title":["2022 IEEE Security and Privacy Workshops (SPW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9833855\/9833856\/09833873.pdf?arnumber=9833873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T20:02:37Z","timestamp":1660593757000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9833873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/spw54247.2022.9833873","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}