{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:43:34Z","timestamp":1762033414695,"version":"3.44.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845482","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:42:54Z","timestamp":1486658574000},"page":"706-710","source":"Crossref","is-referenced-by-count":9,"title":["An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE)"],"prefix":"10.1109","author":[{"given":"Victoria","family":"Beltran","sequence":"first","affiliation":[{"name":"Department of Information and Communications Engineering, University of Murcia, Murcia, Spain"}]},{"given":"Antonio F.","family":"Skarmeta","sequence":"additional","affiliation":[{"name":"Department of Information and Communications Engineering, University of Murcia, Murcia, Spain"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6750"},{"key":"ref11","article-title":"OAuth2.0 Proof-of-Possession: Authorization Server to Client Key Distribution","author":"bradley","year":"2015","journal-title":"Internet-Draft ietf-oauth-pop-key-distribution-02 (expired state)"},{"journal-title":"OAuth2 0 Dynamic Client Registration Protocol","year":"2015","author":"jones","key":"ref12"},{"key":"ref13","article-title":"Object Security of CoAP (OSCOAP)","author":"selander","year":"2016","journal-title":"Internet-Draft selander-ace-object-security-05"},{"key":"ref14","article-title":"CBOR Object Signing and Encryption (COSE)","author":"shaad","year":"2016","journal-title":"Internet-Draft ietf-cose-msg-14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7662"},{"key":"ref16","first-page":"1","article-title":"OSCAR: Object security architecture for the Internet of Things","author":"vu?ini?","year":"2014","journal-title":"IEEE Symposium on A World of Wireless Mobile and Multimedia Networks (WoWMoM)"},{"journal-title":"NDN Project Tech Rep NDN-0036","article-title":"Named Data Networking","year":"2015","key":"ref17"},{"key":"ref18","article-title":"NDN-ACE: Access Control for Constrained Environments over Named Data Networking","author":"shang","year":"0","journal-title":"NDN Project Tech Rep NDN-0036"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970725"},{"journal-title":"The Internet of Things An Overview Understanding the Issues and Challenges of a More Connected World","year":"2015","key":"ref4"},{"key":"ref3","first-page":"6","article-title":"IAB Releases Guidelines for Internet-of-Things Developers","volume":"11","author":"marsan","year":"2015","journal-title":"IET Journal"},{"key":"ref6","article-title":"Authentication and Authorization for Constrained Environments (ACE)","author":"seitz","year":"2016","journal-title":"Internet-Draft ietf-ace-oauth-authz-02"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-016-0582-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7049"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7252"},{"journal-title":"The OAuth2 0 Authorization Framework","year":"2012","author":"hardt","key":"ref2"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/2897845.2897886","article-title":"Smart locks: Lessons for securing commodity internet of things devices","author":"ho","year":"2016","journal-title":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7514160"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2016,12,12]]},"location":"Reston, VA, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845482.pdf?arnumber=7845482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,14]],"date-time":"2025-08-14T18:43:39Z","timestamp":1755197019000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7845482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845482","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}