{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:19Z","timestamp":1750306459589,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T00:00:00Z","timestamp":1441584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Labex MS2T"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,7]]},"DOI":"10.1145\/2797044.2797052","type":"proceedings-article","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T20:08:52Z","timestamp":1440706132000},"page":"29-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Lyes","family":"Touati","sequence":"first","affiliation":[{"name":"Universit\u00e9 de Technologie de Compi\u00e8gne, Compi\u00e8gne, France"}]},{"given":"Yacine","family":"Challal","sequence":"additional","affiliation":[{"name":"Ecole nationale Sup\u00e9rieure d'Informatique, Algiers, Algeria"}]}],"member":"320","published-online":{"date-parts":[[2015,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.053461"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"A fuzzy approach to trust based access control in internet of things","author":"Mahalle P.","year":"2013","unstructured":"P. Mahalle , P. Thakre , N. Prasad , and R. Prasad , \" A fuzzy approach to trust based access control in internet of things ,\" in VITAE , 2013 , pp. 1 -- 5 . P. Mahalle, P. Thakre, N. Prasad, and R. Prasad, \"A fuzzy approach to trust based access control in internet of things,\" in VITAE, 2013, pp. 1--5.","journal-title":"VITAE"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.03.013"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"issue":"4","key":"e_1_3_2_1_5_1","first-page":"309","article-title":"Identity authentication and capability based access control (iacac) for the internet of things","volume":"1","author":"Mahalle N. R. P.","year":"2013","unstructured":"N. R. P. Parikshit N. Mahalle , Bayu Anggorojati and R. Prasad , \" Identity authentication and capability based access control (iacac) for the internet of things ,\" Journal of Cyber Security and Mobility , vol. 1 , no. 4 , pp. 309 -- 348 , 2013 . N. R. P. Parikshit N. Mahalle, Bayu Anggorojati and R. Prasad, \"Identity authentication and capability based access control (iacac) for the internet of things,\" Journal of Cyber Security and Mobility, vol. 1, no. 4, pp. 309--348, 2013.","journal-title":"Journal of Cyber Security and Mobility"},{"key":"e_1_3_2_1_6_1","first-page":"604","volume-title":"2012 15th International Symposium on","author":"Anggorojati B.","year":"2012","unstructured":"B. Anggorojati , P. Mahalle , N. Prasad , and R. Prasad , \" Capability-based access control delegation model on the federated iot network,\" in Wireless Personal Multimedia Communications (WPMC) , 2012 15th International Symposium on , Sept 2012 , pp. 604 -- 608 . B. Anggorojati, P. Mahalle, N. Prasad, and R. Prasad, \"Capability-based access control delegation model on the federated iot network,\" in Wireless Personal Multimedia Communications (WPMC), 2012 15th International Symposium on, Sept 2012, pp. 604--608."},{"issue":"5","key":"e_1_3_2_1_7_1","first-page":"6","article-title":"A capability-based security approach to manage access control in the internet of things","volume":"58","author":"Gusmeroli S.","year":"2013","unstructured":"S. Gusmeroli , S. Piccione , and D. Rotondi , \" A capability-based security approach to manage access control in the internet of things ,\" Mathematical and Computer Modelling , vol. 58 , no. 5 -- 6 , 2013 . S. Gusmeroli, S. Piccione, and D. Rotondi, \"A capability-based security approach to manage access control in the internet of things,\" Mathematical and Computer Modelling, vol. 58, no. 5--6, 2013.","journal-title":"Mathematical and Computer Modelling"},{"key":"e_1_3_2_1_8_1","volume-title":"Piratte: Proxy-based immediate revocation of attribute-based encryption,\" arXiv preprint arXiv:1208.4877","author":"Jahid S.","year":"2012","unstructured":"S. Jahid and N. Borisov , \" Piratte: Proxy-based immediate revocation of attribute-based encryption,\" arXiv preprint arXiv:1208.4877 , 2012 . S. Jahid and N. Borisov, \"Piratte: Proxy-based immediate revocation of attribute-based encryption,\" arXiv preprint arXiv:1208.4877, 2012."}],"event":{"name":"MobiCom'15: The 21th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Paris France","acronym":"MobiCom'15"},"container-title":["Proceedings of the 1st International Workshop on Experiences with the Design and Implementation of Smart Objects"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2797044.2797052","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2797044.2797052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:29Z","timestamp":1750225409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2797044.2797052"}},"subtitle":["Activity-Based Access Control for IoT"],"short-title":[],"issued":{"date-parts":[[2015,9,7]]},"references-count":8,"alternative-id":["10.1145\/2797044.2797052","10.1145\/2797044"],"URL":"https:\/\/doi.org\/10.1145\/2797044.2797052","relation":{},"subject":[],"published":{"date-parts":[[2015,9,7]]},"assertion":[{"value":"2015-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}