{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:15Z","timestamp":1750221375074,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CNS-1538418"},{"name":"NSF CREST Grant HRD-1736209"},{"name":"CNS-1423481"},{"name":"NSF Grants CNS-1111925"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176328","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"175-185","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things"],"prefix":"10.1145","author":[{"given":"Asma","family":"Alshehri","sequence":"first","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"James","family":"Benson","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Farhan","family":"Patwa","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio, San Antonio, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2444095"},{"volume-title":"Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. In the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC)","author":"Alshehri Asma","key":"e_1_3_2_1_2_1","unstructured":"Asma Alshehri and Ravi Sandhu . 2016. Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. In the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC) . IEEE , 530--538. Asma Alshehri and Ravi Sandhu. 2016. Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. In the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC). IEEE, 530--538."},{"key":"e_1_3_2_1_3_1","volume-title":"Access Control Models for Virtual Object Communication in Cloud-Enabled IoT The 18th International Conference on Information Reuse and Integration (IRI). IEEE.","author":"Alshehri Asma","year":"2017","unstructured":"Asma Alshehri and Ravi Sandhu . 2017 . Access Control Models for Virtual Object Communication in Cloud-Enabled IoT The 18th International Conference on Information Reuse and Integration (IRI). IEEE. Asma Alshehri and Ravi Sandhu. 2017. Access Control Models for Virtual Object Communication in Cloud-Enabled IoT The 18th International Conference on Information Reuse and Integration (IRI). IEEE."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1385989.1385993"},{"key":"e_1_3_2_1_5_1","volume-title":"Access Control Model for AWS Internet of Things. In International Conference on Network and System Security. Springer, 721--736","author":"Bhatt Smriti","year":"2017","unstructured":"Smriti Bhatt , Farhan Patwa , and Ravi Sandhu . 2017 . Access Control Model for AWS Internet of Things. In International Conference on Network and System Security. Springer, 721--736 . Smriti Bhatt, Farhan Patwa, and Ravi Sandhu. 2017. Access Control Model for AWS Internet of Things. In International Conference on Network and System Security. Springer, 721--736."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.14"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857078"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2012.53"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2498304"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCT.2011.6075156"},{"key":"e_1_3_2_1_13_1","volume-title":"Conference on Sensing Technology (ICST). 374--380","author":"Prahlada Rao BB","year":"2012","unstructured":"BB Prahlada Rao , Paval Saluia , Neetu Sharma , Ankit Mittal , and Shivay Veer Sharma . 2012 . Cloud computing for Internet of Things and sensing based applications Sixth IEEE Int . Conference on Sensing Technology (ICST). 374--380 . BB Prahlada Rao, Paval Saluia, Neetu Sharma, Ankit Mittal, and Shivay Veer Sharma. 2012. Cloud computing for Internet of Things and sensing based applications Sixth IEEE Int. Conference on Sensing Technology (ICST). 374--380."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2015.42"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":15,"alternative-id":["10.1145\/3176258.3176328","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176328","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}