{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T12:49:13Z","timestamp":1750942153284,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation of Korea (NRF) by the Korea government (MSIT)","award":["2021R1A2C2012635"],"award-info":[{"award-number":["2021R1A2C2012635"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3477314.3507051","type":"proceedings-article","created":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:37:36Z","timestamp":1651883856000},"page":"22-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Security interoperability in heterogeneous IoT platforms"],"prefix":"10.1145","author":[{"given":"Se-Ra","family":"Oh","sequence":"first","affiliation":[{"name":"Miro Corporation, Republic of Korea"}]},{"given":"Jahoon","family":"Koo","sequence":"additional","affiliation":[{"name":"Sejong University, Republic of Korea"}]},{"given":"Young-Gab","family":"Kim","sequence":"additional","affiliation":[{"name":"Sejong University, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,5,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PlatCon.2017.7883727"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Dick Hardt et al. 2012. The OAuth 2.0 authorization framework. Technical Report. RFC 6749 October.","DOI":"10.17487\/rfc6749"},{"key":"e_1_3_2_1_3_1","unstructured":"Ann Bosche. 2020. US industrials confront implementation barriers to the IoT bain company. Available: https:\/\/www.bain.com\/insights\/us-industrials-confront-implementation-barriers-to-the-iot-snap-chart\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19081884"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19061433"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3067354"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720906388"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISTI.2014.6877069"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2014.8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2015.7354740"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802823"},{"key":"e_1_3_2_1_12_1","volume-title":"OpenID Connect Core 1.0. Available: https:\/\/openid.net\/specs\/openid-connect-core-1_0.html","author":"Foundation ID","year":"2014","unstructured":"OpenID Foundation. (2014). OpenID Connect Core 1.0. Available: https:\/\/openid.net\/specs\/openid-connect-core-1_0.html."},{"volume-title":"Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","author":"Navas Renzo E.","key":"e_1_3_2_1_13_1","unstructured":"Renzo E. Navas, Manuel Lagos, Laurent Toutain, and Kumaran Vijayasankar. 2016. Nonce-based authenticated key establishment over OAuth 2.0 IoT proof-of-possession architecture. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, 317--322."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Michael B. Jones John Bradley and Hannes Tschofenig. 2016. Proof-of-possession key semantics for JSON Web Tokens (JWTs). RFC 7800. Available: https:\/\/tools.ietf.org\/html\/rfc7800.","DOI":"10.17487\/RFC7800"},{"key":"e_1_3_2_1_15_1","unstructured":"Ludwig Seitz Goeran Selander Erik Wahlstroem Samuel Erdtman and Hannes Tschofenig. 2015. Authorization for the Internet of Things using OAuth 2.0. Available: http:\/\/art.tools.ietf.org\/pdf\/draft-ietf-ace-oauth-authz-01.pdf."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIoT.2017.00006"},{"key":"e_1_3_2_1_17_1","volume-title":"Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios","author":"Cirani Simone","year":"2014","unstructured":"Simone Cirani, Marco Picone, Pietro Gonizzi, Luca Veltri, and Gianluigi Ferrari. 2014. Iot-oas: An oauth-based authorization service architecture for secure services in iot scenarios. IEEE sensors journal 15, 2 (2014), 1224--1234."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2016.7917942"},{"key":"e_1_3_2_1_19_1","first-page":"329","article-title":"Design and implementation of CoAP authorization framework based on OAuth 2.0","volume":"6","author":"Kim Kyoung-Han","year":"2017","unstructured":"Kyoung-Han Kim, Hyun-Kyo Lim, Joo-Seong Heo, and Youn-Hee Han. 2017. Design and implementation of CoAP authorization framework based on OAuth 2.0. Trans. Comput. Commun. Syst 6 (2017), 329--342.","journal-title":"Trans. Comput. Commun. Syst"},{"key":"e_1_3_2_1_20_1","volume-title":"2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). IEEE, 1--4.","author":"Chung Seung-Hwa","year":"2017","unstructured":"Seung-Hwa Chung, Jee Hyeok Kim, and YoungJin Kim. 2017. Pragmatic approach using OAuth mechanism for IoT device authorization in cloud. In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN). IEEE, 1--4."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024606"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717712627"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.014"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-017-9411-6"},{"volume-title":"2019 IEEE 5th World Forum on Internet of Things (WF-IoT)","author":"Siris Vasilios A","key":"e_1_3_2_1_25_1","unstructured":"Vasilios A Siris, Dimitrios Dimopoulos, Nikos Fotiou, Spyros Voulgaris, and George C Polyzos. 2019. OAuth 2.0 meets blockchain for authorization in constrained IoT environments. In 2019 IEEE 5th World Forum on Internet of Things (WF-IoT). IEEE, 364--367."},{"key":"e_1_3_2_1_26_1","volume-title":"Ishan Ranasinghe and Logan Widick","author":"Jonnada Srikanth","year":"2018","unstructured":"Srikanth Jonnada, Ram Dantu, Pradhumna Shrestha, Ishan Ranasinghe and Logan Widick. 2018. An OAuth-based authorization framework for access control in remote collaboration systems. In 2018 the national cyber summit (NCS). IEEE, 38--44."},{"key":"e_1_3_2_1_27_1","article-title":"Token-based security for the Internet of Things with dynamic energy-quality tradeoff","volume":"6","author":"Aman Muhammad Naveed","year":"2018","unstructured":"Muhammad Naveed Aman, Sachin Taneja, Biplab Sikdar, Kee Chaing Chua, and Massimo Alioto. 2018. Token-based security for the Internet of Things with dynamic energy-quality tradeoff. IEEE Internet of Things Journal 6, 2 (2019). 2843--2859","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IE49459.2020.9154940"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926556"},{"key":"e_1_3_2_1_30_1","volume-title":"eIDAS. Available: https:\/\/www.eid.as\/","author":"EU.","year":"2014","unstructured":"EU. (2014). eIDAS. Available: https:\/\/www.eid.as\/."},{"volume-title":"OAuthing: privacy-enhancing federation for the internet of things. In 2016 Cloudification of the Internet of Things (CIoT)","author":"Fremantle Paul","key":"e_1_3_2_1_31_1","unstructured":"Paul Fremantle and Benjamin Aziz. 2016. OAuthing: privacy-enhancing federation for the internet of things. In 2016 Cloudification of the Internet of Things (CIoT). IEEE, 1--6."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6819"},{"key":"e_1_3_2_1_33_1","unstructured":"Torsten Lodderstedt John Bradley Andrey Labunets and Daniel Fett. 2018. OAuth 2.0 security best current practice."},{"key":"e_1_3_2_1_34_1","unstructured":"Nat Sakimura John Bradley and Naveen Agarwal. 2015. Proof key for code exchange by oauth public clients."}],"event":{"name":"SAC '22: The 37th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Virtual Event","acronym":"SAC '22"},"container-title":["Proceedings of the 37th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3477314.3507051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:27Z","timestamp":1750188687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3477314.3507051"}},"subtitle":["threat model of the interoperable OAuth 2.0 framework"],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":34,"alternative-id":["10.1145\/3477314.3507051","10.1145\/3477314"],"URL":"https:\/\/doi.org\/10.1145\/3477314.3507051","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-05-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}