{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:57:51Z","timestamp":1730267871729,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/indin.2017.8104926","type":"proceedings-article","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T16:34:58Z","timestamp":1511886898000},"page":"1096-1102","source":"Crossref","is-referenced-by-count":2,"title":["Providing an access control layer to web-based applications for the industrial domain"],"prefix":"10.1109","author":[{"given":"Samuel Olaiya","family":"Afolaranmi","sequence":"first","affiliation":[]},{"given":"Borja Ramis","family":"Ferrer","sequence":"additional","affiliation":[]},{"given":"Wael M.","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Jose L.","family":"Martinez Lastra","sequence":"additional","affiliation":[]},{"given":"Mussawar","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Harrison","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6749"},{"key":"ref38","article-title":"Principles of Information Security","author":"whitman","year":"2011","journal-title":"Cengage Learning"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2016.0194"},{"key":"ref32","first-page":"327","article-title":"Methodology to Obtain the Security Controls in Multi-cloud Applications","author":"afolaranmi","year":"2017","journal-title":"presented at the 6th International Conference on Cloud Computing and Services Science"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/3PGCIC.2015.30"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SecTech.2014.15"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CyberC.2016.19"},{"journal-title":"Access Control Cheat Sheet - OWASP","year":"0","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/9781118821930"},{"key":"ref34","first-page":"137","article-title":"Access Control: Policies, Models, and Mechanisms","author":"samarati","year":"2000","journal-title":"Foundations of Security Analysis and Design"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2016.7793563"},{"journal-title":"Index l Node js v7 7 3 Documentation","year":"0","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1243\/09544054JEM1241"},{"key":"ref12","first-page":"34","article-title":"Connecting the Digital World with the Factory Floor","volume":"1","author":"waurzyniak","year":"2014","journal-title":"Manufacturing Media Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2008.4638461"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2006.322972"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2015.04.121"},{"key":"ref16","first-page":"13","article-title":"Smart factories - manufacturing environments and systems of the future","author":"westk\u00e4mper","year":"2003","journal-title":"Progress in Virtual Manufacturing Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2016.06.005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2015.04.008"},{"journal-title":"Lee and Seshia Introduction to Embedded Systems","year":"0","key":"ref19"},{"journal-title":"Cascading Style Sheets","year":"0","key":"ref28"},{"journal-title":"INCONTROL Simulation Solutions","article-title":"Home","year":"0","key":"ref4"},{"journal-title":"Scalable Vector Graphics (SVG) 1 1","year":"0","key":"ref27"},{"journal-title":"Discrete Event Simulation Software | Manufacturing Supply Chain & Healthcare Simulation Software | Arena Simulation","year":"0","key":"ref3"},{"key":"ref6","first-page":"714","article-title":"IIoT based efficiency monitoring of a Gantry robot","author":"fam\u00e9","year":"2016","journal-title":"2016 IEEE 14th International Conference on Industrial Informatics (INDIN)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCCEE.2017.7866696"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2521931"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2014.6945604"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2016.7819150"},{"journal-title":"PLM-Product Lifecycle Management Siemens PLM Software","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2016.7794139"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2510665"},{"journal-title":"The history of the Web - W3C Wiki","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2013.6622882"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2013.6622919"},{"journal-title":"Passport","year":"0","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2015.7281879"},{"journal-title":"Express 4 x - API Reference","year":"0","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2014.6945517"},{"journal-title":"HTML 5 1","year":"0","key":"ref26"},{"journal-title":"The MongoDB 3 4 Manual — MongoDB Manual 3 4","year":"0","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2013.6622969"}],"event":{"name":"2017 IEEE 15th International Conference on Industrial Informatics (INDIN)","start":{"date-parts":[[2017,7,24]]},"location":"Emden","end":{"date-parts":[[2017,7,26]]}},"container-title":["2017 IEEE 15th International Conference on Industrial Informatics (INDIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8095148\/8104734\/08104926.pdf?arnumber=8104926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,27]],"date-time":"2020-03-27T12:13:31Z","timestamp":1585311211000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8104926\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/indin.2017.8104926","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}