{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T20:35:20Z","timestamp":1724963720467},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,13]],"date-time":"2016-11-13T00:00:00Z","timestamp":1478995200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"CNPQ National Counsel of Technological and Scientific Development)"},{"name":"CAPES (Coordination for the Improvement of Higher Education Personnel)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,13]]},"DOI":"10.1145\/2988272.2988274","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T19:39:50Z","timestamp":1478288390000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["An Authentication and Authorization Infrastructure for the Web of Things"],"prefix":"10.1145","author":[{"given":"Marlon C.","family":"Domenech","sequence":"first","affiliation":[{"name":"Federal Institute Catarinense, Fraiburgo, Brazil"}]},{"given":"Azzedine","family":"Boukerche","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, Canada"}]},{"given":"Michelle S.","family":"Wangham","sequence":"additional","affiliation":[{"name":"University of Vale do Itaja\u00ed, S\u00e3o Jos\u00e9, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2016,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2008.77"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0384-6"},{"key":"e_1_3_2_1_3_1","volume-title":"RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic","author":"Aranha D. F.","year":"2015","unstructured":"D. F. Aranha and C. P. L. Gouv\u00eaa . RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic , 2015 . D. F. Aranha and C. P. L. Gouv\u00eaa. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic, 2015."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370624.1370625"},{"key":"e_1_3_2_1_6_1","first-page":"7228","article-title":"Terminology for constrained-node networks","author":"Bormann C.","year":"2014","unstructured":"C. Bormann , M. Ersue , and A. Keranen . Terminology for constrained-node networks . RFC 7228 , 2014 . C. Bormann, M. Ersue, and A. Keranen. Terminology for constrained-node networks. RFC 7228, 2014.","journal-title":"RFC"},{"key":"e_1_3_2_1_7_1","first-page":"133","volume-title":"A proposal on enhancing xacml with continuous usage control features","author":"Colombo M.","year":"2010","unstructured":"M. Colombo , A. Lazouski , F. Martinelli , and P. Mori . A proposal on enhancing xacml with continuous usage control features . In F. Desprez, V. Getov, T. Priol, and R. Yahyapour, editors, Grids, P2 P and Services Computing, pages 133 -- 146 . Springer , 2010 . M. Colombo, A. Lazouski, F. Martinelli, and P. Mori. A proposal on enhancing xacml with continuous usage control features. In F. Desprez, V. Getov, T. Priol, and R. Yahyapour, editors, Grids, P2P and Services Computing, pages 133--146. Springer, 2010."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Proceedings...","author":"Conzon D.","year":"2012","unstructured":"D. Conzon , T. Bolognesi , P. Brizzi , A. Lotito , R. Tomasi , and M. A. Spirito . The virtus middleware: An xmpp based architecture for secure iot communications . In Proceedings... , pages 1 -- 6 . 21st International Conference on Computer Communications and Networks (ICCCN) , 2012 , 2012. D. Conzon, T. Bolognesi, P. Brizzi, A. Lotito, R. Tomasi, and M. A. Spirito. The virtus middleware: An xmpp based architecture for secure iot communications. In Proceedings..., pages 1--6. 21st International Conference on Computer Communications and Networks (ICCCN), 2012, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2016.89"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1967428.1967442"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2013.02.006"},{"key":"e_1_3_2_1_12_1","first-page":"107","volume-title":"Proceedings","author":"Hanumanthappa P.","year":"2012","unstructured":"P. Hanumanthappa and S. Singh . Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication . In Proceedings , pages 107 -- 112 . International Conference on Innovations in Information Technology (IIT) , 2012 . P. Hanumanthappa and S. Singh. Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication. In Proceedings, pages 107--112. International Conference on Innovations in Information Technology (IIT), 2012."},{"key":"e_1_3_2_1_13_1","unstructured":"ITU. Ngn identity management framework. Recommendation Y.2720 2009. ITU. Ngn identity management framework. Recommendation Y.2720 2009."},{"key":"e_1_3_2_1_14_1","first-page":"196","volume-title":"Consumer Electronics (ICCE), 2015 IEEE International Conference on","author":"Kim Y.-P.","year":"2015","unstructured":"Y.-P. Kim , S. Yoo , and C. Yoo . Daot: Dynamic and energy-aware authentication for smart home appliances in internet of things . In Consumer Electronics (ICCE), 2015 IEEE International Conference on , pages 196 -- 197 , Jan 2015 . Y.-P. Kim, S. Yoo, and C. Yoo. Daot: Dynamic and energy-aware authentication for smart home appliances in internet of things. In Consumer Electronics (ICCE), 2015 IEEE International Conference on, pages 196--197, Jan 2015."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.23"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.06.013"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICET.2014.7021016"},{"key":"e_1_3_2_1_18_1","first-page":"248","volume-title":"Proceedings...","author":"Nguyen T.","year":"2010","unstructured":"T. Nguyen , A. Al-Saffar , and E. Huh . A dynamic id-based authentication scheme . In Proceedings... , pages 248 -- 253 . Sixth International Conference on Networked Computing and Advanced Information Management (NCM) , 2010 , 2010. T. Nguyen, A. Al-Saffar, and E. Huh. A dynamic id-based authentication scheme. In Proceedings..., pages 248--253. Sixth International Conference on Networked Computing and Advanced Information Management (NCM), 2010, 2010."},{"key":"e_1_3_2_1_19_1","volume-title":"Authentication context for the oasis security assertion markup language (saml) v2.0, mar","author":"OASIS.","year":"2005","unstructured":"OASIS. Authentication context for the oasis security assertion markup language (saml) v2.0, mar 2005 . OASIS. Authentication context for the oasis security assertion markup language (saml) v2.0, mar 2005."},{"key":"e_1_3_2_1_20_1","volume-title":"Metadata for the oasis security assertion markup language (saml) v2.0 - errata composite - working draft 04, dec","author":"OASIS.","year":"2009","unstructured":"OASIS. Metadata for the oasis security assertion markup language (saml) v2.0 - errata composite - working draft 04, dec 2009 . OASIS. Metadata for the oasis security assertion markup language (saml) v2.0 - errata composite - working draft 04, dec 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"extensible access control markup language (xacml) version 3.0, jan","author":"OASIS.","year":"2013","unstructured":"OASIS. extensible access control markup language (xacml) version 3.0, jan 2013 . OASIS. extensible access control markup language (xacml) version 3.0, jan 2013."},{"key":"e_1_3_2_1_22_1","volume-title":"The 2000 Symposium on Cryptography and Information Security","author":"Sakai R.","year":"2000","unstructured":"R. Sakai , K. Ohgishi , and M. Kasahara . Cryptosystems based on pairings . In The 2000 Symposium on Cryptography and Information Security , Okinawa, Japan, pages 135--148 , 2000 . R. Sakai, K. Ohgishi, and M. Kasahara. Cryptosystems based on pairings. In The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan, pages 135--148, 2000."},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"Proceedings...","author":"Seitz L.","year":"2013","unstructured":"L. Seitz , G. Selander , and C. Gehrmann . Authorization framework for the internet-of-things . In Proceedings... , pages 1 -- 6 . IEEE 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) , 2013 . L. Seitz, G. Selander, and C. Gehrmann. Authorization framework for the internet-of-things. In Proceedings..., pages 1--6. IEEE 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2013."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.4304\/jcm.6.6.424-438"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"}],"event":{"name":"MSWiM '16: 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Malta Malta","acronym":"MSWiM '16","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"]},"container-title":["Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2988272.2988274","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T02:34:16Z","timestamp":1672972456000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988272.2988274"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,13]]},"references-count":25,"alternative-id":["10.1145\/2988272.2988274","10.1145\/2988272"],"URL":"https:\/\/doi.org\/10.1145\/2988272.2988274","relation":{},"subject":[],"published":{"date-parts":[[2016,11,13]]},"assertion":[{"value":"2016-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}