R. S. , Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993.

J. Moffett, M. Sloman, and K. Twidle, Specifying discretionary access control policy for distributed systems, Computer Communications, vol.13, issue.9, pp.571-580, 1990.

R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996.

C. Vincent, NIST Special Publication 800-162. Guide to Attribute Based Access Control (ABAC) Definition and Considerations

A. From and . Zbac, The Evolution of Access Control Models

L. Hernandez-ramos, J. Jara, L. Martin, and F. Skarmeta, Distributed Capability-based Access Control for the Internet of Things, Journal of Internet Services and Information Security, pp.1-16

R. Rom´an, J. Zhou, and J. L´opez, On the Features and Challenges of Security and Privacy in Distributed Internet of Things, Computer Networks, vol.57, issue.10, pp.2266-2279, 2013.

Z. Shelby, K. Hartke, and . Bormann, Constrained Application Protocol(CoAP), 2013.

J. Dennis and E. V. Horn, Programming Semantics for Multiprogrammed Computations, Communications of the ACM, vol.9, issue.3, pp.143-155, 1966.

C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas et al., RFC2693: SPKICertiteey

S. Gusmeroli, S. Piccione, and D. Rotondi, A capability-based security approach to manage access control in the internet of things, Mathematical and Computer Modelling, vol.58, issue.5-6, pp.1189-1205, 2013.

D. Ferraiolo, J. Cugini, and . Kuhn, Role-based access control (RBAC):Features and motivations. InProc. of 11th Annual Computer Security Application Conference, pp.241-248, 1995.