Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993. ,
Specifying discretionary access control policy for distributed systems, Computer Communications, vol.13, issue.9, pp.571-580, 1990. ,
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
NIST Special Publication 800-162. Guide to Attribute Based Access Control (ABAC) Definition and Considerations ,
, The Evolution of Access Control Models
Distributed Capability-based Access Control for the Internet of Things, Journal of Internet Services and Information Security, pp.1-16 ,
On the Features and Challenges of Security and Privacy in Distributed Internet of Things, Computer Networks, vol.57, issue.10, pp.2266-2279, 2013. ,
Constrained Application Protocol(CoAP), 2013. ,
Programming Semantics for Multiprogrammed Computations, Communications of the ACM, vol.9, issue.3, pp.143-155, 1966. ,
, RFC2693: SPKICertiteey
A capability-based security approach to manage access control in the internet of things, Mathematical and Computer Modelling, vol.58, issue.5-6, pp.1189-1205, 2013. ,
Role-based access control (RBAC):Features and motivations. InProc. of 11th Annual Computer Security Application Conference, pp.241-248, 1995. ,