Iotchain: A blockchain security architecture for the internet of things, IEEE Wireless Communications and Networking Conference, vol.30100, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01705455
That internet of things thing, RFID journal, vol.22, issue.7, pp.97-114, 2009. ,
, TACIoT: multidimensional trust-aware access control system for the internet of things. Soft Computing, 2015.
Concise binary object representation (CBOR), IETF RFC, p.7049, 2013. ,
Untangling blockchain: A data processing view of blockchain systems, IEEE Trans. Knowl. Data Eng, vol.30, issue.7, pp.1366-1385, 2018. ,
Role-based access control, 15th National Computer Security Conference p, p.554563, 1992. ,
A capability-based security approach to manage access control in the internet of things, vol.58, pp.1189-1205, 2013. ,
The oauth 2.0 authorization framework. RFC 6749, RFC Editor, 2012. ,
DCapBAC: embedding authorization logic into smart things through ECC optimizations, 2016. ,
Guide to attribute based access control (ABAC) definition and considerations (draft), NIST special publication, vol.800, issue.162, 2013. ,
Organization based access contro, 4th IEEE International Workshop on Policies for Distributed Systems and Networks, p.120, 2003. ,
Blockchain based access control, Distributed Applications and Interoperable Systems, vol.10320, pp.206-220, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01800124
Bitcoin: A peer-to-peer electronic cash system, 2009. ,
Towards blockchain-based identity and access management for internet of things in enterprises, Trust, Privacy and Security in Digital Business -15th International Conference TrustBus, vol.11033, pp.167-181, 2018. ,
, Access control in the internet of things: Big challenges and new opportunities, vol.112, p.237262, 2016.
Anonymity, unobservability, and pseudonymity -A proposal for terminology, Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, pp.1-9, 2000. ,
A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol.21, issue.2, pp.120-126, 1978. ,
The constrained application protocol (coap), IETF RFC, vol.7252, p.10, 2014. ,
Blockchain access control ecosystem for big data security, 2018. ,
Blendcac: A smart contract enabled decentralized capability-based access control mechanism for the iot, Computers, vol.7, issue.3, p.39, 2018. ,