O. Alphand, M. Amoretti, T. Claeys, S. Dallasta, A. Duda et al., Iotchain: A blockchain security architecture for the internet of things, IEEE Wireless Communications and Networking Conference, vol.30100, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01705455

K. Ashton, That internet of things thing, RFID journal, vol.22, issue.7, pp.97-114, 2009.

J. Bernabe, J. H. Ramos, and A. S. Gomez, TACIoT: multidimensional trust-aware access control system for the internet of things. Soft Computing, 2015.

C. Bormann and P. Hoffman, Concise binary object representation (CBOR), IETF RFC, p.7049, 2013.

T. T. Dinh, R. Liu, M. Zhang, G. Chen, B. C. Ooi et al., Untangling blockchain: A data processing view of blockchain systems, IEEE Trans. Knowl. Data Eng, vol.30, issue.7, pp.1366-1385, 2018.

D. Ferraiolo and D. Kuhn, Role-based access control, 15th National Computer Security Conference p, p.554563, 1992.

S. Gusmeroli, S. Piccione, and D. Rotondi, A capability-based security approach to manage access control in the internet of things, vol.58, pp.1189-1205, 2013.

D. Hardt, The oauth 2.0 authorization framework. RFC 6749, RFC Editor, 2012.

J. Hernàndez-ramos, A. Jara, L. Marín, and A. S. Gómez, DCapBAC: embedding authorization logic into smart things through ECC optimizations, 2016.

V. C. Hu, D. Ferraiolo, R. Kuhn, A. R. Friedman, A. J. Lang et al., Guide to attribute based access control (ABAC) definition and considerations (draft), NIST special publication, vol.800, issue.162, 2013.

A. A. Kalam, S. Benferhat, A. Miège, R. E. Baida, F. Cuppens et al., Organization based access contro, 4th IEEE International Workshop on Policies for Distributed Systems and Networks, p.120, 2003.

D. D. Maesa, P. Mori, and L. Ricci, Blockchain based access control, Distributed Applications and Interoperable Systems, vol.10320, pp.206-220, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01800124

S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2009.

M. Nuss, A. Puchta, and M. Kunz, Towards blockchain-based identity and access management for internet of things in enterprises, Trust, Privacy and Security in Digital Business -15th International Conference TrustBus, vol.11033, pp.167-181, 2018.

A. Ouaddah, H. Mousannif, A. Elkalam, and A. Ouahman, Access control in the internet of things: Big challenges and new opportunities, vol.112, p.237262, 2016.

A. Pfitzmann and M. Köhntopp, Anonymity, unobservability, and pseudonymity -A proposal for terminology, Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, pp.1-9, 2000.

R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM, vol.21, issue.2, pp.120-126, 1978.

Z. Shelby, K. Hartke, and C. Bormann, The constrained application protocol (coap), IETF RFC, vol.7252, p.10, 2014.

U. U. Uchibeke, S. H. Kassani, K. A. Schneider, and R. Deters, Blockchain access control ecosystem for big data security, 2018.

R. Xu, Y. Chen, E. Blasch, and G. Chen, Blendcac: A smart contract enabled decentralized capability-based access control mechanism for the iot, Computers, vol.7, issue.3, p.39, 2018.