Raspberry pi 3 model b+. https://www.raspberrypi.org/products/raspberry-pi-3-model-b-plus/
Raspbian, version 10.3, 13 February, 2020. https://www.raspbian.org/. Accessed 11 March 2020
Date, C.J.: An Introduction to Database Systems, 8th edn. Addison Wesley, Boston, MA, USA (2003)
MATH
Google Scholar
Denning, D.E.R.: Cryptography and Data Security. Addison Wesley, Boston, MA, USA (1982)
MATH
Google Scholar
Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., Henry, J.: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press, Indianapolis, IN, USA (2018)
Google Scholar
Hernández-Ramos, J.L., Jara, A.J., Marín, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. 3(3/4), 1–16 (2013)
Google Scholar
Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ecdsa). Int. J. Inf. Secur. 1(1), 36–63 (2001)
CrossRef
Google Scholar
Nakamura, S., Duolikun, D., Aikebaier, A., Enokido, T., Takizawa, M.: Read-write abortion (RWA) based synchronization protocols to prevent illegal information flow. In: Proceedings of the 17th International Conference on Network-Based Information Systems, pp. 120–127 (2014)
Google Scholar
Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: A read-write abortion protocol to prevent illegal information flow in role-based access control systems. Int. J. Space-Based Situated Comput. 6(1), 43–53 (2016)
CrossRef
Google Scholar
Nakamura, S., Enokido, T., Takizawa, M.: Causally ordering delivery of event messages in P2PPSO systems. Cogn. Syst. Res. 56, 167–178 (2019)
CrossRef
Google Scholar
Nakamura, S., Enokido, T., Takizawa, M.: Information flow control in object-based peer-to-peer publish/subscribe systems. Concurrency Comput. Pract. Exp. 32(8), e5118 (2020)
CrossRef
Google Scholar
Nakamura, S., Enokido, T., Takizawa, M.: A capability token selection algorithm for lightweight information flow control in the IoT. In: Proceedings of the 24th International Conference on Network-Based Information Systems, pp. 23–34 (2021)
Google Scholar
Nakamura, S., Enokido, T., Takizawa, M.: Implementation and evaluation of the information flow control for the internet of things. Concurrency Comput. Pract. Exp. (2021). https://doi.org/10.1002/cpe.6311
CrossRef
Google Scholar
Nakamura, S., Enokido, T., Takizawa, M.: Information flow control based on capability token validity for secure IoT: implementation and evaluation. IoT Eng. Cyber Phys. Hum. (2021). https://doi.org/10.1016/j.iot.2021.100423
Oma, R., Nakamura, S., Duolikun, D., Enokido, T., Takizawa, M.: An energy-efficient model for fog computing in the internet of things (IoT). IoT Eng. Cyber Phys. Hum. Syst. 1-2, 14–26 (2018)
Google Scholar
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)
CrossRef
Google Scholar
Shelby, Z., Hartke, K., Bormann, C.: Constrained application protocol (COAP). IFTF Internet-draft (2013). http://tools.ietf.org/html/draft-ietf-core-coap-18
Tanganelli, G., Vallati, C., Mingozzi, E.: CoAPthon: Easy development of CoAP-based IoT applications with python. In: IEEE 2nd World Forum on Internet of Things (WF-IoT 2015), pp. 63–68 (2015)
Google Scholar
Yuan, E., Tong, J.: Attributed based access control (ABAC) for web services. In: Proceedings of the IEEE International Conference on Web Services (ICWS 2005), p. 569 (2005)
Google Scholar