Time‐based legality of information flow in the capability‐based access control model for the Internet of Things

Summary The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC mo...

Full description

Saved in:
Bibliographic Details
Published inConcurrency and computation Vol. 33; no. 23
Main Authors Nakamura, Shigenari, Enokido, Tomoya, Takizawa, Makoto
Format Journal Article
LanguageEnglish
Published Hoboken Wiley Subscription Services, Inc 10.12.2021
Subjects
Online AccessGet full text
ISSN1532-0626
1532-0634
DOI10.1002/cpe.5944

Cover

Abstract Summary The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC model, information which a subject is not allowed to get may illegally flow to the subject. Hence, the operation interruption (OI) protocol to prevent illegal information flow is proposed in our previous studies. However, although a subject is not allowed to get data at time τ, the subject can get the data later than the time τ. Here, the data come to the subject later than expected by the subject to get the data, that is, the information flows late to the subject. In this article, we newly propose a time‐based OI (TBOI) protocol to prevent not only illegal information flow but also late information flow. Here, operations implying illegal or late information flow are interrupted, that is, not performed at devices. In the evaluation, we show not only illegal information flow but also late information flow are prevented in the TBOI protocol differently from the OI protocol.
AbstractList The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC model, information which a subject is not allowed to get may illegally flow to the subject. Hence, the operation interruption (OI) protocol to prevent illegal information flow is proposed in our previous studies. However, although a subject is not allowed to get data at time , the subject can get the data later than the time . Here, the data come to the subject later than expected by the subject to get the data, that is, the information flows late to the subject. In this article, we newly propose a time‐based OI (TBOI) protocol to prevent not only illegal information flow but also late information flow. Here, operations implying illegal or late information flow are interrupted, that is, not performed at devices. In the evaluation, we show not only illegal information flow but also late information flow are prevented in the TBOI protocol differently from the OI protocol.
Summary The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC model, information which a subject is not allowed to get may illegally flow to the subject. Hence, the operation interruption (OI) protocol to prevent illegal information flow is proposed in our previous studies. However, although a subject is not allowed to get data at time τ, the subject can get the data later than the time τ. Here, the data come to the subject later than expected by the subject to get the data, that is, the information flows late to the subject. In this article, we newly propose a time‐based OI (TBOI) protocol to prevent not only illegal information flow but also late information flow. Here, operations implying illegal or late information flow are interrupted, that is, not performed at devices. In the evaluation, we show not only illegal information flow but also late information flow are prevented in the TBOI protocol differently from the OI protocol.
The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC model, information which a subject is not allowed to get may illegally flow to the subject. Hence, the operation interruption (OI) protocol to prevent illegal information flow is proposed in our previous studies. However, although a subject is not allowed to get data at time τ, the subject can get the data later than the time τ. Here, the data come to the subject later than expected by the subject to get the data, that is, the information flows late to the subject. In this article, we newly propose a time‐based OI (TBOI) protocol to prevent not only illegal information flow but also late information flow. Here, operations implying illegal or late information flow are interrupted, that is, not performed at devices. In the evaluation, we show not only illegal information flow but also late information flow are prevented in the TBOI protocol differently from the OI protocol.
Author Nakamura, Shigenari
Enokido, Tomoya
Takizawa, Makoto
Author_xml – sequence: 1
  givenname: Shigenari
  orcidid: 0000-0003-1064-4056
  surname: Nakamura
  fullname: Nakamura, Shigenari
  email: nakamura.shigenari@gmail.com
  organization: Tokyo Metropolitan Industrial Technology Research Institute
– sequence: 2
  givenname: Tomoya
  orcidid: 0000-0003-1990-466X
  surname: Enokido
  fullname: Enokido, Tomoya
  organization: Rissho University
– sequence: 3
  givenname: Makoto
  surname: Takizawa
  fullname: Takizawa, Makoto
  organization: Hosei University
BookMark eNp1kM1Kw0AUhQepYFsFH2HAjZvU-UnSZCmlaqGgi7oOk8mddkoyE2emlO58BJ_RJzFpxYXo6l4u3zmHe0ZoYKwBhK4pmVBC2J1sYZLkcXyGhjThLCIpjwc_O0sv0Mj7LSGUEk6HyK90A5_vH6XwUOEa1qLW4YCtwtoo6xoRtDVY1XbfHXDYAJaiFaXuqR-ZkBK8x9Ka4GyNG1tBjTv1kV-YAM5A6D1XG23W_hKdK1F7uPqeY_T6MF_NnqLl8-Nidr-MJO8-iGJB84ryqeBCZTKpMpAs5qVkrCyzCmLFUimmNCVU5GVZAVeSS1olLGFqKtOEj9HNybd19m0HPhRbu3OmiyxYF5BleR7zjro9UdJZ7x2oonW6Ee5QUFL0lRZdpUVfaYdOfqFSh2NDwQld_yWIToK9ruHwr3Exe5kf-S9GnYzU
CitedBy_id crossref_primary_10_1002_cpe_6311
crossref_primary_10_1016_j_iot_2023_100992
crossref_primary_10_1016_j_iot_2022_100542
crossref_primary_10_1016_j_jisa_2023_103446
crossref_primary_10_1016_j_iot_2021_100423
crossref_primary_10_1109_ACCESS_2023_3347495
Cites_doi 10.1007/978-3-030-15035-8_55
10.1007/s11761-019-00275-9
10.1145/857076.857078
10.1504/IJSSC.2016.076564
10.1109/AINA.2016.152
10.1109/TIE.2010.2051393
10.1002/cpe.5316
10.1016/j.mcm.2013.02.006
10.1109/AINA.2017.164
10.1109/AINA.2018.00166
10.1007/s00779-010-0353-1
10.1109/TCE.2010.5606273
10.1002/cpe.5118
10.4018/IJMCMC.2019100102
10.1109/ICWS.2005.25
10.1109/2.485845
10.3233/JHS-180593
ContentType Journal Article
Copyright 2020 John Wiley & Sons Ltd
2021 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2020 John Wiley & Sons Ltd
– notice: 2021 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/cpe.5944
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef

Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1532-0634
EndPage n/a
ExternalDocumentID 10_1002_cpe_5944
CPE5944
Genre article
GrantInformation_xml – fundername: Japan Society for the Promotion of Science
  funderid: JP17J00106
GroupedDBID .3N
.DC
.GA
05W
0R~
10A
1L6
1OC
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHHS
AAHQN
AAMNL
AANLZ
AAONW
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABEML
ABIJN
ACAHQ
ACCFJ
ACCZN
ACPOU
ACSCC
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
ADZOD
AEEZP
AEIGN
AEIMD
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZBYB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
EBS
F00
F01
F04
F5P
G-S
G.N
GNP
GODZA
HGLYW
HHY
HZ~
IX1
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LH4
LITHE
LOXES
LP6
LP7
LUTES
LYRES
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
O66
O9-
OIG
P2W
P2X
P4D
PQQKQ
Q.N
Q11
QB0
QRW
R.K
ROL
RWI
RX1
SUPJJ
TN5
UB1
V2E
W8V
W99
WBKPD
WIH
WIK
WOHZO
WQJ
WRC
WXSBR
WYISQ
WZISG
XG1
XV2
~IA
~WT
AAYXX
ADMLS
AEYWJ
AGHNM
AGYGG
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c3594-4a19d137a3af8c5d8ec243bc22bb8de4f26ca71601a9bbde3fc3c1d5252f7c653
IEDL.DBID DR2
ISSN 1532-0626
IngestDate Fri Jul 25 06:07:42 EDT 2025
Tue Jul 01 00:34:04 EDT 2025
Thu Apr 24 22:58:49 EDT 2025
Wed Jan 22 16:26:58 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 23
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c3594-4a19d137a3af8c5d8ec243bc22bb8de4f26ca71601a9bbde3fc3c1d5252f7c653
Notes Funding information
Japan Society for the Promotion of Science, JP17J00106
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-1990-466X
0000-0003-1064-4056
PQID 2594889943
PQPubID 2045170
PageCount 12
ParticipantIDs proquest_journals_2594889943
crossref_primary_10_1002_cpe_5944
crossref_citationtrail_10_1002_cpe_5944
wiley_primary_10_1002_cpe_5944_CPE5944
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 10 December 2021
PublicationDateYYYYMMDD 2021-12-10
PublicationDate_xml – month: 12
  year: 2021
  text: 10 December 2021
  day: 10
PublicationDecade 2020
PublicationPlace Hoboken
PublicationPlace_xml – name: Hoboken
PublicationTitle Concurrency and computation
PublicationYear 2021
Publisher Wiley Subscription Services, Inc
Publisher_xml – name: Wiley Subscription Services, Inc
References 2018; 1‐2
2010; 56
2016; 6
1996; 29
2013; 3
2013; 58
2019; 10
2020
2019; 13
2003; 35
2019
2018
2017
2016
2005
1982
2011; 15
2003
1980
2011; 58
2020; 32
2018; 24
Denning DER (e_1_2_9_2_1) 1982
Fernandez EB (e_1_2_9_13_1) 1980
Hanes D (e_1_2_9_3_1) 2018
Date CJ (e_1_2_9_15_1) 2003
e_1_2_9_14_1
e_1_2_9_17_1
e_1_2_9_16_1
e_1_2_9_19_1
e_1_2_9_18_1
Ogiela L (e_1_2_9_27_1) 2020; 32
e_1_2_9_20_1
(e_1_2_9_12_1) 2020
e_1_2_9_22_1
e_1_2_9_21_1
(e_1_2_9_10_1) 2020
e_1_2_9_23_1
e_1_2_9_8_1
Oma R (e_1_2_9_4_1) 2018; 1
e_1_2_9_7_1
e_1_2_9_6_1
e_1_2_9_5_1
(e_1_2_9_11_1) 2020
Hernández‐Ramos JL (e_1_2_9_24_1) 2013; 3
e_1_2_9_9_1
e_1_2_9_26_1
e_1_2_9_25_1
e_1_2_9_28_1
References_xml – volume: 29
  start-page: 38
  issue: 2
  year: 1996
  end-page: 47
  article-title: Role‐based access control models
  publication-title: IEEE Comput
– volume: 56
  start-page: 1380
  issue: 3
  year: 2010
  end-page: 1386
  article-title: Home energy management system based on power line communication
  publication-title: IEEE Trans Consum Electron
– volume: 32
  issue: 8
  year: 2020
  article-title: Information flow control in object‐based peer‐to‐peer publish/subscribe systems
  publication-title: Concurr Comput Pract Exp
– volume: 24
  start-page: 243
  issue: 3
  year: 2018
  end-page: 257
  article-title: An information flow control model in a topic‐based publish/subscribe system
  publication-title: J High Speed Netw
– volume: 13
  start-page: 323
  issue: 4
  year: 2019
  end-page: 332
  article-title: Protocol to efficiently prevent illegal flow of objects in P2P type of publish/subscribe (PS) systems
  publication-title: Serv Orient Comput Appl
– year: 1982
– volume: 1‐2
  start-page: 14
  year: 2018
  end-page: 26
  article-title: An energy‐efficient model for fog computing in the Internet of Things (IoT)
  publication-title: IoT Eng Cyber Phys Human Syst
– year: 2005
– volume: 15
  start-page: 431
  issue: 4
  year: 2011
  end-page: 440
  article-title: An Internet of Things—based personal device for diabetes therapy management in ambient assisted living (AAL)
  publication-title: Personal Ubiquit Comput
– year: 1980
– volume: 35
  start-page: 114
  issue: 2
  year: 2003
  end-page: 131
  article-title: The many faces of publish/subscribe
  publication-title: ACM Comput Surv
– volume: 6
  start-page: 43
  issue: 1
  year: 2016
  end-page: 53
  article-title: A read‐write abortion protocol to prevent illegal information flow in role‐based access control systems
  publication-title: Int J Space‐Based Situat Comput
– volume: 10
  start-page: 13
  issue: 4
  year: 2019
  end-page: 25
  article-title: Information flow control based on the CapBAC (Capability‐Based Access Control) model in the IoT
  publication-title: Int J Mob Comput Multimedia Commun
– year: 2020
– year: 2003
– year: 2020
  article-title: Cognitive cryptography for data security in cloud computing
  publication-title: Concurr Comput Pract Exp
– volume: 58
  start-page: 2216
  issue: 6
  year: 2011
  end-page: 2225
  article-title: Purpose‐based information flow control for cyber engineering
  publication-title: IEEE Trans Ind Electron
– volume: 58
  start-page: 1189
  issue: 5‐6
  year: 2013
  end-page: 1205
  article-title: A capability‐based security approach to manage access control in the Internet of Things
  publication-title: Math Comput Modell
– volume: 32
  start-page: 1
  issue: 8
  year: 2020
  end-page: 8
  article-title: Cognitive security paradigm for cloud computing applications
  publication-title: Concurr Comput Pract Exp
– year: 2017
– year: 2016
– year: 2018
– volume: 3
  start-page: 1
  issue: 3/4
  year: 2013
  end-page: 16
  article-title: Distributed capability‐based access control for the Internet of Things
  publication-title: J Internet Serv Inf Sec
– year: 2019
– volume-title: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things
  year: 2018
  ident: e_1_2_9_3_1
– ident: e_1_2_9_20_1
  doi: 10.1007/978-3-030-15035-8_55
– volume: 1
  start-page: 14
  year: 2018
  ident: e_1_2_9_4_1
  article-title: An energy‐efficient model for fog computing in the Internet of Things (IoT)
  publication-title: IoT Eng Cyber Phys Human Syst
– ident: e_1_2_9_23_1
  doi: 10.1007/s11761-019-00275-9
– ident: e_1_2_9_18_1
  doi: 10.1145/857076.857078
– volume-title: An Introduction to Database Systems
  year: 2003
  ident: e_1_2_9_15_1
– volume-title: Advances in Internet, Data and Web Technologies
  year: 2020
  ident: e_1_2_9_12_1
– ident: e_1_2_9_17_1
  doi: 10.1504/IJSSC.2016.076564
– ident: e_1_2_9_19_1
  doi: 10.1109/AINA.2016.152
– volume-title: Advances on Broad‐Band Wireless Computing, Communication and Applications
  year: 2020
  ident: e_1_2_9_11_1
– ident: e_1_2_9_16_1
  doi: 10.1109/TIE.2010.2051393
– volume: 32
  start-page: 1
  issue: 8
  year: 2020
  ident: e_1_2_9_27_1
  article-title: Cognitive security paradigm for cloud computing applications
  publication-title: Concurr Comput Pract Exp
– volume-title: Cryptography and Data Security
  year: 1982
  ident: e_1_2_9_2_1
– volume-title: Database Security and Integrity
  year: 1980
  ident: e_1_2_9_13_1
– volume-title: Advances in Network‐Based Information Systems
  year: 2020
  ident: e_1_2_9_10_1
– ident: e_1_2_9_26_1
  doi: 10.1002/cpe.5316
– ident: e_1_2_9_8_1
  doi: 10.1016/j.mcm.2013.02.006
– ident: e_1_2_9_28_1
  doi: 10.1109/AINA.2017.164
– ident: e_1_2_9_7_1
  doi: 10.1109/AINA.2018.00166
– ident: e_1_2_9_5_1
  doi: 10.1007/s00779-010-0353-1
– volume: 3
  start-page: 1
  issue: 3
  year: 2013
  ident: e_1_2_9_24_1
  article-title: Distributed capability‐based access control for the Internet of Things
  publication-title: J Internet Serv Inf Sec
– ident: e_1_2_9_6_1
  doi: 10.1109/TCE.2010.5606273
– ident: e_1_2_9_21_1
  doi: 10.1002/cpe.5118
– ident: e_1_2_9_9_1
  doi: 10.4018/IJMCMC.2019100102
– ident: e_1_2_9_25_1
  doi: 10.1109/ICWS.2005.25
– ident: e_1_2_9_14_1
  doi: 10.1109/2.485845
– ident: e_1_2_9_22_1
  doi: 10.3233/JHS-180593
SSID ssj0011031
Score 2.3245015
Snippet Summary The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the...
The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
SubjectTerms Access control
Actuators
CBAC model
device security
illegal information flow
Information flow
information flow control
Internet of Things
IoT
late information flow
Title Time‐based legality of information flow in the capability‐based access control model for the Internet of Things
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.5944
https://www.proquest.com/docview/2594889943
Volume 33
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA7SkxfrE6tVIoietm1e-zhKbSmCImKh4GFJZrMeLG2xW0RP_gR_o7_EJPuoioJ4Wlhmlt1MZudLmHwfQsfKD8EAceWZ0iE8ngLzQpqAFwnlyygxJSu0550vr_zBkF-MxKjoqrRnYXJ-iGrDzWaG-1_bBJdq3l6ShsJMt0TELRUoYb6lzT-_qZijiFUvyKlSqdcxoL3kne3Qdun4tRIt4eVnkOqqTL-O7sr3y5tLHlqLTLXg5Rt14_8-YB2tFeATn-WzZQOt6MkmqpfCDrjI8y00twdD3l_fbIlL8FjfO7COpykueFZtNHE6nj6ZG9hASAym5ro22-fKTTopRlz0wmMnuYONt7PPNyJ1Zp-ZS4duo2G_d9sdeIU6gwfMvLbHJYkSwgLJZBqCSEINlDMFlCoVJpqn1AdpVmMdIiOlEs3MPACSCCpoGoAv2A6qTaYTvYuwDlIJUvsQQciJWZNLEchAQcBlGoVEN9BpGakYCupyq6AxjnPSZRqbsYztWDbQUWU5y-k6frBplsGOi4Sdx9TS1pi1J2cNdOKi9qt_3L3u2eveXw330Sq1nTCEmqLXRLXscaEPDJTJ1KGbtB8sh_TB
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58HPTiW1yfEURPXbdp0geexAfrExEFD0JJpqkHl91FV0RP_gR_o7_ESdquDxTEU6HMhDST6XwTJt8ArOkwRgLi2qPQIT2RY-DFPEMvkTpUSUYhK7b3nU9Ow-alOLySVwOwVd2FKfgh-gdu1jPc_9o6uD2Q3vxgDcWuqctEiEEYFoQzbOa1e97njvJt_4KCLJV7DYLtFfNsg29Wml9j0QfA_AxTXZzZH4fraoZFeclt_aGn6_j8jbzxn58wAWMl_mTbxYaZhAHTnoLxqrcDK119Gu7t3ZC3l1cb5TLWMjcOr7NOzkqqVWtQlrc6j_SCEYpkSGHXVdo-9dWU68bIynJ45rruMNJ28sVZpOnZMYvuoTNwub93sdP0ygYNHgY0bU8oP8n8IFKBymOUWWyQi0Aj51rHmRE5D1FRQtbwVaJ1ZgLaCuhnkkueRxjKYBaG2p22mQNmolyhMiEmGAuf0nIlIxVpjITKk9g3NdioTJViyV5um2i00oJ3mae0lqldyxqs9iW7BWPHDzKLlbXT0mfvU26Zayj9FEEN1p3ZftVPd8727HP-r4IrMNK8ODlOjw9OjxZglNvCGJ9TDFyEod7dg1kiZNPTy24HvwNsDPjg
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEB7SDZRekqYPusk2UaG0J2_WsuTHsWx2SfoIoTQQ6MFIIymHLrtL4hCSU35CfmN-SUfyI21poeRkMDPG1mg8n8To-wDe6jRHAuI6otIhI-EwiXJuMCqkTlVhqGTl_rzzl8N0_1h8PJEnTVelPwtT80N0G24-M8L_2if40rjde9JQXNqhLIR4BKsiJSDhAdHXjjoq9vIFNVcqj0aE2lvi2RHfbT1_L0X3-PJXlBrKzHQdvrcvWHeX_BheVHqI139wNz7sC57CWoM-2Yd6umzAip0_g_VW2YE1if4czv3JkLubW1_jDJvZ04DW2cKxhmjVh5O52eKSbjDCkAyp6IY-26vOTQUtRtY0w7OgucPIO9jXO5G28s-stUNfwPF08m28HzXyDBEm9NqRUHFh4iRTiXI5SpNb5CLRyLnWubHC8RQVLcdGsSq0NjahiYCxkVxyl2Eqk5fQmy_m9hUwmzmFyqZYYC5iWpQrmalMYyaUK_LY9uF9G6kSG-5yL6ExK2vWZV7SWJZ-LPvwprNc1nwdf7EZtMEum4w9L7nnraHFp0j68C5E7Z_-5fho4q-b_2u4A4-P9qbl54PDT1vwhPuumJhTARxArzq7sK8J1lR6O8zfn5uH948
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Time%E2%80%90based+legality+of+information+flow+in+the+capability%E2%80%90based+access+control+model+for+the+Internet+of+Things&rft.jtitle=Concurrency+and+computation&rft.au=Nakamura%2C+Shigenari&rft.au=Enokido%2C+Tomoya&rft.au=Takizawa%2C+Makoto&rft.date=2021-12-10&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=33&rft.issue=23&rft.epage=n%2Fa&rft_id=info:doi/10.1002%2Fcpe.5944&rft.externalDBID=10.1002%252Fcpe.5944&rft.externalDocID=CPE5944
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon