Time‐based legality of information flow in the capability‐based access control model for the Internet of Things
Summary The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC mo...
Saved in:
Published in | Concurrency and computation Vol. 33; no. 23 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Hoboken
Wiley Subscription Services, Inc
10.12.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 1532-0626 1532-0634 |
DOI | 10.1002/cpe.5944 |
Cover
Abstract | Summary
The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC model, information which a subject is not allowed to get may illegally flow to the subject. Hence, the operation interruption (OI) protocol to prevent illegal information flow is proposed in our previous studies. However, although a subject is not allowed to get data at time τ, the subject can get the data later than the time τ. Here, the data come to the subject later than expected by the subject to get the data, that is, the information flows late to the subject. In this article, we newly propose a time‐based OI (TBOI) protocol to prevent not only illegal information flow but also late information flow. Here, operations implying illegal or late information flow are interrupted, that is, not performed at devices. In the evaluation, we show not only illegal information flow but also late information flow are prevented in the TBOI protocol differently from the OI protocol. |
---|---|
AbstractList | The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC model, information which a subject is not allowed to get may illegally flow to the subject. Hence, the operation interruption (OI) protocol to prevent illegal information flow is proposed in our previous studies. However, although a subject is not allowed to get data at time
, the subject can get the data later than the time
. Here, the data come to the subject later than expected by the subject to get the data, that is, the information flows late to the subject. In this article, we newly propose a time‐based OI (TBOI) protocol to prevent not only illegal information flow but also late information flow. Here, operations implying illegal or late information flow are interrupted, that is, not performed at devices. In the evaluation, we show not only illegal information flow but also late information flow are prevented in the TBOI protocol differently from the OI protocol. Summary The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC model, information which a subject is not allowed to get may illegally flow to the subject. Hence, the operation interruption (OI) protocol to prevent illegal information flow is proposed in our previous studies. However, although a subject is not allowed to get data at time τ, the subject can get the data later than the time τ. Here, the data come to the subject later than expected by the subject to get the data, that is, the information flows late to the subject. In this article, we newly propose a time‐based OI (TBOI) protocol to prevent not only illegal information flow but also late information flow. Here, operations implying illegal or late information flow are interrupted, that is, not performed at devices. In the evaluation, we show not only illegal information flow but also late information flow are prevented in the TBOI protocol differently from the OI protocol. The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the capability‐based access control (CBAC) model where a subject is issued a capability token to manipulate a device by a device owner. In the CBAC model, information which a subject is not allowed to get may illegally flow to the subject. Hence, the operation interruption (OI) protocol to prevent illegal information flow is proposed in our previous studies. However, although a subject is not allowed to get data at time τ, the subject can get the data later than the time τ. Here, the data come to the subject later than expected by the subject to get the data, that is, the information flows late to the subject. In this article, we newly propose a time‐based OI (TBOI) protocol to prevent not only illegal information flow but also late information flow. Here, operations implying illegal or late information flow are interrupted, that is, not performed at devices. In the evaluation, we show not only illegal information flow but also late information flow are prevented in the TBOI protocol differently from the OI protocol. |
Author | Nakamura, Shigenari Enokido, Tomoya Takizawa, Makoto |
Author_xml | – sequence: 1 givenname: Shigenari orcidid: 0000-0003-1064-4056 surname: Nakamura fullname: Nakamura, Shigenari email: nakamura.shigenari@gmail.com organization: Tokyo Metropolitan Industrial Technology Research Institute – sequence: 2 givenname: Tomoya orcidid: 0000-0003-1990-466X surname: Enokido fullname: Enokido, Tomoya organization: Rissho University – sequence: 3 givenname: Makoto surname: Takizawa fullname: Takizawa, Makoto organization: Hosei University |
BookMark | eNp1kM1Kw0AUhQepYFsFH2HAjZvU-UnSZCmlaqGgi7oOk8mddkoyE2emlO58BJ_RJzFpxYXo6l4u3zmHe0ZoYKwBhK4pmVBC2J1sYZLkcXyGhjThLCIpjwc_O0sv0Mj7LSGUEk6HyK90A5_vH6XwUOEa1qLW4YCtwtoo6xoRtDVY1XbfHXDYAJaiFaXuqR-ZkBK8x9Ka4GyNG1tBjTv1kV-YAM5A6D1XG23W_hKdK1F7uPqeY_T6MF_NnqLl8-Nidr-MJO8-iGJB84ryqeBCZTKpMpAs5qVkrCyzCmLFUimmNCVU5GVZAVeSS1olLGFqKtOEj9HNybd19m0HPhRbu3OmiyxYF5BleR7zjro9UdJZ7x2oonW6Ee5QUFL0lRZdpUVfaYdOfqFSh2NDwQld_yWIToK9ruHwr3Exe5kf-S9GnYzU |
CitedBy_id | crossref_primary_10_1002_cpe_6311 crossref_primary_10_1016_j_iot_2023_100992 crossref_primary_10_1016_j_iot_2022_100542 crossref_primary_10_1016_j_jisa_2023_103446 crossref_primary_10_1016_j_iot_2021_100423 crossref_primary_10_1109_ACCESS_2023_3347495 |
Cites_doi | 10.1007/978-3-030-15035-8_55 10.1007/s11761-019-00275-9 10.1145/857076.857078 10.1504/IJSSC.2016.076564 10.1109/AINA.2016.152 10.1109/TIE.2010.2051393 10.1002/cpe.5316 10.1016/j.mcm.2013.02.006 10.1109/AINA.2017.164 10.1109/AINA.2018.00166 10.1007/s00779-010-0353-1 10.1109/TCE.2010.5606273 10.1002/cpe.5118 10.4018/IJMCMC.2019100102 10.1109/ICWS.2005.25 10.1109/2.485845 10.3233/JHS-180593 |
ContentType | Journal Article |
Copyright | 2020 John Wiley & Sons Ltd 2021 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: 2020 John Wiley & Sons Ltd – notice: 2021 John Wiley & Sons, Ltd. |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1002/cpe.5944 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | CrossRef Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1532-0634 |
EndPage | n/a |
ExternalDocumentID | 10_1002_cpe_5944 CPE5944 |
Genre | article |
GrantInformation_xml | – fundername: Japan Society for the Promotion of Science funderid: JP17J00106 |
GroupedDBID | .3N .DC .GA 05W 0R~ 10A 1L6 1OC 33P 3SF 3WU 4.4 50Y 50Z 51W 51X 52M 52N 52O 52P 52S 52T 52U 52W 52X 5GY 5VS 66C 702 7PT 8-0 8-1 8-3 8-4 8-5 8UM 930 A03 AAESR AAEVG AAHHS AAHQN AAMNL AANLZ AAONW AAXRX AAYCA AAZKR ABCQN ABCUV ABEML ABIJN ACAHQ ACCFJ ACCZN ACPOU ACSCC ACXBN ACXQS ADBBV ADEOM ADIZJ ADKYN ADMGS ADOZA ADXAS ADZMN ADZOD AEEZP AEIGN AEIMD AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ATUGU AUFTA AZBYB BAFTC BDRZF BFHJK BHBCM BMNLL BROTX BRXPI BY8 CS3 D-E D-F DCZOG DPXWK DR2 DRFUL DRSTM EBS F00 F01 F04 F5P G-S G.N GNP GODZA HGLYW HHY HZ~ IX1 JPC KQQ LATKE LAW LC2 LC3 LEEKS LH4 LITHE LOXES LP6 LP7 LUTES LYRES MEWTI MK4 MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM N04 N05 N9A O66 O9- OIG P2W P2X P4D PQQKQ Q.N Q11 QB0 QRW R.K ROL RWI RX1 SUPJJ TN5 UB1 V2E W8V W99 WBKPD WIH WIK WOHZO WQJ WRC WXSBR WYISQ WZISG XG1 XV2 ~IA ~WT AAYXX ADMLS AEYWJ AGHNM AGYGG CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c3594-4a19d137a3af8c5d8ec243bc22bb8de4f26ca71601a9bbde3fc3c1d5252f7c653 |
IEDL.DBID | DR2 |
ISSN | 1532-0626 |
IngestDate | Fri Jul 25 06:07:42 EDT 2025 Tue Jul 01 00:34:04 EDT 2025 Thu Apr 24 22:58:49 EDT 2025 Wed Jan 22 16:26:58 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 23 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c3594-4a19d137a3af8c5d8ec243bc22bb8de4f26ca71601a9bbde3fc3c1d5252f7c653 |
Notes | Funding information Japan Society for the Promotion of Science, JP17J00106 ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-1990-466X 0000-0003-1064-4056 |
PQID | 2594889943 |
PQPubID | 2045170 |
PageCount | 12 |
ParticipantIDs | proquest_journals_2594889943 crossref_primary_10_1002_cpe_5944 crossref_citationtrail_10_1002_cpe_5944 wiley_primary_10_1002_cpe_5944_CPE5944 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 10 December 2021 |
PublicationDateYYYYMMDD | 2021-12-10 |
PublicationDate_xml | – month: 12 year: 2021 text: 10 December 2021 day: 10 |
PublicationDecade | 2020 |
PublicationPlace | Hoboken |
PublicationPlace_xml | – name: Hoboken |
PublicationTitle | Concurrency and computation |
PublicationYear | 2021 |
Publisher | Wiley Subscription Services, Inc |
Publisher_xml | – name: Wiley Subscription Services, Inc |
References | 2018; 1‐2 2010; 56 2016; 6 1996; 29 2013; 3 2013; 58 2019; 10 2020 2019; 13 2003; 35 2019 2018 2017 2016 2005 1982 2011; 15 2003 1980 2011; 58 2020; 32 2018; 24 Denning DER (e_1_2_9_2_1) 1982 Fernandez EB (e_1_2_9_13_1) 1980 Hanes D (e_1_2_9_3_1) 2018 Date CJ (e_1_2_9_15_1) 2003 e_1_2_9_14_1 e_1_2_9_17_1 e_1_2_9_16_1 e_1_2_9_19_1 e_1_2_9_18_1 Ogiela L (e_1_2_9_27_1) 2020; 32 e_1_2_9_20_1 (e_1_2_9_12_1) 2020 e_1_2_9_22_1 e_1_2_9_21_1 (e_1_2_9_10_1) 2020 e_1_2_9_23_1 e_1_2_9_8_1 Oma R (e_1_2_9_4_1) 2018; 1 e_1_2_9_7_1 e_1_2_9_6_1 e_1_2_9_5_1 (e_1_2_9_11_1) 2020 Hernández‐Ramos JL (e_1_2_9_24_1) 2013; 3 e_1_2_9_9_1 e_1_2_9_26_1 e_1_2_9_25_1 e_1_2_9_28_1 |
References_xml | – volume: 29 start-page: 38 issue: 2 year: 1996 end-page: 47 article-title: Role‐based access control models publication-title: IEEE Comput – volume: 56 start-page: 1380 issue: 3 year: 2010 end-page: 1386 article-title: Home energy management system based on power line communication publication-title: IEEE Trans Consum Electron – volume: 32 issue: 8 year: 2020 article-title: Information flow control in object‐based peer‐to‐peer publish/subscribe systems publication-title: Concurr Comput Pract Exp – volume: 24 start-page: 243 issue: 3 year: 2018 end-page: 257 article-title: An information flow control model in a topic‐based publish/subscribe system publication-title: J High Speed Netw – volume: 13 start-page: 323 issue: 4 year: 2019 end-page: 332 article-title: Protocol to efficiently prevent illegal flow of objects in P2P type of publish/subscribe (PS) systems publication-title: Serv Orient Comput Appl – year: 1982 – volume: 1‐2 start-page: 14 year: 2018 end-page: 26 article-title: An energy‐efficient model for fog computing in the Internet of Things (IoT) publication-title: IoT Eng Cyber Phys Human Syst – year: 2005 – volume: 15 start-page: 431 issue: 4 year: 2011 end-page: 440 article-title: An Internet of Things—based personal device for diabetes therapy management in ambient assisted living (AAL) publication-title: Personal Ubiquit Comput – year: 1980 – volume: 35 start-page: 114 issue: 2 year: 2003 end-page: 131 article-title: The many faces of publish/subscribe publication-title: ACM Comput Surv – volume: 6 start-page: 43 issue: 1 year: 2016 end-page: 53 article-title: A read‐write abortion protocol to prevent illegal information flow in role‐based access control systems publication-title: Int J Space‐Based Situat Comput – volume: 10 start-page: 13 issue: 4 year: 2019 end-page: 25 article-title: Information flow control based on the CapBAC (Capability‐Based Access Control) model in the IoT publication-title: Int J Mob Comput Multimedia Commun – year: 2020 – year: 2003 – year: 2020 article-title: Cognitive cryptography for data security in cloud computing publication-title: Concurr Comput Pract Exp – volume: 58 start-page: 2216 issue: 6 year: 2011 end-page: 2225 article-title: Purpose‐based information flow control for cyber engineering publication-title: IEEE Trans Ind Electron – volume: 58 start-page: 1189 issue: 5‐6 year: 2013 end-page: 1205 article-title: A capability‐based security approach to manage access control in the Internet of Things publication-title: Math Comput Modell – volume: 32 start-page: 1 issue: 8 year: 2020 end-page: 8 article-title: Cognitive security paradigm for cloud computing applications publication-title: Concurr Comput Pract Exp – year: 2017 – year: 2016 – year: 2018 – volume: 3 start-page: 1 issue: 3/4 year: 2013 end-page: 16 article-title: Distributed capability‐based access control for the Internet of Things publication-title: J Internet Serv Inf Sec – year: 2019 – volume-title: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things year: 2018 ident: e_1_2_9_3_1 – ident: e_1_2_9_20_1 doi: 10.1007/978-3-030-15035-8_55 – volume: 1 start-page: 14 year: 2018 ident: e_1_2_9_4_1 article-title: An energy‐efficient model for fog computing in the Internet of Things (IoT) publication-title: IoT Eng Cyber Phys Human Syst – ident: e_1_2_9_23_1 doi: 10.1007/s11761-019-00275-9 – ident: e_1_2_9_18_1 doi: 10.1145/857076.857078 – volume-title: An Introduction to Database Systems year: 2003 ident: e_1_2_9_15_1 – volume-title: Advances in Internet, Data and Web Technologies year: 2020 ident: e_1_2_9_12_1 – ident: e_1_2_9_17_1 doi: 10.1504/IJSSC.2016.076564 – ident: e_1_2_9_19_1 doi: 10.1109/AINA.2016.152 – volume-title: Advances on Broad‐Band Wireless Computing, Communication and Applications year: 2020 ident: e_1_2_9_11_1 – ident: e_1_2_9_16_1 doi: 10.1109/TIE.2010.2051393 – volume: 32 start-page: 1 issue: 8 year: 2020 ident: e_1_2_9_27_1 article-title: Cognitive security paradigm for cloud computing applications publication-title: Concurr Comput Pract Exp – volume-title: Cryptography and Data Security year: 1982 ident: e_1_2_9_2_1 – volume-title: Database Security and Integrity year: 1980 ident: e_1_2_9_13_1 – volume-title: Advances in Network‐Based Information Systems year: 2020 ident: e_1_2_9_10_1 – ident: e_1_2_9_26_1 doi: 10.1002/cpe.5316 – ident: e_1_2_9_8_1 doi: 10.1016/j.mcm.2013.02.006 – ident: e_1_2_9_28_1 doi: 10.1109/AINA.2017.164 – ident: e_1_2_9_7_1 doi: 10.1109/AINA.2018.00166 – ident: e_1_2_9_5_1 doi: 10.1007/s00779-010-0353-1 – volume: 3 start-page: 1 issue: 3 year: 2013 ident: e_1_2_9_24_1 article-title: Distributed capability‐based access control for the Internet of Things publication-title: J Internet Serv Inf Sec – ident: e_1_2_9_6_1 doi: 10.1109/TCE.2010.5606273 – ident: e_1_2_9_21_1 doi: 10.1002/cpe.5118 – ident: e_1_2_9_9_1 doi: 10.4018/IJMCMC.2019100102 – ident: e_1_2_9_25_1 doi: 10.1109/ICWS.2005.25 – ident: e_1_2_9_14_1 doi: 10.1109/2.485845 – ident: e_1_2_9_22_1 doi: 10.3233/JHS-180593 |
SSID | ssj0011031 |
Score | 2.3245015 |
Snippet | Summary
The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the... The Internet of Things is composed of sensor and actuator devices. Devices have to be securely accessed by subjects. In this article, we take the... |
SourceID | proquest crossref wiley |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
SubjectTerms | Access control Actuators CBAC model device security illegal information flow Information flow information flow control Internet of Things IoT late information flow |
Title | Time‐based legality of information flow in the capability‐based access control model for the Internet of Things |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.5944 https://www.proquest.com/docview/2594889943 |
Volume | 33 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA7SkxfrE6tVIoietm1e-zhKbSmCImKh4GFJZrMeLG2xW0RP_gR_o7_EJPuoioJ4Wlhmlt1MZudLmHwfQsfKD8EAceWZ0iE8ngLzQpqAFwnlyygxJSu0550vr_zBkF-MxKjoqrRnYXJ-iGrDzWaG-1_bBJdq3l6ShsJMt0TELRUoYb6lzT-_qZijiFUvyKlSqdcxoL3kne3Qdun4tRIt4eVnkOqqTL-O7sr3y5tLHlqLTLXg5Rt14_8-YB2tFeATn-WzZQOt6MkmqpfCDrjI8y00twdD3l_fbIlL8FjfO7COpykueFZtNHE6nj6ZG9hASAym5ro22-fKTTopRlz0wmMnuYONt7PPNyJ1Zp-ZS4duo2G_d9sdeIU6gwfMvLbHJYkSwgLJZBqCSEINlDMFlCoVJpqn1AdpVmMdIiOlEs3MPACSCCpoGoAv2A6qTaYTvYuwDlIJUvsQQciJWZNLEchAQcBlGoVEN9BpGakYCupyq6AxjnPSZRqbsYztWDbQUWU5y-k6frBplsGOi4Sdx9TS1pi1J2cNdOKi9qt_3L3u2eveXw330Sq1nTCEmqLXRLXscaEPDJTJ1KGbtB8sh_TB |
linkProvider | Wiley-Blackwell |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEB58HPTiW1yfEURPXbdp0geexAfrExEFD0JJpqkHl91FV0RP_gR_o7_ESdquDxTEU6HMhDST6XwTJt8ArOkwRgLi2qPQIT2RY-DFPEMvkTpUSUYhK7b3nU9Ow-alOLySVwOwVd2FKfgh-gdu1jPc_9o6uD2Q3vxgDcWuqctEiEEYFoQzbOa1e97njvJt_4KCLJV7DYLtFfNsg29Wml9j0QfA_AxTXZzZH4fraoZFeclt_aGn6_j8jbzxn58wAWMl_mTbxYaZhAHTnoLxqrcDK119Gu7t3ZC3l1cb5TLWMjcOr7NOzkqqVWtQlrc6j_SCEYpkSGHXVdo-9dWU68bIynJ45rruMNJ28sVZpOnZMYvuoTNwub93sdP0ygYNHgY0bU8oP8n8IFKBymOUWWyQi0Aj51rHmRE5D1FRQtbwVaJ1ZgLaCuhnkkueRxjKYBaG2p22mQNmolyhMiEmGAuf0nIlIxVpjITKk9g3NdioTJViyV5um2i00oJ3mae0lqldyxqs9iW7BWPHDzKLlbXT0mfvU26Zayj9FEEN1p3ZftVPd8727HP-r4IrMNK8ODlOjw9OjxZglNvCGJ9TDFyEod7dg1kiZNPTy24HvwNsDPjg |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1La9wwEB7SDZRekqYPusk2UaG0J2_WsuTHsWx2SfoIoTQQ6MFIIymHLrtL4hCSU35CfmN-SUfyI21poeRkMDPG1mg8n8To-wDe6jRHAuI6otIhI-EwiXJuMCqkTlVhqGTl_rzzl8N0_1h8PJEnTVelPwtT80N0G24-M8L_2if40rjde9JQXNqhLIR4BKsiJSDhAdHXjjoq9vIFNVcqj0aE2lvi2RHfbT1_L0X3-PJXlBrKzHQdvrcvWHeX_BheVHqI139wNz7sC57CWoM-2Yd6umzAip0_g_VW2YE1if4czv3JkLubW1_jDJvZ04DW2cKxhmjVh5O52eKSbjDCkAyp6IY-26vOTQUtRtY0w7OgucPIO9jXO5G28s-stUNfwPF08m28HzXyDBEm9NqRUHFh4iRTiXI5SpNb5CLRyLnWubHC8RQVLcdGsSq0NjahiYCxkVxyl2Eqk5fQmy_m9hUwmzmFyqZYYC5iWpQrmalMYyaUK_LY9uF9G6kSG-5yL6ExK2vWZV7SWJZ-LPvwprNc1nwdf7EZtMEum4w9L7nnraHFp0j68C5E7Z_-5fho4q-b_2u4A4-P9qbl54PDT1vwhPuumJhTARxArzq7sK8J1lR6O8zfn5uH948 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Time%E2%80%90based+legality+of+information+flow+in+the+capability%E2%80%90based+access+control+model+for+the+Internet+of+Things&rft.jtitle=Concurrency+and+computation&rft.au=Nakamura%2C+Shigenari&rft.au=Enokido%2C+Tomoya&rft.au=Takizawa%2C+Makoto&rft.date=2021-12-10&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=33&rft.issue=23&rft.epage=n%2Fa&rft_id=info:doi/10.1002%2Fcpe.5944&rft.externalDBID=10.1002%252Fcpe.5944&rft.externalDocID=CPE5944 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon |