TY - JOUR AU - Huang, Z. AU - Xu, X. AU - Ni, J. AU - Zhu, H. AU - Wang, C. PY - 2019 DA - 2019// TI - Multimodal representation learning for recommendation in Internet of Things JO - IEEE Internet Things J. VL - 6 UR - https://doi.org/10.1109/JIOT.2019.2940709 DO - 10.1109/JIOT.2019.2940709 ID - Huang2019 ER - TY - JOUR AU - Wu, B. AU - Yip, T. L. AU - Yan, X. AU - Guedes Soares, C. PY - 2019 DA - 2019// TI - Fuzzy logic based approach for ship-bridge collision alert system JO - Ocean Eng. VL - 187 UR - https://doi.org/10.1016/j.oceaneng.2019.106152 DO - 10.1016/j.oceaneng.2019.106152 ID - Wu2019 ER - TY - JOUR AU - Alexander, P. AU - Pike, L. AU - Loscocco, P. AU - Coker, G. PY - 2015 DA - 2015// TI - Model checking distributed mandatory access control policies JO - ACM Transactions on Information and System Security (TISSEC) VL - 18 UR - https://doi.org/10.1145/2785966 DO - 10.1145/2785966 ID - Alexander2015 ER - TY - JOUR AU - Liu, H. AU - Yao, X. AU - Yang, T. AU - Ning, H. PY - 2018 DA - 2018// TI - Cooperative privacy preservation for wearable devices in hybrid computing-based smart health JO - IEEE Internet Things J. VL - 6 UR - https://doi.org/10.1109/JIOT.2018.2843561 DO - 10.1109/JIOT.2018.2843561 ID - Liu2018 ER - TY - STD TI - Terzis, S., Wagealla, W., English, C., & Nixon, P. Trust lifecycle management in a global computing environment. In International Workshop on Global Computing (pp. 291-313). Springer, Berlin, Heidelberg (2004). ID - ref5 ER - TY - STD TI - Chang, R., Jiang, L., Chen, W., He, H., Yang, S., Jiang, H., & Liu, Y. (2018). Towards a multilayered permission-based access control for extending Android security. Concurrency and Computation: Practice and Experience, 30(5), e4180 (2018). ID - ref6 ER - TY - JOUR AU - Mundbrod, N. AU - Reichert, M. PY - 2019 DA - 2019// TI - Object-specific role-based access control JO - International Journal of Cooperative Information Systems VL - 28 UR - https://doi.org/10.1142/S0218843019500035 DO - 10.1142/S0218843019500035 ID - Mundbrod2019 ER - TY - JOUR AU - Aftab, M. U. AU - Qin, Z. AU - Hundera, N. W. AU - Ariyo, O. AU - Son, N. T. AU - Dinh, T. V. PY - 2019 DA - 2019// TI - Permission-based separation of duty in dynamic role-based access Control Model JO - Symmetry VL - 11 UR - https://doi.org/10.3390/sym11050669 DO - 10.3390/sym11050669 ID - Aftab2019 ER - TY - JOUR AU - Subramanian, C. M. AU - Cherukuri, A. K. AU - Chelliah, C. PY - 2018 DA - 2018// TI - Role based access control design using three-way formal concept analysis JO - Int. J. Mach. Learn. Cybern. VL - 9 UR - https://doi.org/10.1007/s13042-018-0840-7 DO - 10.1007/s13042-018-0840-7 ID - Subramanian2018 ER - TY - JOUR AU - Hu, V. AU - Kuhn, C. AU - Richard, D. AU - Ferraiolo, D. F. PY - 2015 DA - 2015// TI - Attribute-based access control JO - Computer VL - 48 UR - https://doi.org/10.1109/MC.2015.33 DO - 10.1109/MC.2015.33 ID - Hu2015 ER - TY - JOUR AU - Uriarte, M. AU - Astorga, J. AU - Jacob, E. AU - Huarte, M. AU - Carnerero, M. PY - 2017 DA - 2017// TI - Expressive policy-based access control for resource-constrained devices JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2017.2730958 DO - 10.1109/ACCESS.2017.2730958 ID - Uriarte2017 ER - TY - JOUR AU - Cruz, J. P. AU - Kaji, Y. AU - Yanai, N. PY - 2018 DA - 2018// TI - RBAC-SC: role-based access control using smart contract JO - Ieee Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2812844 DO - 10.1109/ACCESS.2018.2812844 ID - Cruz2018 ER - TY - JOUR AU - Aditham, S. AU - Ranganathan, N. PY - 2017 DA - 2017// TI - A system architecture for the detection of insider attacks in big data systems JO - IEEE Transactions on Dependable and Secure Computing VL - 15 UR - https://doi.org/10.1109/TDSC.2017.2768533 DO - 10.1109/TDSC.2017.2768533 ID - Aditham2017 ER - TY - JOUR AU - Xia, Q. AU - Sifah, E. B. AU - Agyekum, K. O. B. O. AU - Xia, H. AU - Acheampong, K. N. AU - Smahi, A. AU - Guizani, M. PY - 2019 DA - 2019// TI - Secured fine-grained selective access to outsourced cloud data in IoT environments JO - IEEE Internet Things J. VL - 6 UR - https://doi.org/10.1109/JIOT.2019.2941638 DO - 10.1109/JIOT.2019.2941638 ID - Xia2019 ER - TY - JOUR AU - Zhu, Y. AU - Huang, D. AU - Hu, C. J. AU - Wang, X. PY - 2014 DA - 2014// TI - From RBAC to ABAC: constructing flexible data access control for cloud storage services JO - IEEE Trans. Serv. Comput. VL - 8 UR - https://doi.org/10.1109/TSC.2014.2363474 DO - 10.1109/TSC.2014.2363474 ID - Zhu2014 ER - TY - JOUR AU - Wang, S. AU - Zhang, X. AU - Zhang, Y. PY - 2018 DA - 2018// TI - Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control JO - IET Inf. Secur. VL - 12 UR - https://doi.org/10.1049/iet-ifs.2017.0225 DO - 10.1049/iet-ifs.2017.0225 ID - Wang2018 ER - TY - JOUR AU - Zhang, M. AU - Zhang, D. AU - Goerlandt, F. AU - Yan, X. AU - Kujala, P. PY - 2019 DA - 2019// TI - Use of HFACS and fault tree model for collision risk factors analysis of icebreaker assistance in ice-covered waters JO - Saf. Sci. VL - 111 UR - https://doi.org/10.1016/j.ssci.2018.07.002 DO - 10.1016/j.ssci.2018.07.002 ID - Zhang2019 ER - TY - JOUR AU - Alam, M. AU - Emmanuel, N. AU - Khan, T. AU - Xiang, Y. AU - Hassan, H. PY - 2018 DA - 2018// TI - Garbled role-based access control in the cloud JO - J. Ambient. Intell. Humaniz. Comput. VL - 9 UR - https://doi.org/10.1007/s12652-017-0573-6 DO - 10.1007/s12652-017-0573-6 ID - Alam2018 ER - TY - JOUR AU - Pal, S. AU - Hitchens, M. AU - Varadharajan, V. AU - Rabehaja, T. PY - 2019 DA - 2019// TI - Policy-based access control for constrained healthcare resources in the context of the Internet of Things JO - J. Netw. Comput. Appl. VL - 139 UR - https://doi.org/10.1016/j.jnca.2019.04.013 DO - 10.1016/j.jnca.2019.04.013 ID - Pal2019 ER - TY - JOUR AU - Babar, M. AU - Khan, F. AU - Iqbal, W. AU - Yahya, A. AU - Arif, F. AU - Tan, Z. AU - Chuma, J. M. PY - 2018 DA - 2018// TI - A secured data management scheme for smart societies in industrial internet of things environment JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2861421 DO - 10.1109/ACCESS.2018.2861421 ID - Babar2018 ER - TY - JOUR AU - Chattaraj, D. AU - Sarma, M. AU - Das, A. K. AU - Kumar, N. AU - Rodrigues, J. J. AU - Park, Y. PY - 2018 DA - 2018// TI - HEAP: an efficient and fault-tolerant authentication and key exchange protocol for Hadoop-assisted big data platform JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2883105 DO - 10.1109/ACCESS.2018.2883105 ID - Chattaraj2018 ER - TY - STD TI - Huang Z., Tang J., G. Shan, Ni J., Chen Y., & Wang C. An efficient passenger-hunting recommendation framework with multi-task deep learning. IEEE Internet of Things Journal . DOI: https://doi.org/10.1109/JIOT.2019.2901759(2019). ID - ref22 ER - TY - JOUR AU - Liu, X. AU - Zhu, R. AU - Anjum, A. AU - Wang, J. AU - Zhang, H. AU - Ma, M. PY - 2020 DA - 2020// TI - Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks JO - Futur. Gener. Comput. Syst. VL - 104 UR - https://doi.org/10.1016/j.future.2019.10.001 DO - 10.1016/j.future.2019.10.001 ID - Liu2020 ER - TY - JOUR AU - Xie, H. AU - Yan, Z. AU - Yao, Z. AU - Atiquzzaman, M. PY - 2018 DA - 2018// TI - Data collection for security measurement in wireless sensor networks: a survey JO - IEEE Internet Things J. VL - 6 UR - https://doi.org/10.1109/JIOT.2018.2883403 DO - 10.1109/JIOT.2018.2883403 ID - Xie2018 ER - TY - JOUR AU - Liu, X. AU - Zhu, R. AU - Jalaian, B. AU - Sun, Y. PY - 2015 DA - 2015// TI - Dynamic spectrum access algorithm based on game theory in cognitive radio networks JO - Mobile Networks and Applications VL - 20 UR - https://doi.org/10.1007/s11036-015-0623-2 DO - 10.1007/s11036-015-0623-2 ID - Liu2015 ER - TY - JOUR AU - Zhu, R. AU - Zhang, X. AU - Liu, X. AU - Shu, W. AU - Mao, T. AU - Jalaian, B. PY - 2015 DA - 2015// TI - ERDT: Energy-efficient reliable decision transmission for intelligent cooperative spectrum sensing in industrial IoT JO - IEEE Access VL - 3 UR - https://doi.org/10.1109/ACCESS.2015.2501644 DO - 10.1109/ACCESS.2015.2501644 ID - Zhu2015 ER - TY - JOUR AU - Li, J. AU - Ji, Y. AU - Choo, K. K. R. AU - Hogrefe, D. PY - 2019 DA - 2019// TI - CL-CPPA: certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles JO - IEEE Internet Things J. VL - 6 UR - https://doi.org/10.1109/JIOT.2019.2938008 DO - 10.1109/JIOT.2019.2938008 ID - Li2019 ER - TY - JOUR AU - Hu, C. AU - Li, W. AU - Cheng, X. AU - Yu, J. AU - Wang, S. AU - Bie, R. PY - 2017 DA - 2017// TI - A secure and verifiable access control scheme for big data storage in clouds JO - IEEE Transactions on Big data VL - 4 UR - https://doi.org/10.1109/TBDATA.2016.2621106 DO - 10.1109/TBDATA.2016.2621106 ID - Hu2017 ER - TY - JOUR AU - Padget, J. A. AU - Vasconcelos, W. W. PY - 2018 DA - 2018// TI - Fine-grained access control via policy-carrying data JO - ACM Transactions on Internet Technology (TOIT) VL - 18 UR - https://doi.org/10.1145/3133324 DO - 10.1145/3133324 ID - Padget2018 ER - TY - JOUR AU - Mo, Y. PY - 2019 DA - 2019// TI - A data security storage method for IoT under Hadoop cloud computing platform JO - Int. J. Wireless Inf. Networks VL - 26 UR - https://doi.org/10.1007/s10776-019-00434-x DO - 10.1007/s10776-019-00434-x ID - Mo2019 ER - TY - JOUR AU - Fu, X. AU - Gao, Y. AU - Luo, B. AU - Du, X. AU - Guizani, M. PY - 2017 DA - 2017// TI - Security threats to Hadoop: data leakage attacks and investigation JO - IEEE Netw. VL - 31 UR - https://doi.org/10.1109/MNET.2017.1500095NM DO - 10.1109/MNET.2017.1500095NM ID - Fu2017 ER - TY - JOUR AU - Min, X. AU - Yong, Q. AU - Kui, W. AU - Jizhong, Z. AU - Mo, L. PY - 2011 DA - 2011// TI - Using potential to guide mobile nodes in wireless sensor networks JO - Ad Hoc & Sensor Wireless Networks VL - 12 ID - Min2011 ER - TY - JOUR AU - Yang, Y. AU - Zheng, X. AU - Guo, W. AU - Liu, X. AU - Chang, V. PY - 2019 DA - 2019// TI - Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system JO - Inf. Sci. VL - 479 UR - https://doi.org/10.1016/j.ins.2018.02.005 DO - 10.1016/j.ins.2018.02.005 ID - Yang2019 ER - TY - JOUR AU - Yang, K. AU - Han, Q. AU - Li, H. AU - Zheng, K. AU - Su, Z. AU - Shen, X. PY - 2016 DA - 2016// TI - An efficient and fine-grained big data access control scheme with privacy-preserving policy JO - IEEE Internet Things J. VL - 4 UR - https://doi.org/10.1109/JIOT.2016.2571718 DO - 10.1109/JIOT.2016.2571718 ID - Yang2016 ER -