{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:28:43Z","timestamp":1759332523335,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1109\/iri49571.2020.00076","type":"proceedings-article","created":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T21:17:10Z","timestamp":1599772630000},"page":"457-462","source":"Crossref","is-referenced-by-count":18,"title":["The EGRBAC Model for Smart Home IoT"],"prefix":"10.1109","author":[{"given":"Safwa","family":"Ameer","sequence":"first","affiliation":[]},{"given":"James","family":"Benson","sequence":"additional","affiliation":[]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46568-5_53"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2812239"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2093973.2094018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60206-5"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"ref30","article-title":"All your bulbs are belong to us: Investigating the current state of security in connected lighting systems","author":"morgner","year":"2016","journal-title":"CoRR"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917634"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31540-4_4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2015.33"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11119-3_31"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038503"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.23"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080416"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/APCC.2016.7581479"},{"journal-title":"EXtensible Access Control Markup Language (XACML) Version 3 0","year":"2013","author":"rissanen","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PowerAfrica.2016.7556606"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7391174"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3198458.3198463"},{"journal-title":"ICITST","article-title":"Usage control in cloud systems","year":"2012","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.04.010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.007"},{"key":"ref27","article-title":"The current state of access control for smart devices in homes","author":"ur","year":"2013","journal-title":"HUPS"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1061\/9780784411391"},{"key":"ref29","article-title":"Flowfence: Practical data protection for emerging IoT application frameworks","volume":"16","author":"fernandes","year":"2016","journal-title":"Usenix Security"},{"key":"ref5","article-title":"Generalized role-based access control for securing future applications","author":"covington","year":"2000","journal-title":"Georgia Tech Tech Rep"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18681-8_2"},{"key":"ref2","article-title":"Rethinking access control and authentication for the home internet of things (IoT)","volume":"18","author":"he","year":"2018","journal-title":"Usenix Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2012.81"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2015.03.008"},{"journal-title":"AWS IoT","year":"0","key":"ref46"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344301"},{"journal-title":"AWS Lambda Function","year":"0","key":"ref48"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2388550"},{"journal-title":"AWS Iot Greengrass","year":"0","key":"ref47"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2015.2498605"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2017.7973622"},{"key":"ref24","article-title":"Experimental security analyses of non-networked compact fluorescent lamps: A case study of home automation security","author":"oluwafemi","year":"2013","journal-title":"LASER 2013"},{"key":"ref41","article-title":"Access control in internet of things: A survey","author":"zhang","year":"2016","journal-title":"arXiv preprint arXiv 1610 01292"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920276"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2013.23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373258"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"}],"event":{"name":"2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI)","start":{"date-parts":[[2020,8,11]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2020,8,13]]}},"container-title":["2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI)"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/9186548\/9191372\/09191619.pdf?arnumber=9191619","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:56:53Z","timestamp":1656453413000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/9191619\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":48,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1109\/iri49571.2020.00076","relation":{},"subject":[],"published":{"date-parts":[[2020,8]]}}}