共 99 条
- [11] Yan Han, Peng Guojun, Luo Yuan, Et al., Survey on smart home attack and defense methods, Journal of Cyber Security, 6, 4, pp. 1-27, (2021)
- [12] Wang Jice, Li Yilian, Jia Yan, Et al., Survey of smart home security, Journal of Computer Research and Development, 55, 10, pp. 2111-2124, (2018)
- [13] Peng Anni, Zhou Wei, Jia Yan, Et al., Survey of the Internet of things operating system security, Journal on Communications, 39, 3, pp. 22-34, (2018)
- [14] Graham G S, Denning P J., Protection: Principles and practice, Proc of the Spring Joint Computer Conf, pp. 417-429, (1972)
- [15] Bell D E, LaPadula L J., Secure computer systems: Mathematical foundations, (1973)
- [16] Sandhu R S, Coyne E J, Feinstein H L, Et al., Role-based access control models, Computer, 29, 2, pp. 38-47, (1996)
- [17] Yuan E, Tong Jin, Attributed based access control (ABAC) for Web services, Proc of IEEE Int Conf on Web Services (ICWS), (2005)
- [18] Park J, Sandhu R., The UCONABC usage control model, ACM Transactions on Information and System Security, 7, 1, pp. 128-174, (2004)
- [19] Gusmeroli S, Piccione S, Rotondi D., A capability-based security approach to manage access control in the Internet of things, Mathematical and Computer Modelling, 58, 5-6, pp. 1189-1205, (2013)
- [20] Jia Yan, Xing Luyi, Mao Yuhang, Et al., Burglars' IoT paradise: Understanding and mitigating security risks of general messaging protocols on IoT clouds, Proc of 2020 IEEE Symp on Security and Privacy (S&P), pp. 465-481, (2020)