|
[1] KISI secure smartphone keys homepage. https://getkisi.com/. [2] August smart lock hompage. http://august.com/. [3] BlueZ. https://www.bluez.org. [4] Danalock smart lock hompage. https://danalock.com/. [5] Lockitron smart lock hompage. https://lockitron.com/. [6] Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. Trbac: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4(3):191–233, August 2001. ISSN 1094-9224. doi: 10.1145/501978.501979. URL http://doi.acm.org/10.1145/501978.501979. [7] bluepy. Python interface to Bluetooth LE on Linux. https://github.com/IanHarvey/bluepy. [8] David F. Ferraiolo and D. Richard Kuhn. Role-based access controls. CoRR, abs/0903.2171, 2009. URL http://arxiv.org/abs/0903.2171. [9] David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, and Ramaswamy Chan- dramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Se- cur., 4(3):224–274, August 2001. ISSN 1094-9224. doi: 10.1145/501978.501980. URL http://doi.acm.org/10.1145/501978.501980. [10] GOOGLE. Two-step verification. https://www.google.com/landing/2step/. [11] James BD Joshi, Elisa Bertino, Usman Latif, and Arif Ghafoor. A generalized temporal role- based access control model. IEEE Transactions on Knowledge and Data Engineering, 17(1): 4–23, 2005. 47[12] Cheng-Ting Lee, Cheng-Hsun Yang, Chun-Min Chang, Chung-Yi Kao, Hua-Min Tseng, Hen- pai Hsu, and Pai H Chou. A smart energy system with distributed access control. In Internet of Things (iThings), 2014 IEEE International Conference on, and Green Computing and Com- munications (GreenCom), IEEE and Cyber, Physical and Social Computing (CPSCom), IEEE, pages 53–60. IEEE, 2014. [13] RaviSSandhu,EdwardJCoynek,HalLFeinsteink,andCharlesEYoumank.Role-basedaccess control models yz. IEEE computer, 29(2):38–47, 1996. [14] Jonathan Shahen, Jianwei Niu, and Mahesh Tripunitara. Mohawk+ t: Efficient analysis of ad- ministrative temporal role-based access control (atrbac) policies. In Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, pages 15–26. ACM, 2015. [15] TechCity Technology Co., Ltd. E2-live. http://e2-live.com/. [16] Peng-Loon Teh, Huo-Chong Ling, and Soon-Nyean Cheong. NFC smartphone based access control system using information hiding. In Open Systems (ICOS), 2013 IEEE Conference on, pages 13–17. IEEE, 2013. [17] Texas Instruments. CC2541 2.4 GHz Bluetooth Low Energy system-on-chip. http://www.ti. com/product/cc2541/. |