{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:10Z","timestamp":1750220710033,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,10]],"date-time":"2020-06-10T00:00:00Z","timestamp":1591747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,10]]},"DOI":"10.1145\/3381991.3395617","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T04:34:57Z","timestamp":1590726897000},"page":"213-220","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem"],"prefix":"10.1145","author":[{"given":"Tahir","family":"Ahmad","sequence":"first","affiliation":[{"name":"Security &amp; Trust Unit, FBK-ICT &amp; University of Genova, Trento, Italy"}]},{"given":"Umberto","family":"Morelli","sequence":"additional","affiliation":[{"name":"Security &amp; Trust Unit, FBK-ICT, Trento, Italy"}]},{"given":"Silvio","family":"Ranise","sequence":"additional","affiliation":[{"name":"Security &amp; Trust Unit, FBK-ICT, Trento, Italy"}]}],"member":"320","published-online":{"date-parts":[[2020,6,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3205977.3205989"},{"key":"e_1_3_2_1_2_1","volume-title":"International Symposium on Foundations and Practice of Security. Springer, 131--139","author":"Ahmad Tahir","year":"2018","unstructured":"Tahir Ahmad and Silvio Ranise . 2018 . Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper) . In International Symposium on Foundations and Practice of Security. Springer, 131--139 . Tahir Ahmad and Silvio Ranise. 2018. Validating Requirements of Access Control for Cloud-Edge IoT Solutions (Short Paper). In International Symposium on Foundations and Practice of Security. Springer, 131--139."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2020. A smart system for your life . https:\/\/linproxy.fan.workers.dev:443\/https\/www.amazon.com\/key . [Accessed: 22-April-2020].  Amazon. 2020. A smart system for your life . https:\/\/linproxy.fan.workers.dev:443\/https\/www.amazon.com\/key . [Accessed: 22-April-2020]."},{"volume-title":"Service quality of cloud-based applications","author":"Bauer Eric","key":"e_1_3_2_1_4_1","unstructured":"Eric Bauer and Randee Adams . 2013. Service quality of cloud-based applications . John Wiley & Sons . Eric Bauer and Randee Adams. 2013. Service quality of cloud-based applications .John Wiley & Sons."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64701-2_57"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.37"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.389"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_3_2_1_9_1","unstructured":"IEC. 2016. IoT 2020: Smart and Secure IoT Platform . https:\/\/linproxy.fan.workers.dev:443\/http\/www.iec.ch\/whitepaper\/pdf\/iecWP-loT2020-LR.pdf . [Accessed: 22-April-2020].  IEC. 2016. IoT 2020: Smart and Secure IoT Platform . https:\/\/linproxy.fan.workers.dev:443\/http\/www.iec.ch\/whitepaper\/pdf\/iecWP-loT2020-LR.pdf . [Accessed: 22-April-2020]."},{"key":"e_1_3_2_1_10_1","volume-title":"A Critique of the CAP Theorem. arXiv preprint arXiv:1509.05393","author":"Kleppmann Martin","year":"2015","unstructured":"Martin Kleppmann . 2015. A Critique of the CAP Theorem. arXiv preprint arXiv:1509.05393 ( 2015 ). Martin Kleppmann. 2015. A Critique of the CAP Theorem. arXiv preprint arXiv:1509.05393 (2015)."},{"key":"e_1_3_2_1_11_1","volume-title":"MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers. In 2019 IEEE World Congress on Services (SERVICES)","volume":"2642","author":"Palmieri Andrea","year":"2019","unstructured":"Andrea Palmieri , Paolo Prem , Silvio Ranise , Umberto Morelli , and Tahir Ahmad . 2019 . MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers. In 2019 IEEE World Congress on Services (SERVICES) , Vol. 2642 . IEEE, 47--53. Andrea Palmieri, Paolo Prem, Silvio Ranise, Umberto Morelli, and Tahir Ahmad. 2019. MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers. In 2019 IEEE World Congress on Services (SERVICES), Vol. 2642. IEEE, 47--53."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.017"},{"volume-title":"International School on Foundations of Security Analysis and Design","author":"Samarati Pierangela","key":"e_1_3_2_1_13_1","unstructured":"Pierangela Samarati and Sabrina Capitani de Vimercati . 2000. Access control: Policies, models, and mechanisms . In International School on Foundations of Security Analysis and Design . Springer , 137--196. Pierangela Samarati and Sabrina Capitani de Vimercati. 2000. Access control: Policies, models, and mechanisms. In International School on Foundations of Security Analysis and Design. Springer, 137--196."},{"key":"e_1_3_2_1_14_1","unstructured":"Amazon Web Services. 2020 a. AWS Greengrass . https:\/\/linproxy.fan.workers.dev:443\/https\/aws.amazon.com\/greengrass\/. [Accessed: 22-April-2020].  Amazon Web Services. 2020 a. AWS Greengrass . https:\/\/linproxy.fan.workers.dev:443\/https\/aws.amazon.com\/greengrass\/. [Accessed: 22-April-2020]."},{"key":"e_1_3_2_1_15_1","unstructured":"Amazon Web Services. 2020 b. IoT Core . https:\/\/linproxy.fan.workers.dev:443\/https\/aws.amazon.com\/iot-core\/. [Accessed: 22-April-2020].  Amazon Web Services. 2020 b. IoT Core . https:\/\/linproxy.fan.workers.dev:443\/https\/aws.amazon.com\/iot-core\/. [Accessed: 22-April-2020]."},{"key":"e_1_3_2_1_16_1","unstructured":"Sofia. 2020. Sofia Smart Locks . https:\/\/linproxy.fan.workers.dev:443\/https\/www.sofialocks.com\/en\/smartlocks\/. [Accessed: 22-April-2020].  Sofia. 2020. Sofia Smart Locks . https:\/\/linproxy.fan.workers.dev:443\/https\/www.sofialocks.com\/en\/smartlocks\/. [Accessed: 22-April-2020]."},{"key":"e_1_3_2_1_17_1","volume-title":"eXtensible Access Control Markup Language (XACML) Version 3.0","author":"Standard OASIS","year":"2013","unstructured":"OASIS Standard . 2013. eXtensible Access Control Markup Language (XACML) Version 3.0 . 22 January 2013 . OASIS Standard. 2013. eXtensible Access Control Markup Language (XACML) Version 3.0. 22 January 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WECWIS.2000.853861"}],"event":{"name":"SACMAT '20: The 25th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Barcelona Spain","acronym":"SACMAT '20"},"container-title":["Proceedings of the 25th ACM Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3381991.3395617","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3381991.3395617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:08Z","timestamp":1750199588000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3381991.3395617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,10]]},"references-count":18,"alternative-id":["10.1145\/3381991.3395617","10.1145\/3381991"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1145\/3381991.3395617","relation":{},"subject":[],"published":{"date-parts":[[2020,6,10]]},"assertion":[{"value":"2020-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}