2021
DOI: 10.1007/978-3-030-70639-5_16
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of a Device Adopting the OI (Operation Interruption) Protocol to Prevent Illegal Information Flow in the IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…15 The execution time of the authorization processes for GET and PUT operations to detect the illegal operations is measured. 24 Each capability token has a validity period. Even if data come to a subject issued a capability token to get the data, the data are generated before the capability token starts to be valid.…”
Section: Related Studiesmentioning
confidence: 99%
See 1 more Smart Citation
“…15 The execution time of the authorization processes for GET and PUT operations to detect the illegal operations is measured. 24 Each capability token has a validity period. Even if data come to a subject issued a capability token to get the data, the data are generated before the capability token starts to be valid.…”
Section: Related Studiesmentioning
confidence: 99%
“…In order to prevent the illegal information flow, the OI protocol where the operations implying illegal information flow are interrupted at devices is proposed 15 . The execution time of the authorization processes for GET and PUT operations to detect the illegal operations is measured 24 …”
Section: Related Studiesmentioning
confidence: 99%