2020
DOI: 10.5455/jjee.204-1581015531
|View full text |Cite
|
Sign up to set email alerts
|

Secure IoT Resources with Access Control over RESTful Web Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 12 publications
0
8
0
1
Order By: Relevance
“…In this paper, we briefly explain the model; present a thorough investigation of it; analyze and measure its performance; the model is compared to a Restful model proposed in [3]; the comparison results will be illustrated. Furthermore, the models are compared by considering the attributes of service time, latency, and CPU utilization.…”
Section: Research Questionsmentioning
confidence: 99%
See 4 more Smart Citations
“…In this paper, we briefly explain the model; present a thorough investigation of it; analyze and measure its performance; the model is compared to a Restful model proposed in [3]; the comparison results will be illustrated. Furthermore, the models are compared by considering the attributes of service time, latency, and CPU utilization.…”
Section: Research Questionsmentioning
confidence: 99%
“…Aloufi and Alhazmi suggested an IoT specific deployment of MQTT protocols; in the deployment, the MQTT broker is in the fog part of the cloud to improve latency and over the cloud-fog by placing the broker on the fog [8]. Furthermore, they have proposed an over REST architecture style as the results improved performance and reliability [3].…”
Section: Literature Review and Related Workmentioning
confidence: 99%
See 3 more Smart Citations