In the Internet of Things, the CBAC (capability-based access control) model is proposed to make devices securely accessed. Here, an owner of a device issues a capability token, that is, a set of access rights, to a subject. The subject is allowed to manipulate ROs (resource objects) in the device according to access rights in the capability token. In the CBAC model, there is a problem a subject sb i can obtain data of an RO r k m by accessing the data in an RO r l n after the data are brought to the RO r l n even if the subject sb i is not allowed to obtain the data from the RO r k m . Here, the data in the RO r k m illegally flow to the subject sb i . In our previous studies, the OI (operation interruption) protocol where illegal operations are interrupted is proposed and evaluated in the simulation.In this article, we implement the OI protocol and evaluate the authorization process of the OI protocol in terms of the execution time. In the evaluation, we make clear the features of the execution time of authorization processes for GET, PUT, POST, and DELETE operations in the OI protocol.