1. Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA,Invernizzi L, Kallitsis M, Kumar D, Lever C, Ma Z, Mason J, Menscher D, Seaman C, Sullivan N, Thomas K, Zhou Y (2017) Understanding the mirai botnet. In: Proceedings of the 26th USENIX Security Symposium
2. Attrapadung N, Libert B, de Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) Public key cryptography-PKC 2011, Berlin, Heidelberg. Springer, Berlin, pp 90–108
3. Barreto L, Celesti A, Villari M, Fazio M, Puliafito A (2015) An authentication model for IoT clouds. In: 2015 IEEE/ACM International conference on advances in social networks analysis and mining (ASONAM), pp 1032–1035
4. Bertino E, Bonatti P, Ferrari E (2001) Trbac: a temporal role-based access control model. ACM Trans Inf Syst Secur 4:191–233
5. Capitani De, di Vimercati S, Samarati P (2011) Clark and Wilson model. Springer, US, Boston, pp 208–209