1. T., Wendt , J. & Potkonjak , M. Security of IoT Systems: Design Challenges and Opportunities. IEEE/ACM International Conference On Computer-Aided Design (ICCAD). pp. 417 -- 423 ( 2014 ) T., Wendt, J. & Potkonjak, M. Security of IoT Systems: Design Challenges and Opportunities. IEEE/ACM International Conference On Computer-Aided Design (ICCAD). pp. 417--423 (2014)
2. S., Benson , J. & Sandhu , R. The EGRBAC Model for Smart Home IoT. IEEE International Conference On Information Reuse And Integration For Data Science. pp. 457 -- 462 ( 2020 ) S., Benson, J. & Sandhu, R. The EGRBAC Model for Smart Home IoT. IEEE International Conference On Information Reuse And Integration For Data Science. pp. 457--462 (2020)
3. S. & Sandhu , R. The HABAC Model for Smart Home IoT and Comparison to EGRBAC . ACM Workshop On Secure And Trustworthy Cyber-Physical Systems. pp. 39 -- 48 ( 2021 ) S. & Sandhu, R. The HABAC Model for Smart Home IoT and Comparison to EGRBAC. ACM Workshop On Secure And Trustworthy Cyber-Physical Systems. pp. 39--48 (2021)
4. B., Haefner , K. & Ray , I. Securing Home IoT Environments with Attribute-Based Access Control. Third ACM Workshop On Attribute-Based Access Control. pp. 43 -- 53 ( 2018 ) B., Haefner, K. & Ray, I. Securing Home IoT Environments with Attribute-Based Access Control. Third ACM Workshop On Attribute-Based Access Control. pp. 43--53 (2018)
5. R. & Samarati , P. Access Control: Principle and Practice . IEEE Communications Magazine . textbf32, 40--48 ( 1994 ) R. & Samarati, P. Access Control: Principle and Practice. IEEE Communications Magazine. textbf32, 40--48 (1994)