Object security for constrained restful environments (oscore) G Selander, J Mattsson, F Palombini, L Seitz | 209* | 2019 |
Authorization framework for the internet-of-things L Seitz, G Selander, C Gehrmann 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and …, 2013 | 166 | 2013 |
S3K: Scalable security with symmetric keys—DTLS key establishment for the Internet of Things S Raza, L Seitz, D Sitenkov, G Selander IEEE Transactions on Automation Science and Engineering 13 (3), 1270-1280, 2016 | 151 | 2016 |
Access control system and method for operating said system B Sadighi, L Cao, L Seitz US Patent 8,482,378, 2013 | 146 | 2013 |
RFC 9200: Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth) L Seitz, G Selander, E Wahlstroem, S Erdtman, H Tschofenig RFC Editor, 2022 | 135* | 2022 |
Medical images simulation, storage, and processing on the european datagrid testbed J Montagnat, F Bellet, H Benoit-Cattin, V Breton, L Brunie, H Duque, ... Journal of Grid Computing 2, 387-400, 2004 | 106 | 2004 |
Use cases for authentication and authorization in constrained environments L Seitz, S Gerdes, G Selander, M Mani, S Kumar | 61* | 2016 |
Policy administration control and delegation using xacml and delegent L Seitz, E Rissanen, T Sandholm, BS Firozabadi, O Mulmo The 6th IEEE/ACM International Workshop on Grid Computing, 2005., 6 pp., 2005 | 59 | 2005 |
New paradigms for access control in constrained environments A Cherkaoui, L Bossuet, L Seitz, G Selander, R Borgaonkar 2014 9th International Symposium on Reconfigurable and Communication-Centric …, 2014 | 53 | 2014 |
Key management for encrypted data storage in distributed systems L Seitz, JM Pierson, L Brunie Second IEEE International Security in Storage Workshop, 20-20, 2003 | 53 | 2003 |
Secure session for a group of network nodes C Gehrmann, O Ohlsson, L Seitz US Patent 9,705,856, 2017 | 49 | 2017 |
Semantic access control for medical applications in grid environments L Seitz, JM Pierson, L Brunie European Conference on Parallel Processing, 374-383, 2003 | 37 | 2003 |
Encrypted storage of medical data on a grid L Seitz, JM Pierson, L Brunie Methods of Information in Medicine 44 (02), 198-201, 2005 | 33 | 2005 |
Evaluating the performance of the OSCORE security protocol in constrained IoT environments M Gunnarsson, J Brorsson, F Palombini, L Seitz, M Tiloca Internet of Things 13, 100333, 2021 | 29 | 2021 |
On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake M Tiloca, C Gehrmann, L Seitz International Journal of Information Security 16 (2), 173-193, 2017 | 23 | 2017 |
An architecture for authorization in constrained environments S Gerdes, L Seitz, G Selander, C Bormann IETF Draft, October 22, 2018 | 20 | 2018 |
Datagram transport layer security (dtls) profile for authentication and authorization for constrained environments (ace) S Gerdes, O Bergmann, C Bormann, G Selander, L Seitz Internet Engineering Task Force, Internet-Draft draft-ietf-acedtls-authorize-03, 2018 | 20 | 2018 |
Metadata for efficient, secure and extensible access to data in a medical grid JM Pierson, L Seitz, H Duque, J Montagnat Proceedings. 15th International Workshop on Database and Expert Systems …, 2004 | 19 | 2004 |
Authentication and authorization for IoT devices in disadvantaged environments S Echeverria, GA Lewis, D Klinedinst, L Seitz 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 368-373, 2019 | 17 | 2019 |
Authentication and Authorisation Prototype on the μgrid for Medical Data Management. L Seitz, J Montagnat, JM Pierson, D Oriol, D Lingrand HealthGrid, 222-233, 2005 | 17 | 2005 |