Applying security patterns for authorization of users in IoT based applications | IEEE Conference Publication | IEEE Xplore