Access control in the Internet of Things: Big challenges and new opportunities

A Ouaddah, H Mousannif, A Abou Elkalam… - Computer Networks, 2017 - Elsevier
In this paper, an extensive state of the art review of different access control solutions in IoT
within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An …

PolyOrBAC: A security framework for Critical Infrastructures

A Abou El Kalam, Y Deswarte, A Baïna… - International Journal of …, 2009 - Elsevier
Due to physical and logical vulnerabilities, a critical infrastructure (CI) can encounter failures
of various degrees of severity, and since there are many interdependencies between CIs …

Using hierarchical timed coloured petri nets in the formal study of TRBAC security policies

H Ben Attia, L Kahloul, S Benhazrallah… - International Journal of …, 2020 - Springer
Abstract Role-Based Access Control (RBAC) is one of the most used models in designing
and implementation of security policies, in large networking systems. Basic RBAC model …

Integrity-OrBAC: a new model to preserve Critical Infrastructures integrity

A Ameziane El Hassani, A Abou El Kalam… - International Journal of …, 2015 - Springer
Nations development depends heavily on the proper functioning of their Critical
Infrastructures (CIs). Their security requirements are very important since small dysfunctions …

Pervasive-based access control model for IoT environments

S El Bouanani, MA El Kiram, O Achbarou… - IEEE …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) has become a global sensory network that links physical and
virtual objects by communicating and exploiting data and initiating physical actions. The …

An FPGA-based general-purpose data acquisition controller

CCW Robson, A Bousselham - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
System development in advanced FPGAs allows considerable flexibility, both during
development and in production use. A mixed firmware/software solution allows the …

An exploration of distributed access control mechanism using blockchain

D Swapna, SP Praveen - … Computing and Applications: Proceedings of the …, 2020 - Springer
To adequately take an interest in the current coordinated partnerships, associate companies
ought to have the capacity to impart computerized resources to different collaborators, while …

Self-healing and resilient critical infrastructures

R Gustavsson, B Ståhl - … Third International Workshop, CRITIS 2008, Rome …, 2009 - Springer
The paper describes methods and tools addressing self-healing and resilience of critical
infrastructures, specifically power and information networks. Our case study is based on …

[PDF][PDF] A Model-based Approach for the Modeling and the Verification of Railway Signaling System.

R Bougacha, AA Wakrime, S Kallel, RB Ayed… - …, 2019 - pdfs.semanticscholar.org
Railway Signaling System aims at resolving interoperability problems of railway signaling
and train control/-command. An European system is taken place to guarantee …

[PDF][PDF] Decentralized Access Control Using The Blockchain

T Jamsrandorj - 2017 - harvest.usask.ca
To effectively participate in modern collaborations, member organizations should be able to
share digital resources with various partners, while ensuring their digital resources are …