Check for A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT Ryan Shah () and Shishir Nagaraja
R Shah - … Systems Security: 16th International Conference, ICISS …, 2020 - books.google.com
Accuracy (and hence calibration) is a key requirement of safety-critical IoT (SC-IoT) systems.
Calibration workflows involve a number of parties such as device users, manufacturers …
Calibration workflows involve a number of parties such as device users, manufacturers …
Security of robotic workflows
RK Shah - 2022 - stax.strath.ac.uk
Recent advances in computer science, artificial intelligence and engineering has pioneered
the field of robotics, bringing guarantees of higher levels of accuracy and lowered …
the field of robotics, bringing guarantees of higher levels of accuracy and lowered …
Resilient reference monitor for distributed access control via moving target defense
D Mulamba, I Ray - Data and Applications Security and Privacy XXXI: 31st …, 2017 - Springer
Effective access control is dependent not only on the existence of strong policies but also on
ensuring that the access control enforcement subsystem is adequately protected. Protecting …
ensuring that the access control enforcement subsystem is adequately protected. Protecting …
Secure calibration in high-assurance IoT: traceability for safety resilience
Traceable sensor calibration constitutes a foundational step that underpins operational
safety in the Industrial Internet of Things. Traceability is the property that ensures reliability of …
safety in the Industrial Internet of Things. Traceability is the property that ensures reliability of …
General methods for access control policy verification (application paper)
Access control systems are among the most critical of computer security components. Faulty
policies, misconfigurations, or flaws in software implementations can result in serious …
policies, misconfigurations, or flaws in software implementations can result in serious …
A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation
A Ahadipour, M Schanzenbach - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
In distributed environments, entities are distributed among different security domains and
they do not have prior knowledge of one another. In this setting, distributed systems and …
they do not have prior knowledge of one another. In this setting, distributed systems and …
A calculus for flow-limited authorization
Real-world applications routinely make authorization decisions based on dynamic
computation. Reasoning about dynamically computed authority is challenging. Integrity of …
computation. Reasoning about dynamically computed authority is challenging. Integrity of …
Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper)
L Ren, R Chang, Q Yin, W Wang - … , VIC, Australia, December 13–15, 2017 …, 2017 - Springer
Successfully employed in the industry, hardware isolation environment enhances the access
control of traditional operating systems and requires more rigorous analysis. This paper first …
control of traditional operating systems and requires more rigorous analysis. This paper first …
[图书][B] Assurance management framework for access control systems
H Hu - 2012 - search.proquest.com
Access control is one of the most fundamental security mechanisms used in the design and
management of modern information systems. However, there still exists an open question on …
management of modern information systems. However, there still exists an open question on …
WiP: Metamodel for Continuous Authorisation and Usage Control
Access control has been traditionally used to protect data and privacy. Traditional access
control models (eg, ABAC, RBAC) cannot meet modern security requirements as …
control models (eg, ABAC, RBAC) cannot meet modern security requirements as …