Check for A Unified Access Control Model for Calibration Traceability in Safety-Critical IoT Ryan Shah () and Shishir Nagaraja

R Shah - … Systems Security: 16th International Conference, ICISS …, 2020 - books.google.com
Accuracy (and hence calibration) is a key requirement of safety-critical IoT (SC-IoT) systems.
Calibration workflows involve a number of parties such as device users, manufacturers …

Security of robotic workflows

RK Shah - 2022 - stax.strath.ac.uk
Recent advances in computer science, artificial intelligence and engineering has pioneered
the field of robotics, bringing guarantees of higher levels of accuracy and lowered …

Resilient reference monitor for distributed access control via moving target defense

D Mulamba, I Ray - Data and Applications Security and Privacy XXXI: 31st …, 2017 - Springer
Effective access control is dependent not only on the existence of strong policies but also on
ensuring that the access control enforcement subsystem is adequately protected. Protecting …

Secure calibration in high-assurance IoT: traceability for safety resilience

R Shah, M McIntee, S Nagaraja, S Bhandary, P Arote… - 2019 - pureportal.strath.ac.uk
Traceable sensor calibration constitutes a foundational step that underpins operational
safety in the Industrial Internet of Things. Traceability is the property that ensures reliability of …

General methods for access control policy verification (application paper)

VC Hu, DR Kuhn - 2016 IEEE 17th International Conference on …, 2016 - ieeexplore.ieee.org
Access control systems are among the most critical of computer security components. Faulty
policies, misconfigurations, or flaws in software implementations can result in serious …

A survey on authorization in distributed systems: Information storage, data retrieval and trust evaluation

A Ahadipour, M Schanzenbach - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
In distributed environments, entities are distributed among different security domains and
they do not have prior knowledge of one another. In this setting, distributed systems and …

A calculus for flow-limited authorization

O Arden, AC Myers - 2016 IEEE 29th Computer Security …, 2016 - ieeexplore.ieee.org
Real-world applications routinely make authorization decisions based on dynamic
computation. Reasoning about dynamically computed authority is challenging. Integrity of …

Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper)

L Ren, R Chang, Q Yin, W Wang - … , VIC, Australia, December 13–15, 2017 …, 2017 - Springer
Successfully employed in the industry, hardware isolation environment enhances the access
control of traditional operating systems and requires more rigorous analysis. This paper first …

[图书][B] Assurance management framework for access control systems

H Hu - 2012 - search.proquest.com
Access control is one of the most fundamental security mechanisms used in the design and
management of modern information systems. However, there still exists an open question on …

WiP: Metamodel for Continuous Authorisation and Usage Control

A Hariri, A Ibrahim, T Dimitrakos, B Crispo - Proceedings of the 27th ACM …, 2022 - dl.acm.org
Access control has been traditionally used to protect data and privacy. Traditional access
control models (eg, ABAC, RBAC) cannot meet modern security requirements as …