Access control models for cloud-enabled internet of things: A proposed architecture and research agenda
A Alshehri, R Sandhu - 2016 IEEE 2nd International …, 2016 - ieeexplore.ieee.org
The concept and deployment of Internet of Things (IoT) has continued to develop momentum
over recent years. Several different layered architectures for IoT have been proposed …
over recent years. Several different layered architectures for IoT have been proposed …
Attribute-based access control for AWS internet of things and secure industries of the future
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …
Secure V2V and V2I communication in intelligent transportation using cloudlets
Intelligent Transportation System (ITS) is a vision which offers safe, secure and smart travel
experience to drivers. This futuristic plan aims to enable vehicles, roadside transportation …
experience to drivers. This futuristic plan aims to enable vehicles, roadside transportation …
An access control framework for cloud-enabled wearable internet of things
Internet of Things (IoT) has become a pervasive and diverse concept in recent years. IoT
applications and services have given rise to a number of sub-fields in the IoT space …
applications and services have given rise to a number of sub-fields in the IoT space …
A new access control scheme for Facebook-style social networks
The popularity of online social networks (OSNs) makes the protection of users' private
information an important but scientifically challenging problem. In the literature, relationship …
information an important but scientifically challenging problem. In the literature, relationship …
Security threats in wireless network communication-status, challenges, and future trends
AN Kadhim, SB Sadkhan - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The wireless air interface is open and accessible to both authorized and unauthorized users
due to the broadcast nature of radio propagation. In a wired network, communication …
due to the broadcast nature of radio propagation. In a wired network, communication …
An access control model for online social networks using user-to-user relationships
Users and resources in online social networks (OSNs) are interconnected via various types
of relationships. In particular, user-to-user relationships form the basis of the OSN structure …
of relationships. In particular, user-to-user relationships form the basis of the OSN structure …
Path conditions and principal matching: a new approach to access control
J Crampton, J Sellwood - Proceedings of the 19th ACM symposium on …, 2014 - dl.acm.org
Traditional authorization policies are user-centric, in the sense that authorization is defined,
ultimately, in terms of user identities. We believe that this user-centric approach is …
ultimately, in terms of user identities. We believe that this user-centric approach is …
A trust based privacy providing model for online social networks
N Voloch, N Gal-Oz, E Gudes - Online Social Networks and Media, 2021 - Elsevier
ABSTRACT Online Social Networks (OSN) have become a central means of communication
and interaction between people around the world. The essence of privacy has been …
and interaction between people around the world. The essence of privacy has been …
[图书][B] Security and trust in online social networks
The enormous success and diffusion that online social networks (OSNs) are encountering
nowadays is vastly apparent. Users' social interactions now occur using online social media …
nowadays is vastly apparent. Users' social interactions now occur using online social media …