Access control models for cloud-enabled internet of things: A proposed architecture and research agenda

A Alshehri, R Sandhu - 2016 IEEE 2nd International …, 2016 - ieeexplore.ieee.org
The concept and deployment of Internet of Things (IoT) has continued to develop momentum
over recent years. Several different layered architectures for IoT have been proposed …

Attribute-based access control for AWS internet of things and secure industries of the future

S Bhatt, TK Pham, M Gupta, J Benson, J Park… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …

Secure V2V and V2I communication in intelligent transportation using cloudlets

M Gupta, J Benson, F Patwa… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Intelligent Transportation System (ITS) is a vision which offers safe, secure and smart travel
experience to drivers. This futuristic plan aims to enable vehicles, roadside transportation …

An access control framework for cloud-enabled wearable internet of things

S Bhatt, F Patwa, R Sandhu - 2017 IEEE 3rd International …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) has become a pervasive and diverse concept in recent years. IoT
applications and services have given rise to a number of sub-fields in the IoT space …

A new access control scheme for Facebook-style social networks

J Pang, Y Zhang - Computers & Security, 2015 - Elsevier
The popularity of online social networks (OSNs) makes the protection of users' private
information an important but scientifically challenging problem. In the literature, relationship …

Security threats in wireless network communication-status, challenges, and future trends

AN Kadhim, SB Sadkhan - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
The wireless air interface is open and accessible to both authorized and unauthorized users
due to the broadcast nature of radio propagation. In a wired network, communication …

An access control model for online social networks using user-to-user relationships

Y Cheng, J Park, R Sandhu - IEEE transactions on dependable …, 2015 - ieeexplore.ieee.org
Users and resources in online social networks (OSNs) are interconnected via various types
of relationships. In particular, user-to-user relationships form the basis of the OSN structure …

Path conditions and principal matching: a new approach to access control

J Crampton, J Sellwood - Proceedings of the 19th ACM symposium on …, 2014 - dl.acm.org
Traditional authorization policies are user-centric, in the sense that authorization is defined,
ultimately, in terms of user identities. We believe that this user-centric approach is …

A trust based privacy providing model for online social networks

N Voloch, N Gal-Oz, E Gudes - Online Social Networks and Media, 2021 - Elsevier
ABSTRACT Online Social Networks (OSN) have become a central means of communication
and interaction between people around the world. The essence of privacy has been …

[图书][B] Security and trust in online social networks

B Carminati, E Ferrari, M Viviani - 2022 - books.google.com
The enormous success and diffusion that online social networks (OSNs) are encountering
nowadays is vastly apparent. Users' social interactions now occur using online social media …