Securing tags to control information flows within the Internet of Things

J Singh, TFJM Pasquier, J Bacon - … International Conference on …, 2015 - ieeexplore.ieee.org
To realise the full potential of the Internet of Things (IoT), IoT architectures are moving
towards open and dynamic interoperability, as opposed to closed application silos. This is …

Pervasive authentication and authorization infrastructures for mobile users

J Forné, F Hinarejos, A Marín, F Almenárez, J Lopez… - Computers & …, 2010 - Elsevier
Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more
generally, extremely dynamic operating conditions, are major challenges in the design of …

Firewall for attribute-based access control in smart grids

C Ruland, J Sassmannshausen - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
This paper sets the focus on Attribute-based Access Control (ABAC) in Smart Grid
environments such as substation automation scenarios. IEC 62351-8 describes Role-based …

A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce

C Schlager, T Nowey… - … Conference on Availability …, 2006 - ieeexplore.ieee.org
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout
the Internet. Solutions have been proposed for various scenarios among them academia …

Building a distributed semantic-aware security architecture

J Kolter, R Schillinger, G Pernul - … for Security, Privacy and Trust in …, 2007 - Springer
Enhancing the service-oriented architecture paradigm with semantic components is a new
field of research and goal of many ongoing projects. The results lead to more powerful web …

OPA: Onion Policy Administration Model—Another approach to manage rights in DRM

T Sans, F Cuppens, N Cuppens-Boulahia - … : Proceedings of the IFIP TC-11 …, 2007 - Springer
Abstract Digital Rights Management frameworks (DRM) aim at protecting and controlling
information contents widely distributed on client devices. Using a license, the content owner …

Architecting adaptable security infrastructures for pervasive networks through components

M Lacoste - … Conference on Future Generation Communication and …, 2009 - Springer
Security management for pervasive networks should be fundamentally flexible. The dynamic
and heterogeneous character of these environments requires a security infrastructure which …

Delegating Privileges over Finite Resources: A Quota Based Delegation Approach

I Agudo, C Fernandez-Gago, J Lopez - … Aspects in Security and Trust: 5th …, 2009 - Springer
When delegation in real world scenarios is considered, the delegator (the entity that posses
the privileges) usually passes the privileges on to the delegatee (the entity that receives the …

A Self-Administrative Sub-Role-Based Delegation Model for PMI Systems

Y Liu, Y Zhu, X Luo - Advances in Communication Systems and Electrical …, 2008 - Springer
The role-based access control (RBAC) model [1] has emerged since the 1990s as a
promising approach for managing and enforcing security in a huge and complex system …

Secure role activation and authorization in the enterprise environment

RWC Lui, LCK Hui, SM Yiu - … , EuroPKI 2005, Canterbury, UK, June 30-July …, 2005 - Springer
Abstract Role Based Access Control (RBAC)[3] is a popular approach to specify and enforce
security policies in organizations. In large enterprise systems, the number of users, roles and …