Securing tags to control information flows within the Internet of Things
J Singh, TFJM Pasquier, J Bacon - … International Conference on …, 2015 - ieeexplore.ieee.org
To realise the full potential of the Internet of Things (IoT), IoT architectures are moving
towards open and dynamic interoperability, as opposed to closed application silos. This is …
towards open and dynamic interoperability, as opposed to closed application silos. This is …
Pervasive authentication and authorization infrastructures for mobile users
Network and device heterogeneity, nomadic mobility, intermittent connectivity and, more
generally, extremely dynamic operating conditions, are major challenges in the design of …
generally, extremely dynamic operating conditions, are major challenges in the design of …
Firewall for attribute-based access control in smart grids
C Ruland, J Sassmannshausen - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
This paper sets the focus on Attribute-based Access Control (ABAC) in Smart Grid
environments such as substation automation scenarios. IEC 62351-8 describes Role-based …
environments such as substation automation scenarios. IEC 62351-8 describes Role-based …
A reference model for authentication and authorisation infrastructures respecting privacy and flexibility in b2c eCommerce
C Schlager, T Nowey… - … Conference on Availability …, 2006 - ieeexplore.ieee.org
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout
the Internet. Solutions have been proposed for various scenarios among them academia …
the Internet. Solutions have been proposed for various scenarios among them academia …
Building a distributed semantic-aware security architecture
J Kolter, R Schillinger, G Pernul - … for Security, Privacy and Trust in …, 2007 - Springer
Enhancing the service-oriented architecture paradigm with semantic components is a new
field of research and goal of many ongoing projects. The results lead to more powerful web …
field of research and goal of many ongoing projects. The results lead to more powerful web …
OPA: Onion Policy Administration Model—Another approach to manage rights in DRM
Abstract Digital Rights Management frameworks (DRM) aim at protecting and controlling
information contents widely distributed on client devices. Using a license, the content owner …
information contents widely distributed on client devices. Using a license, the content owner …
Architecting adaptable security infrastructures for pervasive networks through components
M Lacoste - … Conference on Future Generation Communication and …, 2009 - Springer
Security management for pervasive networks should be fundamentally flexible. The dynamic
and heterogeneous character of these environments requires a security infrastructure which …
and heterogeneous character of these environments requires a security infrastructure which …
Delegating Privileges over Finite Resources: A Quota Based Delegation Approach
When delegation in real world scenarios is considered, the delegator (the entity that posses
the privileges) usually passes the privileges on to the delegatee (the entity that receives the …
the privileges) usually passes the privileges on to the delegatee (the entity that receives the …
A Self-Administrative Sub-Role-Based Delegation Model for PMI Systems
Y Liu, Y Zhu, X Luo - Advances in Communication Systems and Electrical …, 2008 - Springer
The role-based access control (RBAC) model [1] has emerged since the 1990s as a
promising approach for managing and enforcing security in a huge and complex system …
promising approach for managing and enforcing security in a huge and complex system …
Secure role activation and authorization in the enterprise environment
RWC Lui, LCK Hui, SM Yiu - … , EuroPKI 2005, Canterbury, UK, June 30-July …, 2005 - Springer
Abstract Role Based Access Control (RBAC)[3] is a popular approach to specify and enforce
security policies in organizations. In large enterprise systems, the number of users, roles and …
security policies in organizations. In large enterprise systems, the number of users, roles and …