Cybersecurity risk management framework for blockchain identity management systems in health IoT

B Alamri, K Crowley, I Richardson - Sensors, 2022 - mdpi.com
Blockchain (BC) has recently paved the way for developing Decentralized Identity
Management (IdM) systems for different information systems. Researchers widely use it to …

Risk-based access control model: A systematic literature review

HF Atlam, MA Azad, MO Alassafi, AA Alshdadi… - Future Internet, 2020 - mdpi.com
Most current access control models are rigid, as they are designed using static policies that
always give the same outcome in different circumstances. In addition, they cannot adapt to …

Flux maximizing geometric flows

A Vasilevskiy, K Siddiqi - IEEE transactions on pattern analysis …, 2002 - ieeexplore.ieee.org
Several geometric active contour models have been proposed for segmentation in computer
vision and image analysis. The essential idea is to evolve a curve (in 2D) or a surface (in …

A smart biometric identity management framework for personalised IoT and cloud computing-based healthcare services

F Farid, M Elkhodr, F Sabrina, F Ahamed, E Gide - Sensors, 2021 - mdpi.com
This paper proposes a novel identity management framework for Internet of Things (IoT) and
cloud computing-based personalized healthcare systems. The proposed framework uses …

SelCSP: A framework to facilitate selection of cloud service providers

N Ghosh, SK Ghosh, SK Das - IEEE transactions on cloud …, 2014 - ieeexplore.ieee.org
With rapid technological advancements, cloud marketplace witnessed frequent emergence
of new service providers with similar offerings. However, service level agreements (SLAs) …

Cloud identity management security issues & solutions: a taxonomy

U Habiba, R Masood, MA Shibli, MA Niazi - Complex Adaptive Systems …, 2014 - Springer
Purpose Cloud computing systems represent one of the most complex computing systems
currently in existence. Current applications of Cloud involve extensive use of distributed …

TLS/PKI challenges and certificate pinning techniques for IoT and M2M secure communications

D Diaz-Sanchez, A Marín-Lopez… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Transport layer security (TLS) is becoming the de facto standard to provide end-to-end
security in the current Internet. IoT and M2M scenarios are not an exception since TLS is …

An efficient security risk estimation technique for Risk-based access control model for IoT

HF Atlam, GB Wills - Internet of Things, 2019 - Elsevier
The need to increase information sharing in the Internet of Things (IoT) applications made
the risk-based access control model to be the best candidate for both academic and …

FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management

G Bendiab, S Shiaeles, S Boucherkha, B Ghita - computers & security, 2019 - Elsevier
Efficient identity management system has become one of the fundamental requirements for
ensuring safe, secure and transparent use of cloud services. In such a borderless …

A framework and risk assessment approaches for risk-based access control in the cloud

DR dos Santos, R Marinho, GR Schmitt… - Journal of Network and …, 2016 - Elsevier
Cloud computing is advantageous for customers and service providers. However, it has
specific security requirements that are not captured by traditional access control models, eg …