Cybersecurity risk management framework for blockchain identity management systems in health IoT
Blockchain (BC) has recently paved the way for developing Decentralized Identity
Management (IdM) systems for different information systems. Researchers widely use it to …
Management (IdM) systems for different information systems. Researchers widely use it to …
Risk-based access control model: A systematic literature review
Most current access control models are rigid, as they are designed using static policies that
always give the same outcome in different circumstances. In addition, they cannot adapt to …
always give the same outcome in different circumstances. In addition, they cannot adapt to …
Flux maximizing geometric flows
A Vasilevskiy, K Siddiqi - IEEE transactions on pattern analysis …, 2002 - ieeexplore.ieee.org
Several geometric active contour models have been proposed for segmentation in computer
vision and image analysis. The essential idea is to evolve a curve (in 2D) or a surface (in …
vision and image analysis. The essential idea is to evolve a curve (in 2D) or a surface (in …
A smart biometric identity management framework for personalised IoT and cloud computing-based healthcare services
This paper proposes a novel identity management framework for Internet of Things (IoT) and
cloud computing-based personalized healthcare systems. The proposed framework uses …
cloud computing-based personalized healthcare systems. The proposed framework uses …
SelCSP: A framework to facilitate selection of cloud service providers
With rapid technological advancements, cloud marketplace witnessed frequent emergence
of new service providers with similar offerings. However, service level agreements (SLAs) …
of new service providers with similar offerings. However, service level agreements (SLAs) …
Cloud identity management security issues & solutions: a taxonomy
Purpose Cloud computing systems represent one of the most complex computing systems
currently in existence. Current applications of Cloud involve extensive use of distributed …
currently in existence. Current applications of Cloud involve extensive use of distributed …
TLS/PKI challenges and certificate pinning techniques for IoT and M2M secure communications
D Diaz-Sanchez, A Marín-Lopez… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Transport layer security (TLS) is becoming the de facto standard to provide end-to-end
security in the current Internet. IoT and M2M scenarios are not an exception since TLS is …
security in the current Internet. IoT and M2M scenarios are not an exception since TLS is …
An efficient security risk estimation technique for Risk-based access control model for IoT
The need to increase information sharing in the Internet of Things (IoT) applications made
the risk-based access control model to be the best candidate for both academic and …
the risk-based access control model to be the best candidate for both academic and …
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management
Efficient identity management system has become one of the fundamental requirements for
ensuring safe, secure and transparent use of cloud services. In such a borderless …
ensuring safe, secure and transparent use of cloud services. In such a borderless …
A framework and risk assessment approaches for risk-based access control in the cloud
DR dos Santos, R Marinho, GR Schmitt… - Journal of Network and …, 2016 - Elsevier
Cloud computing is advantageous for customers and service providers. However, it has
specific security requirements that are not captured by traditional access control models, eg …
specific security requirements that are not captured by traditional access control models, eg …