Access control for IoT: A survey of existing research, dynamic policies and future directions
Internet of Things (IoT) provides a wide range of services in domestic and industrial
environments. Access control plays a crucial role in granting access rights to users and …
environments. Access control plays a crucial role in granting access rights to users and …
[PDF][PDF] Survey of centralized and decentralized access control models in cloud computing
S Almutairi, N Alghanmi… - International Journal of …, 2021 - pdfs.semanticscholar.org
In recent years, cloud computing has become a popular option for a number of different
businesses sectors. It is a paradigm employed to deliver a range of computing services …
businesses sectors. It is a paradigm employed to deliver a range of computing services …
Blockchain-based service-oriented architecture for consent management, access control, and auditing
I Román-Martínez, J Calvillo-Arbizu… - IEEE …, 2023 - ieeexplore.ieee.org
Continuity of care requires the exchange of health information among organizations and
care teams. The EU General Data Protection Regulation (GDPR) establishes that subject of …
care teams. The EU General Data Protection Regulation (GDPR) establishes that subject of …
Novel security models for IoT–Fog–cloud architectures in a real-world environment
With the rise of the Internet of Things (IoT), there is a demand for computation at network
edges because of the limited processing capacity of IoT devices. Fog computing is a middle …
edges because of the limited processing capacity of IoT devices. Fog computing is a middle …
Fine-grained access control with user revocation in smart manufacturing
Collaborative manufacturing is a key enabler of Industry 4.0 that requires secure data
sharing among multiple parties. However, intercompany data-sharing raises important …
sharing among multiple parties. However, intercompany data-sharing raises important …
Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review
A Mohammad - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
As the functionality and services provided by cloud computing increase, control access to
these services becomes more complex, and more security breaches are generated. This is …
these services becomes more complex, and more security breaches are generated. This is …
Performance analysis of two cloud-based iot implementations: Empirical study
M Aleisa, AA Hussein, F Alsubaei… - 2020 7th IEEE …, 2020 - ieeexplore.ieee.org
The emergence of the Internet of things (IoT) has generated demand for computation
performed at the 'edge'of the network. With companies being increasingly challenged to …
performed at the 'edge'of the network. With companies being increasingly challenged to …
[PDF][PDF] Hybrid Role and Attribute Based Access Control Applied in Information Systems
M Penelova - Cybernetics and Information Technologies, 2021 - sciendo.com
It this paper it is proposed a new access control model–Hybrid Role and Attribute Based
Access Control (HRABAC). It is an extension of Role-Based Access Control (RBAC) …
Access Control (HRABAC). It is an extension of Role-Based Access Control (RBAC) …
[PDF][PDF] A Secure Access Control Architecture for Multi-Tenancy Cloud Environments
R Beaubrun, A Quintero - CLOUD COMPUTING 2021, 2021 - researchgate.net
In multi-tenancy cloud environments, physical resources are transparently shared by
multiple Virtual Machines (VMs) belonging to multiple users. Implementing an efficient …
multiple Virtual Machines (VMs) belonging to multiple users. Implementing an efficient …
From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts
YA Marquis - Journal of Engineering Research and …, 2024 - article.publish4promo.com
This study investigates the effectiveness of Role-Based Access Control (RBAC) systems in
mitigating insider threats to database security within various organizational environments …
mitigating insider threats to database security within various organizational environments …