Access control for IoT: A survey of existing research, dynamic policies and future directions

K Ragothaman, Y Wang, B Rimal, M Lawrence - Sensors, 2023 - mdpi.com
Internet of Things (IoT) provides a wide range of services in domestic and industrial
environments. Access control plays a crucial role in granting access rights to users and …

[PDF][PDF] Survey of centralized and decentralized access control models in cloud computing

S Almutairi, N Alghanmi… - International Journal of …, 2021 - pdfs.semanticscholar.org
In recent years, cloud computing has become a popular option for a number of different
businesses sectors. It is a paradigm employed to deliver a range of computing services …

Blockchain-based service-oriented architecture for consent management, access control, and auditing

I Román-Martínez, J Calvillo-Arbizu… - IEEE …, 2023 - ieeexplore.ieee.org
Continuity of care requires the exchange of health information among organizations and
care teams. The EU General Data Protection Regulation (GDPR) establishes that subject of …

Novel security models for IoT–Fog–cloud architectures in a real-world environment

MA Aleisa, A Abuhussein, FS Alsubaei, FT Sheldon - Applied Sciences, 2022 - mdpi.com
With the rise of the Internet of Things (IoT), there is a demand for computation at network
edges because of the limited processing capacity of IoT devices. Fog computing is a middle …

Fine-grained access control with user revocation in smart manufacturing

E Gómez-Marín, D Martintoni, V Senni, E Castillo… - Electronics, 2023 - mdpi.com
Collaborative manufacturing is a key enabler of Industry 4.0 that requires secure data
sharing among multiple parties. However, intercompany data-sharing raises important …

Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review

A Mohammad - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
As the functionality and services provided by cloud computing increase, control access to
these services becomes more complex, and more security breaches are generated. This is …

Performance analysis of two cloud-based iot implementations: Empirical study

M Aleisa, AA Hussein, F Alsubaei… - 2020 7th IEEE …, 2020 - ieeexplore.ieee.org
The emergence of the Internet of things (IoT) has generated demand for computation
performed at the 'edge'of the network. With companies being increasingly challenged to …

[PDF][PDF] Hybrid Role and Attribute Based Access Control Applied in Information Systems

M Penelova - Cybernetics and Information Technologies, 2021 - sciendo.com
It this paper it is proposed a new access control model–Hybrid Role and Attribute Based
Access Control (HRABAC). It is an extension of Role-Based Access Control (RBAC) …

[PDF][PDF] A Secure Access Control Architecture for Multi-Tenancy Cloud Environments

R Beaubrun, A Quintero - CLOUD COMPUTING 2021, 2021 - researchgate.net
In multi-tenancy cloud environments, physical resources are transparently shared by
multiple Virtual Machines (VMs) belonging to multiple users. Implementing an efficient …

From Theory to Practice: Implementing Effective Role-Based Access Control Strategies to Mitigate Insider Risks in Diverse Organizational Contexts

YA Marquis - Journal of Engineering Research and …, 2024 - article.publish4promo.com
This study investigates the effectiveness of Role-Based Access Control (RBAC) systems in
mitigating insider threats to database security within various organizational environments …