Survey on delegated and self-contained authorization techniques in CPS and IoT
Authentication, authorization, and digital identity management are core features required by
secure digital systems. In this, authorization is a key component for regulating the detailed …
secure digital systems. In this, authorization is a key component for regulating the detailed …
A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics
The Internet of Things (IoT) is an emerging technology with a high market growth rate. In the
IoT, machines and users from different levels must collaborate to exchange data and share …
IoT, machines and users from different levels must collaborate to exchange data and share …
Research on access control scheme of system wide information management based on attribute association
L Zhang, Z You, K Wang, Z Cui - Security and Communication …, 2022 - Wiley Online Library
System wide information management (SWIM) involves civil aviation system control,
intelligence, alarm, traffic, and other data. These data are transmitted in various forms …
intelligence, alarm, traffic, and other data. These data are transmitted in various forms …
A comprehensive review of cybersecurity perspective for Wireless Sensor Networks
Cybersecurity is treated by the CIA triad, used as an accepted generalized framework with
its components consisting of confidentiality, integrity, and availability. Many authors who …
its components consisting of confidentiality, integrity, and availability. Many authors who …
Proposed Access Control Architecture Based on Fog Computing for IoT Environments
With the growing need for smart devices in our daily life, the cloud paradigm may not be able
to adapt to increasing data traffics neither to guarantee a standard level of security. In this …
to adapt to increasing data traffics neither to guarantee a standard level of security. In this …
Blockchain-based Digital Identity for Secure Authentication of IoT Devices In 5G Networks
V Aanandaram, P Deepalakshmi - 2024 Third International …, 2024 - ieeexplore.ieee.org
The growing use of IoT in 5G networks has led to new security concerns, particularly related
to the lack of authentication mechanisms. This paper proposes a new way to solve this …
to the lack of authentication mechanisms. This paper proposes a new way to solve this …
Fine-grained Dynamic Authorization and Access Control in the Context of Graph-Structured Data/submitted by Aya Khaled Youssef Sayed Mohamed
AKYS Mohamed - 2024 - epub.jku.at
With the continuous growth of data and its complexity, advanced requirements have to be
considered to protect resources and private information against unauthorized disclosure …
considered to protect resources and private information against unauthorized disclosure …
Smart object-oriented access control: Distributed access control for the Internet of Things
T Cattermole - 2023 - discovery.ucl.ac.uk
Ensuring that data and devices are secure is of critical importance to information technology.
While access control has held a key role in traditional computer security, its role in the …
While access control has held a key role in traditional computer security, its role in the …
Detection of Conflicts Between Resource Authorization Rules in Extensible Access Control Markup Language Based on Dynamic Description Logic.
S Yang, C Tan - Ingénierie des Systèmes d'Information, 2020 - search.ebscohost.com
For resources in an open environment, the access control rules (ACRs), which are described
by extensible access control markup language (XACML), might have conflicts between each …
by extensible access control markup language (XACML), might have conflicts between each …
Dağıtık veri tabanı sistemlerinde çok seviyeli güvenlik modeli
Ç Bakır, M Güçlü - Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi - dergipark.org.tr
Bilgi güvenliği, bilgiye erişim sağlayarak onu yetkisiz kullanma, değiştirme veya yayma gibi
faaliyetleri önleme çabasıdır. Bu, sadece bilginin ele geçirilmesi olarak düşünülmemeli, aynı …
faaliyetleri önleme çabasıdır. Bu, sadece bilginin ele geçirilmesi olarak düşünülmemeli, aynı …