Survey on delegated and self-contained authorization techniques in CPS and IoT

SV Sudarsan, O Schelén, U Bodin - IEEE Access, 2021 - ieeexplore.ieee.org
Authentication, authorization, and digital identity management are core features required by
secure digital systems. In this, authorization is a key component for regulating the detailed …

A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics

ZM Iqal, A Selamat, O Krejcar - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology with a high market growth rate. In the
IoT, machines and users from different levels must collaborate to exchange data and share …

Research on access control scheme of system wide information management based on attribute association

L Zhang, Z You, K Wang, Z Cui - Security and Communication …, 2022 - Wiley Online Library
System wide information management (SWIM) involves civil aviation system control,
intelligence, alarm, traffic, and other data. These data are transmitted in various forms …

A comprehensive review of cybersecurity perspective for Wireless Sensor Networks

L Gashi, A Luma, A Aliu - 2022 International Symposium on …, 2022 - ieeexplore.ieee.org
Cybersecurity is treated by the CIA triad, used as an accepted generalized framework with
its components consisting of confidentiality, integrity, and availability. Many authors who …

Proposed Access Control Architecture Based on Fog Computing for IoT Environments

LA Charaf, I Alihamidi, A Deroussi… - … on Optimization and …, 2021 - ieeexplore.ieee.org
With the growing need for smart devices in our daily life, the cloud paradigm may not be able
to adapt to increasing data traffics neither to guarantee a standard level of security. In this …

Blockchain-based Digital Identity for Secure Authentication of IoT Devices In 5G Networks

V Aanandaram, P Deepalakshmi - 2024 Third International …, 2024 - ieeexplore.ieee.org
The growing use of IoT in 5G networks has led to new security concerns, particularly related
to the lack of authentication mechanisms. This paper proposes a new way to solve this …

Fine-grained Dynamic Authorization and Access Control in the Context of Graph-Structured Data/submitted by Aya Khaled Youssef Sayed Mohamed

AKYS Mohamed - 2024 - epub.jku.at
With the continuous growth of data and its complexity, advanced requirements have to be
considered to protect resources and private information against unauthorized disclosure …

Smart object-oriented access control: Distributed access control for the Internet of Things

T Cattermole - 2023 - discovery.ucl.ac.uk
Ensuring that data and devices are secure is of critical importance to information technology.
While access control has held a key role in traditional computer security, its role in the …

Detection of Conflicts Between Resource Authorization Rules in Extensible Access Control Markup Language Based on Dynamic Description Logic.

S Yang, C Tan - Ingénierie des Systèmes d'Information, 2020 - search.ebscohost.com
For resources in an open environment, the access control rules (ACRs), which are described
by extensible access control markup language (XACML), might have conflicts between each …

Dağıtık veri tabanı sistemlerinde çok seviyeli güvenlik modeli

Ç Bakır, M Güçlü - Pamukkale Üniversitesi Mühendislik Bilimleri Dergisi - dergipark.org.tr
Bilgi güvenliği, bilgiye erişim sağlayarak onu yetkisiz kullanma, değiştirme veya yayma gibi
faaliyetleri önleme çabasıdır. Bu, sadece bilginin ele geçirilmesi olarak düşünülmemeli, aynı …