On predictive maintenance in industry 4.0: Overview, models, and challenges
In the era of the fourth industrial revolution, several concepts have arisen in parallel with this
new revolution, such as predictive maintenance, which today plays a key role in sustainable …
new revolution, such as predictive maintenance, which today plays a key role in sustainable …
A survey on zero trust architecture: Challenges and future trends
Y He, D Huang, L Chen, Y Ni… - … and Mobile Computing, 2022 - Wiley Online Library
The traditional perimeter‐based network protection model cannot adapt to the development
of current technology. Zero trust is a new type of network security model, which is based on …
of current technology. Zero trust is a new type of network security model, which is based on …
[HTML][HTML] A survey on blockchain envisioned attribute based access control for internet of things: Overview, comparative analysis, and open research challenges
Abstract The Internet of Things (IoT) network is rapidly expanding due to sudden
technological advancements, which enable objects to become intelligent and contribute to …
technological advancements, which enable objects to become intelligent and contribute to …
Automatic hybrid access control in scada-enabled iiot networks using machine learning
The recent advancements in the Internet of Things have made it converge towards critical
infrastructure automation, opening a new paradigm referred to as the Industrial Internet of …
infrastructure automation, opening a new paradigm referred to as the Industrial Internet of …
Digital Thread for Smart Products: A Survey on Technologies, Challenges and Opportunities in Service-Oriented Supply Chains
In Smart Manufacturing, the recent opportunities provided by the Information and
Communication Technologies have paved the way to a seamless connection of the …
Communication Technologies have paved the way to a seamless connection of the …
ARANAC: a bring-your-own-permissions network access control methodology for android devices
JA Gómez-Hernández, J Camacho… - IEEE …, 2021 - ieeexplore.ieee.org
In this paper, we introduce a new methodology for network access control for Android
devices based on app risk assessment. Named ARANAC (which stands for Application Risk …
devices based on app risk assessment. Named ARANAC (which stands for Application Risk …
[PDF][PDF] A novel hybrid approach for access control in cloud computing
S Alayda, NA Almowaysher, M Humayun… - Int. J. Eng. Res …, 2020 - seap.taylors.edu.my
Access control is essential to protect data and system resources by preventing unauthorized
access. Cloud computing ensures that users get benefit from such resources by following …
access. Cloud computing ensures that users get benefit from such resources by following …
A review of access control metamodels
The emergence of ubiquitous computing, especially with the Internet of Things (IoT),
releases new prospects to traditional information systems by merging new technologies and …
releases new prospects to traditional information systems by merging new technologies and …
[HTML][HTML] A domain-specific language for the specification of UCON policies
AMR Quintero, SM Pérez, ÁJ Varela-Vaca… - Journal of information …, 2022 - Elsevier
Security policies constrain the behavior of all users of an information system. In any non-
trivial system, these security policies go beyond simple access control rules and must cover …
trivial system, these security policies go beyond simple access control rules and must cover …
Managing security threats through touchless security technologies: An overview of the integration of facial recognition technology in the UAE oil and gas industry
SH Al Zaabi, R Zamri - Sustainability, 2022 - mdpi.com
Throughout the past few years, the oil and gas industry in the United Arab Emirates has
grown significantly, and is currently one of the top ten oil producers in the world. As a result …
grown significantly, and is currently one of the top ten oil producers in the world. As a result …