Intelligence of things: opportunities & challenges
The Internet of Things (IoT) is a promising technology that can connect and communicate
virtual and physical objects globally. It allows billions of devices to be connected and …
virtual and physical objects globally. It allows billions of devices to be connected and …
An overview of risk estimation techniques in risk-based access control for the internet of things
The Internet of Things (IoT) represents a modern approach where boundaries between real
and digital domains are progressively eliminated by changing over consistently every …
and digital domains are progressively eliminated by changing over consistently every …
Technical aspects of blockchain and IoT
Blockchain technology is getting a growing attention from various organizations and
researchers as it provides magical solutions to the problems associated with the classical …
researchers as it provides magical solutions to the problems associated with the classical …
Internet of things: state-of-the-art, challenges, applications, and open issues
The Internet of Things (IoT) has become one of the unprecedented research trends for both
academic and commercial organizations. Every day, the publicity of the IoT is increased …
academic and commercial organizations. Every day, the publicity of the IoT is increased …
Develo** an adaptive Risk-based access control model for the Internet of Things
HF Atlam, A Alenezi, RJ Walters… - … on internet of things …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) is creating a revolution in the number of connected devices.
Cisco reported that there were 25 billion IoT devices in 2015 and modest estimation that this …
Cisco reported that there were 25 billion IoT devices in 2015 and modest estimation that this …
Security and privacy issues in fog computing
Fog computing is now becoming prominent among users due to its on‐demand services and
dynamic resource allocations. Resource allocation and scheduling is a critical task in cloud …
dynamic resource allocations. Resource allocation and scheduling is a critical task in cloud …
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
A Braeken, P Porambage… - International …, 2016 - journals.sagepub.com
The smart home field has witnessed rapid developments in recent years. Internet of Things
applications for the smart home are very heterogeneous and continuously increasing in …
applications for the smart home are very heterogeneous and continuously increasing in …
Reputation driven dynamic access control framework for iot atop poa ethereum blockchain
Security and Scalability are two major challenges that IoT is currently facing. Access control
to critical IoT infrastructure is considered as top security challenge that IoT faces. Data …
to critical IoT infrastructure is considered as top security challenge that IoT faces. Data …
A proposal of a distributed access control over fog computing: The its use case
I Riabi, LA Saidane, HKB Ayed - … International Conference on …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) raises many security challenges in relation with the different
applications that can be deployed over these environments. IoT access control systems must …
applications that can be deployed over these environments. IoT access control systems must …
A new dynamic smart-AC model methodology to enforce access control policy in IoT layers
Internet of Things (IoT) is the conversion of everyday tangible devices or machines to smart
objects. This means that these objects would be able to think, sense and feel. For example …
objects. This means that these objects would be able to think, sense and feel. For example …