Access control in the Internet of Things: Big challenges and new opportunities
In this paper, an extensive state of the art review of different access control solutions in IoT
within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An …
within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An …
Organizational information security policies: a review and research framework
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …
of organizational policies that specify how users of information and technology resources …
A survey on access control in the age of internet of things
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …
such as social resources and physical resources, are deeply integrated for different …
[PDF][PDF] Using social media to enhance emergency situation awareness
Enabling situation awareness in a given environment thus relies on being able to identify an
appropriate set of perception elements, coupled with higher-level comprehension patterns …
appropriate set of perception elements, coupled with higher-level comprehension patterns …
Attribute-based access control for AWS internet of things and secure industries of the future
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …
Monitoring metric first-order temporal properties
Runtime monitoring is a general approach to verifying system properties at runtime by
comparing system events against a specification formalizing which event sequences are …
comparing system events against a specification formalizing which event sequences are …
A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities
In smart cities, wireless sensor networks (WSNs) act as a type of core infrastructure that
collects data from the city to implement smart services. The security of WSNs is one of the …
collects data from the city to implement smart services. The security of WSNs is one of the …
Security analysis in role-based access control
The administration of large role-based access control (RBAC) systems is a challenging
problem. In order to administer such systems, decentralization of administration tasks by the …
problem. In order to administer such systems, decentralization of administration tasks by the …
Usage control in computer security: A survey
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …
computer security. As yet it remains a challenging problem to work out, starting from the …
An attribute-based approach toward a secured smart-home IoT access control and a comparison with a role-based approach
The area of smart homes is one of the most popular for deploying smart connected devices.
One of the most vulnerable aspects of smart homes is access control. Recent advances in …
One of the most vulnerable aspects of smart homes is access control. Recent advances in …