Access control in the Internet of Things: Big challenges and new opportunities

A Ouaddah, H Mousannif, A Abou Elkalam… - Computer Networks, 2017 - Elsevier
In this paper, an extensive state of the art review of different access control solutions in IoT
within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

[PDF][PDF] Using social media to enhance emergency situation awareness

J Yin, A Lampert, M Cameron, B Robinson… - IEEE intelligent …, 2012 - delvalle.bphc.org
Enabling situation awareness in a given environment thus relies on being able to identify an
appropriate set of perception elements, coupled with higher-level comprehension patterns …

Attribute-based access control for AWS internet of things and secure industries of the future

S Bhatt, TK Pham, M Gupta, J Benson, J Park… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …

Monitoring metric first-order temporal properties

D Basin, F Klaedtke, S Müller, E Zălinescu - Journal of the ACM (JACM), 2015 - dl.acm.org
Runtime monitoring is a general approach to verifying system properties at runtime by
comparing system events against a specification formalizing which event sequences are …

A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities

J Wu, K Ota, M Dong, C Li - IEEE Access, 2016 - ieeexplore.ieee.org
In smart cities, wireless sensor networks (WSNs) act as a type of core infrastructure that
collects data from the city to implement smart services. The security of WSNs is one of the …

Security analysis in role-based access control

N Li, MV Tripunitara - ACM Transactions on Information and System …, 2006 - dl.acm.org
The administration of large role-based access control (RBAC) systems is a challenging
problem. In order to administer such systems, decentralization of administration tasks by the …

Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …