Protocol-based and hybrid access control for the iot: Approaches and research opportunities
S Pal, Z Jadidi - Sensors, 2021 - mdpi.com
Internet of Things (IoT) applications and services are becoming more prevalent in our
everyday life. However, such an interconnected network of intelligent physical entities needs …
everyday life. However, such an interconnected network of intelligent physical entities needs …
PARBAC: Priority-attribute-based RBAC model for azure IoT cloud
Duties are segregated within a team by using the role-based access control (RBAC) in the
Azure Internet of Things (IoT) framework, and only an appropriate level of access is granted …
Azure Internet of Things (IoT) framework, and only an appropriate level of access is granted …
A hybrid access control model with dynamic COI for secure localization of satellite and IoT-based vehicles
Secure localization of vehicles is gaining the attention of researchers from both academia
and industry especially due to the emergence of internet of things (IoT). The modern …
and industry especially due to the emergence of internet of things (IoT). The modern …
Automatic hybrid access control in scada-enabled iiot networks using machine learning
The recent advancements in the Internet of Things have made it converge towards critical
infrastructure automation, opening a new paradigm referred to as the Industrial Internet of …
infrastructure automation, opening a new paradigm referred to as the Industrial Internet of …
Secure and dynamic access control for the Internet of Things (IoT) based traffic system
MU Aftab, A Oluwasanmi, A Alharbi, O Sohaib… - PeerJ Computer …, 2021 - peerj.com
Today, the trend of the Internet of Things (IoT) is increasing through the use of smart devices,
vehicular networks, and household devices with internet-based networks. Specifically, the …
vehicular networks, and household devices with internet-based networks. Specifically, the …
Permission-based separation of duty in dynamic role-based access control model
A major development in the field of access control is the dominant role-based access control
(RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the …
(RBAC) scheme. The fascination of RBAC lies in its enhanced security along with the …
A new RFID Middleware architecture based on a hybrid security technique using data encryption and RBAC for modern real-time tracking applications
Radio Frequency Identification (RFID) is a contactless technology that has developed over
the 90s and 20th centuries. It employs electromagnetic or electrostatic coupling in the radio …
the 90s and 20th centuries. It employs electromagnetic or electrostatic coupling in the radio …
User Authorization in Microservice-Based Applications
N Sänger, S Abeck - Software, 2023 - mdpi.com
Microservices have emerged as a prevalent architectural style in modern software
development, replacing traditional monolithic architectures. The decomposition of business …
development, replacing traditional monolithic architectures. The decomposition of business …
Attribute-based access control rules supported by biclique patterns
A Perez-Haro, A Diaz-Perez - 2023 IEEE Ninth International …, 2023 - ieeexplore.ieee.org
Technological trends demand the integration of the Attribute-based Access Control (ABAC)
model in security systems, which makes possible the definition of high-granularity rules by …
model in security systems, which makes possible the definition of high-granularity rules by …
Attribute based access control model for protecting programmable logic controllers
S Gowdanakatte, I Ray, S Hilde Houmb - … of the 2022 ACM Workshop on …, 2022 - dl.acm.org
Industrial Control Systems (ICS) were traditionally designed as stand-alone systems and
isolated from Internet Technology (IT) networks. With the advancement in communication …
isolated from Internet Technology (IT) networks. With the advancement in communication …