[HTML][HTML] A Comprehensive Survey on the Requirements, Applications, and Future Challenges for Access Control Models in IoT: The State of the Art

MS Ahsan, ASK Pathan - IoT, 2025 - mdpi.com
The Internet of Things (IoT) is a technologyof connecting billions of devices with
heterogeneous types and capabilities. Even though it is an attractive environment that could …

An access control system based on blockchain with zero-knowledge rollups in high-traffic IoT environments

X Lin, Y Zhang, C Huang, B **ng, L Chen, D Hu… - Sensors, 2023 - mdpi.com
The access control (AC) system in an IoT (Internet of Things) context ensures that only
authorized entities have access to specific devices and that the authorization procedure is …

The State-of-the-Art Access Control Models in IoT: A Survey on the Requirements, Scale, and Future Challenges

MS Ahsan, ASK Pathan - Scale, and Future Challenges, 2024 - papers.ssrn.com
Abstract The Internet of Things (IoT) is a grand vision of connecting billions of devices with
heterogeneous types and capabilities. Even though it is an attractive environment that could …

Blockchain-Empowered Token-Based Access Control System with User Reputation Evaluation.

Y Yang, Z Tu, Y Liu, H Zhou - Computers, Materials & …, 2023 - search.ebscohost.com
Currently, data security and privacy protection are becoming more and more important.
Access control is a method of authorization for users through predefined policies. Token …

Edge Computing for IoT: Novel Insights from a Comparative Analysis of Access Control Models

T Xue, Y Zhang, Y Wang, W Wang, S Li… - arxiv preprint arxiv …, 2024 - arxiv.org
IoT edge computing positions computing resources closer to the data sources to reduce the
latency, relieve the bandwidth pressure on the cloud, and enhance data security …

DTSAC: Smart Contract-based Access Control with Delegation and Trust Management

J Liao, Q Wu - 2023 IEEE 29th International Conference on …, 2023 - ieeexplore.ieee.org
With the proliferation of the Internet of Things (IoT), access control has become particularly
important in protecting data security. However, traditional access control models have …

Comprehensive Analysis of Access Control Models in Edge Computing: Challenges, Solutions, and Future Directions

T Xue, Y Zhang, H Zhang - arxiv e-prints, 2024 - ui.adsabs.harvard.edu
Many contemporary applications, including smart homes and autonomous vehicles, rely on
the Internet of Things technology. While cloud computing provides a multitude of valuable …

[PDF][PDF] 基于策略和属性隐藏的区块链访问控制方法研究.

杨志谋, 文**, 张帅, 张功国, 孙锐 - Cyber Security & Data …, 2023 - files.chinaaet.com
针对访问控制过程中缺乏对用户隐私保护的问题, 提出了一种基于策略和属性隐藏的区块链访问
控制方案. 首先, 基于Hyperledger Fabric **台编写访问请求, 属性管理和策略管理链码 …