Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system

T Ahmad, U Morelli, S Ranise, N Zannone - International Journal of …, 2022 - Springer
In recent years, the design of effective authorization mechanisms for IoT and, in particular,
for smart home applications has gained increasing attention from researchers and …

Ontology-based evaluation of ABAC policies for inter-organizational resource sharing

T Gupta, S Sural - Proceedings of the 9th ACM International Workshop …, 2023 - dl.acm.org
Attribute-based Access Control (ABAC), as the name suggests, determines whether an
access request be granted based on the attributes or characteristics of the requesting user …

Improving the attribute retrieval on ABAC using opportunistic caches for fog-based IoT networks

B Cremonezi, AR Gomes Filho, EF Silva, JAM Nacif… - Computer Networks, 2022 - Elsevier
Abstract Attribute-Based Access Control (ABAC) is one of the most popular and fits access
control methods for the Internet of Things (IoT). Yet, despite its popularity, just a few works …

PICO: Privacy-preserving access control in IoT scenarios through incomplete information

S Sciancalepore, N Zannone - Proceedings of the 37th ACM/SIGAPP …, 2022 - dl.acm.org
Internet of Things (IoT) platforms typically require IoT devices and users to provide fine-
grained information to determine whether access to resources and services can be granted …

Automatic online quantification and prioritization of data protection risks

SS Zmiewski, J Laufer, ZÁ Mann - Proceedings of the 17th International …, 2022 - dl.acm.org
Data processing systems operate in increasingly dynamic environments, such as in cloud or
edge computing. In such environments, changes at run time can result in the dynamic …