Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Implementation of blockchain-based e-voting system
An electronic voting portal should provide security, integrity, vote transparency, and voter
privacy. Electronic voting, or e-voting, has been used in many ways since the 1970s, with …
privacy. Electronic voting, or e-voting, has been used in many ways since the 1970s, with …
Hybrid approaches (ABAC and RBAC) toward secure access control in smart home IoT
Smart homes are interconnected homes in which a wide variety of digital devices with
limited resources communicate with multiple users and among themselves using multiple …
limited resources communicate with multiple users and among themselves using multiple …
Achieving decentralized and dynamic sso-identity access management system for multi-application outsourced in cloud
S Fugkeaw - IEEE Access, 2023 - ieeexplore.ieee.org
Existing Single Sign-On (SSO) access control systems typically rely on the traditional
protocols requiring additional authentication mechanism and/or identity providers. As the …
protocols requiring additional authentication mechanism and/or identity providers. As the …
Bluesky: Towards convergence of zero trust principles and score-based authorization for iot enabled smart systems
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses
from static, network-based perimeters to focus on users, assets, and resources. It assumes …
from static, network-based perimeters to focus on users, assets, and resources. It assumes …
[PDF][PDF] From theory to practice: Implementing effective role-based access control strategies to mitigate insider risks in diverse organizational contexts
YA Marquis - Journal of Engineering Research and Reports, 2024 - researchgate.net
This study investigates the effectiveness of Role-Based Access Control (RBAC) systems in
mitigating insider threats to database security within various organizational environments …
mitigating insider threats to database security within various organizational environments …
The model for mutable activity control and chain of dependencies in smart and connected systems
With the integration of connected devices, artificial intelligence, and heterogeneous
networks in IoT-driven cyber-physical systems, our society is evolving as a smart …
networks in IoT-driven cyber-physical systems, our society is evolving as a smart …
BlueSky: Activity Control: A Vision for" Active" Security Models for Smart Collaborative Systems
Cyber physical ecosystem connects different intelligent devices over heterogeneous
networks. Various operations are performed on smart objects to ensure efficiency and to …
networks. Various operations are performed on smart objects to ensure efficiency and to …
An extended Attribute-based access control with controlled delegation in IoT
Access control is one of the main concerns for securing the Internet of Things (IoT) due to its
inherent features. It is particularly challenging to manage access policies and authorization …
inherent features. It is particularly challenging to manage access policies and authorization …
SAAC: Secure Access Control Management Framework for Multi-User Smart Home Systems
In a smart home environment, multiple users can access a single smart device
simultaneously. Moreover, these multiple users may have conflicting demands at a time; that …
simultaneously. Moreover, these multiple users may have conflicting demands at a time; that …
[HTML][HTML] ICS-LTU2022: A dataset for ICS vulnerabilities
Industrial control systems (ICS) are a collection of control systems and associated
instrumentation for controlling and monitoring industrial processes. Critical infrastructure …
instrumentation for controlling and monitoring industrial processes. Critical infrastructure …