Implementation of blockchain-based e-voting system

S Tanwar, N Gupta, P Kumar, YC Hu - Multimedia tools and applications, 2024 - Springer
An electronic voting portal should provide security, integrity, vote transparency, and voter
privacy. Electronic voting, or e-voting, has been used in many ways since the 1970s, with …

Hybrid approaches (ABAC and RBAC) toward secure access control in smart home IoT

S Ameer, J Benson, R Sandhu - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Smart homes are interconnected homes in which a wide variety of digital devices with
limited resources communicate with multiple users and among themselves using multiple …

Achieving decentralized and dynamic sso-identity access management system for multi-application outsourced in cloud

S Fugkeaw - IEEE Access, 2023 - ieeexplore.ieee.org
Existing Single Sign-On (SSO) access control systems typically rely on the traditional
protocols requiring additional authentication mechanism and/or identity providers. As the …

Bluesky: Towards convergence of zero trust principles and score-based authorization for iot enabled smart systems

S Ameer, M Gupta, S Bhatt, R Sandhu - Proceedings of the 27th ACM on …, 2022 - dl.acm.org
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses
from static, network-based perimeters to focus on users, assets, and resources. It assumes …

[PDF][PDF] From theory to practice: Implementing effective role-based access control strategies to mitigate insider risks in diverse organizational contexts

YA Marquis - Journal of Engineering Research and Reports, 2024 - researchgate.net
This study investigates the effectiveness of Role-Based Access Control (RBAC) systems in
mitigating insider threats to database security within various organizational environments …

The model for mutable activity control and chain of dependencies in smart and connected systems

T Mawla, M Gupta, S Ameer, R Sandhu - International Journal of …, 2024 - Springer
With the integration of connected devices, artificial intelligence, and heterogeneous
networks in IoT-driven cyber-physical systems, our society is evolving as a smart …

BlueSky: Activity Control: A Vision for" Active" Security Models for Smart Collaborative Systems

T Mawla, M Gupta, R Sandhu - Proceedings of the 27th ACM on …, 2022 - dl.acm.org
Cyber physical ecosystem connects different intelligent devices over heterogeneous
networks. Various operations are performed on smart objects to ensure efficiency and to …

An extended Attribute-based access control with controlled delegation in IoT

S Tegane, F Semchedine, A Boudries - Journal of Information Security and …, 2023 - Elsevier
Access control is one of the main concerns for securing the Internet of Things (IoT) due to its
inherent features. It is particularly challenging to manage access policies and authorization …

SAAC: Secure Access Control Management Framework for Multi-User Smart Home Systems

IF Hashmi, Z Iqbal, E Munir, N Kryvinska… - IEEE …, 2024 - ieeexplore.ieee.org
In a smart home environment, multiple users can access a single smart device
simultaneously. Moreover, these multiple users may have conflicting demands at a time; that …

[HTML][HTML] ICS-LTU2022: A dataset for ICS vulnerabilities

M Alanazi, A Mahmood, MJM Chowdhury - Computers & Security, 2025 - Elsevier
Industrial control systems (ICS) are a collection of control systems and associated
instrumentation for controlling and monitoring industrial processes. Critical infrastructure …