A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues

ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters… - Sensors, 2020 - mdpi.com
Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an
overwhelming flow of data and services, which has shifted the access control paradigm from …

A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory

R Feng, X Xu, X Zhou, J Wan - Sensors, 2011 - mdpi.com
For wireless sensor networks (WSNs), many factors, such as mutual interference of wireless
links, battlefield applications and nodes exposed to the environment without good physical …

A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems

T **aoyong, K Li, Z Zeng… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In the recent past, security-sensitive applications, such as electronic transaction processing
systems, stock quote update systems, which require high quality of security to guarantee …

Context-aware access control with imprecise context characterization for cloud-based data resources

ASM Kayes, W Rahayu, T Dillon, E Chang… - Future Generation …, 2019 - Elsevier
Computing technologies are increasingly dynamic and ubiquitous in everyday life
nowadays. Context information plays a crucial role in such dynamically changing …

A multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning approach

WJ Fan, SL Yang, H Perros, J Pei - International Journal of Automation and …, 2015 - Springer
In the last few years, cloud computing as a new computing paradigm has gone through
significant development, but it is also facing many problems. One of them is the cloud …

SmartStore: A new metadata organization paradigm with semantic-awareness for next-generation file systems

Y Hua, H Jiang, Y Zhu, D Feng, L Tian - Proceedings of the conference …, 2009 - dl.acm.org
Existing storage systems using hierarchical directory tree do not meet scalability and
functionality requirements for exponentially growing datasets and increasingly complex …

[LIBRO][B] Internet of Things and Access Control: Sensing, Monitoring and Controlling Access in IoT-Enabled Healthcare Systems

S Pal - 2021 - books.google.com
This book presents the design and development of an access control architecture for the
Internet of Things (IoT) systems. It considers the significant authentication and authorization …

Trusted and secure clustering in mobile pervasive environment

MS Gaur, B Pant - Human-Centric Computing and Information Sciences, 2015 - Springer
Pervasive computing has the potential to offer low-cost, high performance, and user centric
solutions to exchange the information and communicate seamlessly in highly dynamic …

Towards the design of a trust management framework for the internet of things

S Pal, M Hitchens… - 2019 13th International …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) consists of a large number of entities (eg users and devices) and
applications connected through a communication infrastructure. In such large-scale and …

Context-aware access control with imprecise context characterization through a combined fuzzy logic and ontology-based approach

ASM Kayes, W Rahayu, T Dillon, E Chang… - On the Move to …, 2017 - Springer
Context information plays a crucial role in dynamically changing environments and the
different types of contextual conditions bring new challenges to access control. This …