2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computi 2014
DOI: 10.1109/uic-atc-scalcom.2014.140
|View full text |Cite
|
Sign up to set email alerts
|

A Fine-Grained Cross-Domain Access Control Mechanism for Social Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…The execution process of the decentralized blockchain access control model is shown in Figure 6. The access control models of RABC (Wu et al, 2014), ABAC and UCON (Park & Sandhu, 2002) under the traditional IoMT system all manage access control through centralized authority decisionmaking. Since the computing and storage capabilities of most IoT device nodes are insufficient to support access control management, the execution process of access control is mainly through thirdparty platforms or server devices other than IoT devices.…”
Section: Introducing the Access Control Methods Of Blockchain Technologymentioning
confidence: 99%
“…The execution process of the decentralized blockchain access control model is shown in Figure 6. The access control models of RABC (Wu et al, 2014), ABAC and UCON (Park & Sandhu, 2002) under the traditional IoMT system all manage access control through centralized authority decisionmaking. Since the computing and storage capabilities of most IoT device nodes are insufficient to support access control management, the execution process of access control is mainly through thirdparty platforms or server devices other than IoT devices.…”
Section: Introducing the Access Control Methods Of Blockchain Technologymentioning
confidence: 99%
“…For multi-domain SIoT-based systems, the smart devices belong to different authority domains. In order to determine the device role in a foreign domain and get access to the required resource, the role mapping concept is leveraged between the hierarchical access control structures to map the access requester security level in its target domain [22]. However, the social conditions such as the type of the social relationship between the access requester device and the resource device are not considered in the role mapping.…”
Section: A Access Control Mechanismsmentioning
confidence: 99%
“…Standard access control models are widely used in inter-domain authorization, but they face a challenge of adopting them to the inter-domain constraints. Since cross-domain authorization requires to determine the role of the user requesting the remote access, the role mapping concept is proposed via creating a single-goal-role [29], mapping between hierarchical access control structures [19,30], or using the ontology [31,32]. The single-goal-role consists of finding the appropriate role for a local user allowing him to access the remote resources.…”
Section: Inter-domain Authorizationmentioning
confidence: 99%
“…In SIoT, the existing access control mechanisms are implemented based on the XACML specification [17] (i.e. SocIoTal [18]) and role mapping [19]. These mechanisms evaluate the predefined access policies which specify who is authorized (i.e.…”
Section: Introductionmentioning
confidence: 99%