2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA) 2020
DOI: 10.1109/etfa46521.2020.9212081
|View full text |Cite
|
Sign up to set email alerts
|

A Model for Signatories in Cyber-Physical Systems

Abstract: Distributed Internet of Things and cyber-physical systems can potentially be used as agents to automatically sign events and transactions on behalf of users. To accomplish this, there is a need for a model that can represent the relationships, credentials and organizational hierarchies of people and devices, facilitating agents acting as signatories in a controlled way. This paper proposes such a model, where people in different positions are entitled to sign on behalf of organizations or departments therein a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…PoA-based authorization [8] is an authorization technique used to authorize devices to access protected resources on behalf of the principal, without requiring the principal to be online. The PoA model in its base form is completely decentralized (like for example Pretty Good Privacy (PGP)), where the user subgrants their power in the form of a selfcontained PoA that contains public information such as public keys and a specific set of permissions for a predefined time.…”
Section: A Power Of Attorney Based Authorizationmentioning
confidence: 99%
See 1 more Smart Citation
“…PoA-based authorization [8] is an authorization technique used to authorize devices to access protected resources on behalf of the principal, without requiring the principal to be online. The PoA model in its base form is completely decentralized (like for example Pretty Good Privacy (PGP)), where the user subgrants their power in the form of a selfcontained PoA that contains public information such as public keys and a specific set of permissions for a predefined time.…”
Section: A Power Of Attorney Based Authorizationmentioning
confidence: 99%
“…The scope of this paper is to compare existing delegation models, specifically the Power-of-Attorney (PoA) [8], the proxy signature by warrant [9], and OAuth [6]. The objective is to analyze the trade-offs and propose a solution based on industry standards to facilitate industry uptake.…”
Section: Introductionmentioning
confidence: 99%