2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN) 2017
DOI: 10.1109/icin.2017.7899433
|View full text |Cite
|
Sign up to set email alerts
|

A model to enable application-scoped access control as a service for IoT using OAuth 2.0

Abstract: Abstract-Access Control is crucial for security management, but in the context of the Internet of Things it cannot be implemented the same way as traditional systems do. Indeed, devices that make the Internet of Things impose some constraints that encourage the design of new access control mechanisms, which should provide flexibility of configuration, as well as support several authorization scopes at the same time, yet being computationally light, dynamic and scalable in order to be ready for the forthcoming … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0
3

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
2

Relationship

3
6

Authors

Journals

citations
Cited by 34 publications
(29 citation statements)
references
References 9 publications
(8 reference statements)
0
26
0
3
Order By: Relevance
“…FIWARE Security Framework [47,49] provides several software components for providing Identity and Access control to the FIWARE-based services and applications. Specifically, it offers an OAuth 2.0 server for registering third-party applications delegating the authentication to such server.…”
Section: Validation and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…FIWARE Security Framework [47,49] provides several software components for providing Identity and Access control to the FIWARE-based services and applications. Specifically, it offers an OAuth 2.0 server for registering third-party applications delegating the authentication to such server.…”
Section: Validation and Resultsmentioning
confidence: 99%
“…As we pointed out earlier, the model we propose allows service providers to decide the interface they should serve to the users depending on their functional capabilities. To achieve this, we have considered IAACaaS (IoT Application-Scoped Access Control as a Service) model [46,47] as a starting point. IAACaaS enables the complete delegation of authentication and authorization to enable an as a service access control mechanism for Internet of Things applications.…”
Section: Basic Architecturementioning
confidence: 99%
“…There are several approaches having been used to implement OAuth 2.0 with access control, such as access control with application scope for IoT used by Federico Fernandez [7]. Thus, the architectural concept enables access control on IoT.…”
Section: Related Workmentioning
confidence: 99%
“…Figure 2 shows the architecture we propose to achieve the Identity and Access Management IDS requirements using FIWARE components. It is based on the work explained in [ 26 , 27 ], where a generic IoT Application-Scoped Access Control as a Service (IAACaaS) mechanism is proposed. Here we extend and adapt it to fit the specific requirements of IDS.…”
Section: Materializing Industrial Data Space Architecture With Fiwmentioning
confidence: 99%