2019
DOI: 10.1109/tce.2018.2883382
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-Based Access Control for the Swarm With Distributed Policy Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…e attribute-based access control model (ABAC) is an emerging access control model that has attracted much attention from scholars. e ABAC model has many excellent features such as fine-grained, flexible, dynamic, identity-less, and rich policy expression, which makes it have a wide range of application scenarios, such as distributed computing [16], Internet of ings (IoT) healthcare [17], IoT home devices [18], financial industry [19], and so on. While there is currently no single agreedupon model or standardization of ABAC, there are commonly accepted high-level definitions and descriptions of its function.…”
Section: Abac Modelmentioning
confidence: 99%
“…e attribute-based access control model (ABAC) is an emerging access control model that has attracted much attention from scholars. e ABAC model has many excellent features such as fine-grained, flexible, dynamic, identity-less, and rich policy expression, which makes it have a wide range of application scenarios, such as distributed computing [16], Internet of ings (IoT) healthcare [17], IoT home devices [18], financial industry [19], and so on. While there is currently no single agreedupon model or standardization of ABAC, there are commonly accepted high-level definitions and descriptions of its function.…”
Section: Abac Modelmentioning
confidence: 99%
“…This method ensured data confidentiality and user legitimacy in the mobile cloud computing system. In [26], a distributed attribute-based access control system was presented, which provided a distributed policy management to allow users to set up policies for the Internet of Things (IoT) devices. This method ensured confidentiality and prevented network attacks at the edge of networks.…”
Section: B Access Control Technologymentioning
confidence: 99%
“…The referred attributes can be related to the subject, the object, environment conditions, and policies. The ABAC-based model created in the Swarm platform is called ABAC-them (Fedrecheski et al, 2018) and focuses on combining simplicity and expressiveness. The main characteristics of ABAC-them model are:…”
Section: Access Control Modelmentioning
confidence: 99%
“…An entire section is devoted for each component, explaining the rationale, architecture and examples. Table 4.1, the Swarm access control model, proposed by Fedrecheski et al (2018) and described in Section 2.1.6, de nes a policy-based mechanism to constrain the temporal use of a service. In future versions of this framework, both models will be uni ed in a single comprehensive block.…”
Section: Framework Architecturementioning
confidence: 99%
See 1 more Smart Citation