2016
DOI: 10.1109/tifs.2015.2512533
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical and Shared Access Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
29
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 56 publications
(29 citation statements)
references
References 37 publications
0
29
0
Order By: Relevance
“…(1) We investigate Kang's protocol [19] and provide improvements in key distribution [20], communication overhead, and resistance to impersonation attack and DoP (Denial of Proof) attack. (2) We establish a scheme to seal the identity of the tag into the grouping-proof message by the group key and session key.…”
Section: Our Contributionsmentioning
confidence: 99%
“…(1) We investigate Kang's protocol [19] and provide improvements in key distribution [20], communication overhead, and resistance to impersonation attack and DoP (Denial of Proof) attack. (2) We establish a scheme to seal the identity of the tag into the grouping-proof message by the group key and session key.…”
Section: Our Contributionsmentioning
confidence: 99%
“…In [12], Castiglione, et. al. show that hierarchical access may represent a limitation in many real-world cases.…”
Section: Related Workmentioning
confidence: 99%
“…However, current access control models are built using predefined rules that give the same result in different situations. This binary decision (grant/deny) cannot create a good and efficient level of security in a dynamic, heterogeneous and distrusted environment like IoT systems [10,11].…”
Section: Introductionmentioning
confidence: 99%