2019
DOI: 10.1109/mitp.2018.2876985
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Access Control System for Wearable Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…To ensure that the subject can complete the tasks that need to be completed under the privileges granted, while limiting the operations that the subject can perform, so as to minimize the loss caused by illegal or misoperation [9]. The principle of separation of duties, as a more advanced authority control mechanism, produces some mutually exclusive constraints based on the actual effect of authority.…”
Section: Application Research Methods Of Accessmentioning
confidence: 99%
“…To ensure that the subject can complete the tasks that need to be completed under the privileges granted, while limiting the operations that the subject can perform, so as to minimize the loss caused by illegal or misoperation [9]. The principle of separation of duties, as a more advanced authority control mechanism, produces some mutually exclusive constraints based on the actual effect of authority.…”
Section: Application Research Methods Of Accessmentioning
confidence: 99%
“…Other research focuses include distributed environments [76,77], dynamic access control [78], scalability [79], and multilateral security [80]. These works will be compared with aforementioned works with other focuses in Table 2.…”
Section: Access-control Enforcement For the Wearable Equipmentmentioning
confidence: 99%
“…Other research focuses include distributed environments [53,54], dynamic access control [55], scalability [56] and multilateral security [57]. These works will be compared with aforementioned works from other focuses in Table 2.…”
Section: Access Control Enforcement For the Wearable Equipmentmentioning
confidence: 99%
“…While conventional encryption schemes like the Advanced Encryption Standard work fine on wearable gadgets with reasonable Ref. Feature [47] Modular context-aware access control [48] NIST NGAC framework [49] Multi-level access control [52] Automated access policy generation [53] BiLayer access control model [54] Virtual patient record alternative [55] Indeterminacy-tolerant access control [56] Healthcare RFID tag access control [57] Multi-level and multilateral security processing power and memory capabilities [58], they meet various bottlenecks when applied to monitoring devices and small sensors. To make the encryption approach compatible with these devices, lightweight encryption methods are proposed focusing on reducing computational overheads and increasing scheme efficiency.…”
Section: Security In Delicate Transmissionmentioning
confidence: 99%