2018 International Conference on Information Networking (ICOIN) 2018
DOI: 10.1109/icoin.2018.8343178
|View full text |Cite
|
Sign up to set email alerts
|

Towards a self-adaptive access control middleware for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…Due to its flexibility, the ABAC model has been widely used for implementing access control for IoT [31][32][33] [34]. Indeed, relying on identities for authenticating a subject is complex in IoT scenarios where device identities are hard to maintain and assert.…”
Section: Role-based Access Control (Rbac) Groups Permissionsmentioning
confidence: 99%
“…Due to its flexibility, the ABAC model has been widely used for implementing access control for IoT [31][32][33] [34]. Indeed, relying on identities for authenticating a subject is complex in IoT scenarios where device identities are hard to maintain and assert.…”
Section: Role-based Access Control (Rbac) Groups Permissionsmentioning
confidence: 99%
“…There have also been studies on IoT access control frameworks [5,22,23,24,25,26]. Sciancalepore et al [5] proposed an IoT access control framework that takes into consideration heterogeneous IoT platforms based on Decentralized Multi-Authority Ciphertext-Policy Attribute-Based Encryption (DMA-CP-ABE) and ABAC.…”
Section: Related Workmentioning
confidence: 99%
“…Andaloussi et al [24] implemented Distributed CapBAC (DCapBAC) using JSON-based capability tokens and analyzed the pros and cons of three feasible IoT scenarios (i.e., centralized approach, distributed approach, and hybrid approach). Two other studies [25,26] were based on the ABAC model. Neto et al [25] took advantage of a suite of cryptographic protocols to control access from unknown IoT devices with the consideration of the entire IoT device life-cycle (i.e., pre-deployment, ordering, deployment, functioning, and retirement).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…We are cooperating with the devices in a advent connected mode, with the technologies like Internet of Things. Through IoT the digital era is associated with the associated with the physical era [1]. The connectivity amidst the devices and people is boosting day by day.…”
Section: Introductionmentioning
confidence: 99%