2017
DOI: 10.1007/978-3-319-57186-7_7
|View full text |Cite
|
Sign up to set email alerts
|

Trust-ABAC Towards an Access Control System for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…Instead, users prove they possess a set of attributes from the system. ABC is particularly well‐suited for access‐control policies, especially attribute‐based access control 44,45 . As an extension of IBC, however, ABC also suffers from the key escrow problem and bilinear pairings.…”
Section: Authentication Methodsmentioning
confidence: 99%
“…Instead, users prove they possess a set of attributes from the system. ABC is particularly well‐suited for access‐control policies, especially attribute‐based access control 44,45 . As an extension of IBC, however, ABC also suffers from the key escrow problem and bilinear pairings.…”
Section: Authentication Methodsmentioning
confidence: 99%
“…There have been some efforts made in combining a trust model with the ABAC model. For instance, Ouechtati and Azzouna [81] discuss a trust-ABAC model for IoT. This proposal considers the nature of IoT devices (especially the resource limitation issue) and reviews the critical aspects of an IoT system when proposing its access control model.…”
Section: Attribute-based Andmentioning
confidence: 99%
“…With a similar approach of [81] (that combines trust and ABAC), Wang et al [82] present an IoT access control model based on trust and attributes. However, unlike [81], which only considers the dynamic trust value, this model integrates both the static and dynamic trust attributes when making an authorization decision.…”
Section: Attribute-based Andmentioning
confidence: 99%
See 1 more Smart Citation
“…Different works focus on attribute-based access control models on centralized architectures. For instance, the reference [19] presents an AC model for IoT, in which it is established a coupling between ABAC and trust concepts. In addition, the reference [20] promotes an ABAC mechanism, which is applied to give the system the ability to implement policies to detect any unauthorized entry.…”
Section: Attribute-based Access Control (Abac) Vs Role-based Access mentioning
confidence: 99%