Dimitrakos et al., 2020 - Google Patents
Trust aware continuous authorization for zero trust in consumer internet of thingsDimitrakos et al., 2020
- Document ID
- 254578551692433724
- Author
- Dimitrakos T
- Dilshener T
- Kravtsov A
- La Marra A
- Martinelli F
- Rizos A
- Rosetti A
- Saracino A
- Publication year
- Publication venue
- 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom)
External Links
Snippet
This work describes the architecture and prototype implementation of a novel trust-aware continuous authorization technology that targets consumer Internet of Things (IoT), eg, Smart Home. Our approach extends previous authorization models in three complementary …
- 238000011156 evaluation 0 abstract description 71
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dimitrakos et al. | Trust aware continuous authorization for zero trust in consumer internet of things | |
Kandala et al. | An attribute based framework for risk-adaptive access control models | |
Barka et al. | Securing the web of things with role-based access control | |
Ghosh et al. | SoftAuthZ: a context-aware, behavior-based authorization framework for home IoT | |
Tapas et al. | Experimenting with smart contracts for access control and delegation in IoT | |
Ouechtati et al. | Towards a self-adaptive access control middleware for the Internet of Things | |
Aski et al. | Advances on networked ehealth information access and sharing: Status, challenges and prospects | |
Riad et al. | Multi-factor synthesis decision-making for trust-based access control on cloud | |
Merlec et al. | SC-CAAC: A Smart Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems | |
Krautsevich et al. | Risk-aware usage decision making in highly dynamic systems | |
Da Silva et al. | Self-adaptive authorisation in OpenStack cloud platform | |
Ghosh et al. | Securing loosely-coupled collaboration in cloud environment through dynamic detection and removal of access conflicts | |
Li et al. | A service-oriented identity authentication privacy protection method in cloud computing | |
Zhu et al. | SaaS access control research based on UCON | |
Wang et al. | A trust and attribute-based access control framework in internet of things | |
Premarathne et al. | Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications | |
Chang et al. | A Dynamic Access Control Method for SDN | |
Bilgen et al. | Extending attribute-based access control model with authentication information for Internet of Things | |
Rathod et al. | Semantically rich, context aware access control for openstack | |
Penelova | Hybrid Role and Attribute Based Access Control Applied in Information Systems | |
Benmenzer et al. | An adaptive formal parallel technique with reputation integration for the enforcement of security policy in the cloud environment | |
Castro et al. | CASA‐IoT: Scalable and context‐aware IoT access control supporting multiple users | |
Hameed et al. | A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things | |
Kovacevic et al. | Authentication and Identity Management Based on Zero Trust Security Model in Micro-cloud Environment | |
Burakgazi Bilgen et al. | Authentication-enabled attribute-based access control for smart homes |