Dimitrakos et al., 2020 - Google Patents

Trust aware continuous authorization for zero trust in consumer internet of things

Dimitrakos et al., 2020

Document ID
254578551692433724
Author
Dimitrakos T
Dilshener T
Kravtsov A
La Marra A
Martinelli F
Rizos A
Rosetti A
Saracino A
Publication year
Publication venue
2020 IEEE 19th international conference on trust, security and privacy in computing and communications (TrustCom)

External Links

Snippet

This work describes the architecture and prototype implementation of a novel trust-aware continuous authorization technology that targets consumer Internet of Things (IoT), eg, Smart Home. Our approach extends previous authorization models in three complementary …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/30Network-specific arrangements or communication protocols supporting networked applications involving profiles

Similar Documents

Publication Publication Date Title
Dimitrakos et al. Trust aware continuous authorization for zero trust in consumer internet of things
Kandala et al. An attribute based framework for risk-adaptive access control models
Barka et al. Securing the web of things with role-based access control
Ghosh et al. SoftAuthZ: a context-aware, behavior-based authorization framework for home IoT
Tapas et al. Experimenting with smart contracts for access control and delegation in IoT
Ouechtati et al. Towards a self-adaptive access control middleware for the Internet of Things
Aski et al. Advances on networked ehealth information access and sharing: Status, challenges and prospects
Riad et al. Multi-factor synthesis decision-making for trust-based access control on cloud
Merlec et al. SC-CAAC: A Smart Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems
Krautsevich et al. Risk-aware usage decision making in highly dynamic systems
Da Silva et al. Self-adaptive authorisation in OpenStack cloud platform
Ghosh et al. Securing loosely-coupled collaboration in cloud environment through dynamic detection and removal of access conflicts
Li et al. A service-oriented identity authentication privacy protection method in cloud computing
Zhu et al. SaaS access control research based on UCON
Wang et al. A trust and attribute-based access control framework in internet of things
Premarathne et al. Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications
Chang et al. A Dynamic Access Control Method for SDN
Bilgen et al. Extending attribute-based access control model with authentication information for Internet of Things
Rathod et al. Semantically rich, context aware access control for openstack
Penelova Hybrid Role and Attribute Based Access Control Applied in Information Systems
Benmenzer et al. An adaptive formal parallel technique with reputation integration for the enforcement of security policy in the cloud environment
Castro et al. CASA‐IoT: Scalable and context‐aware IoT access control supporting multiple users
Hameed et al. A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things
Kovacevic et al. Authentication and Identity Management Based on Zero Trust Security Model in Micro-cloud Environment
Burakgazi Bilgen et al. Authentication-enabled attribute-based access control for smart homes