Filters








16,174 Hits in 7.5 sec

Dynamic access control

Prasad Naldurg, Roy H. Campbell
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
We investigate the cost of changing access control policies dynamically as a response action in computer network defense.  ...  We also explore the issues related to preserving safety properties and trust assumptions during this process.  ...  In Section 3, we discuss the impact of changing access controls in terms of safety properties and trust assumptions.  ... 
doi:10.1145/775412.775442 dblp:conf/sacmat/NaldurgC03 fatcat:l36cejsb2jhuljtmxpvwhp2swm

Dynamic access control

Prasad Naldurg, Roy H. Campbell
2003 Proceedings of the eighth ACM symposium on Access control models and technologies - SACMAT '03  
We investigate the cost of changing access control policies dynamically as a response action in computer network defense.  ...  We also explore the issues related to preserving safety properties and trust assumptions during this process.  ...  In Section 3, we discuss the impact of changing access controls in terms of safety properties and trust assumptions.  ... 
doi:10.1145/775439.775442 fatcat:5edu6rwh7nhepee6hz47fhi6jy

Secure ABE Scheme for Access Management in Blockchain-based IoT

Jiansheng Zhang, Yang Xin, Yulong Gao, Xiaohui Lei, Yixian Yang
2021 IEEE Access  
Through this verification mechanism, it can realize fine-grained access control for user and protects the security of user and IoT device. Device ownership safety transfer.  ...  Decrypt algorithm Input:Secret key ( , ) i sb, ciphertext C , public key PK attribute access control policy i k Output:Plaintext M 1: Compute Proof.  ...  In this new scheme, KP-ABE implements fine-grained access control in IoT, and blockchain provides data security.  ... 
doi:10.1109/access.2021.3071031 fatcat:bnfegm7nvbdhda73bj3fbql4c4

Building an Accessible Digital World

Sarah Horton, Phil Laplante
2022 Computer  
life-safety and accessibility standards."  ...  , verification, and validation, but not accessibility.  ... 
doi:10.1109/mc.2021.3122476 fatcat:vh4xkhyyhza3xmvxp4yy6e5hn4

Blockchain-Based Secured Access Control in an IoT System

Sultan Algarni, Fathy Eassa, Khalid Almarhabi, Abduallah Almalaise, Emad Albassam, Khalid Alsubhi, Mohammad Yamin
2021 Applied Sciences  
Therefore, this paper proposes a novel solution to manage the delivery of lightweight and decentralized secure access control of an IoT system based on a multi-agent system and a blockchain.  ...  The main objective of the proposed solution is to build Blockchain Managers (BCMs) for securing IoT access control, as well as allowing for secure communication between local IoT devices.  ...  A possible solution is to separate the header block access control policy from the block structure in the blockchain and place the access control policy in a separate policy file blockchain or in a separate  ... 
doi:10.3390/app11041772 fatcat:banim6a4djbwbedfvr7cbskrpq

A Review of Blockchain-Based Access Control for the Industrial IoT

Peng Zhai, Liping Zhang, Jingsha He
2021 Converter  
From the angle of these two technical routes, the unique advantages of applying the blockchain to the IoT access control field are analyzed.  ...  In this paper, firstly the basic concepts of access control and blockchain are explained, and the existing access control model and method based on blockchain in the industrial IoT scenario are summarized  ...  access control policies.  ... 
doi:10.17762/converter.62 fatcat:lvtb7ozgvfb4nipdx7hm2hnssm

A Novel Block Chain Method for Urban Digitization Governance in Birth Registration Field: A Case Study

Jihui Shi, Solomon Kwadwo Nyedu Danquah, Wanhao Dong
2022 International Journal of Environmental Research and Public Health  
The findings provide insight into the use of blockchain technology in public registry institutions.  ...  It offers a safe verification framework for the Ghana Birth and Death Registry based on smart contract technology and can guarantee a birth notification as proof of birth certificate registration in accordance  ...  Its security will ensure proper and efficient use of public funds, decrease the cost of human verification and expedite process coordination.  ... 
doi:10.3390/ijerph19159309 pmid:35954663 pmcid:PMC9368078 fatcat:7pj22sogybfqbjibandvqbuv64

A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-based Access Control

Jinshan Shi, Ru Li, Wenhan Hou
2020 IEEE Access  
Date of publication xxxx 00, 0000, date of current version xxxx 00, 0000.  ...  not satisfy the access control policy of permission p.  ...  However, the owner of the permission does not participate in the authorization process, that is, when the permission is passed, the recipient does not pass the access control policy verification, so the  ... 
doi:10.1109/access.2020.3018783 fatcat:gmxebmf2rjemdhe7bjrrdrgcdq

A hierarchical multi blockchain for fine grained access to medical data

Vangelis Malamas, Panayiotis Kotzanikolaou, Thomas K. Dasaklis, Mike Burmester
2020 IEEE Access  
The authors use a Key-policy Attribute-Based Encryption (KP-ABE) to control the access level of health and service providers and a Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to control access  ...  control policies.  ... 
doi:10.1109/access.2020.3011201 fatcat:k4gnm22h3jclnmcwutgukgx4ey

Privacy-Oriented Blockchain-based Distributed Key Management Architecture for Hierarchical Access Control in the IoT Scenario

Mingxin Ma, Guozhen Shi, Fenghua Li
2019 IEEE Access  
The rapid development of the Internet of Things (IoT) and the explosive growth of valuable data produced by user equipment have led to strong demand for access control, especially hierarchical access control  ...  However, the key management strategies for such a future Internet are based mostly on a trusted third party that requires full trust of the key generation center (KGC) or central authority (CA).  ...  [33] described a cryptocurrency blockchainbased access control framework called FairAccess and created smart contracts for the access control policy of every resource-requester pair to achieve access  ... 
doi:10.1109/access.2019.2904042 fatcat:rruio6scvfbwjnkbo4ttt56i4y

An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts

Syed Yawar Abbas Zaidi, Munam Ali Shah, Hasan Ali Khattak, Carsten Maple, Hafiz Tayyab Rauf, Ahmed M. El-Sherbeeny, Mohammed A. El-Meligy
2021 Sustainability  
IoT devices control the user's environment as well as his or her private data collection; therefore, the exposure of the user's personal data to non-trusted private and public servers may result in privacy  ...  The access control lists are not required for each device by the system. It enhances access management in terms of effectiveness.  ...  Verification costs of access control with respect to the number of attributes used in the policy are shown in Figure 16 .  ... 
doi:10.3390/su131910556 fatcat:jmjyqhgo3zedlbb55xog7apt4e

Trust Level Evaluation based Asymmetric Cryptography Protocol for Flexible Access Control in Fog Computing

C. Nagarani, R. Kousalya
2021 International Journal of Computer Networks & Communications  
The foremost problems in the fog-enabled cloud computing model are security guarantees and data Access Control (AC) because of the imitation of data by invaders.  ...  Therefore in this article, a Flexible AC (FAC) protocol is introduced with the ECLAS for controlling the data access in fog-enabled cloud systems according to the trust estimated by the user in the cloud  ...  It considers the partial key 0 and the public keys( , ) as input related to the individual trust occurring in the data access strategy of .  ... 
doi:10.5121/ijcnc.2021.13307 fatcat:hu45otbswrearmu2naotdiejjq

Holistic Access Control and Privacy Infrastructure in Distributed Environment

Uche Magnus Mbanaso, Gloria A Chukwudebe
2018 Advances in Science, Technology and Engineering Systems  
Thus, in this article, a novel distributed access control infrastructure based on configurable policy constructs is presented.  ...  It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments.  ...  sends SMAL OoT message to SV's IdP/AA requesting verification of identity/attributes of SV. 6) The SV's IdP/AA sends a corresponding SAML OoT Distributed Access Control Infrastructure for IoT SMAL  ... 
doi:10.25046/aj030604 fatcat:2qbgk2ll4nfpjf6a3k2pboevwa

Hyperledger Fabric Access Control for Industrial Internet of Things

Dong-Her Shih, Ting-Wei Wu, Ming-Hung Shih, Guan-Wei Chen, David C. Yen
2022 Applied Sciences  
The policy contract provides the function of managing the attribute-based access control (ABAC) of the administrator user.  ...  To resolve the challenges, we propose an access control system for the Industrial Internet of Things.  ...  The funder has no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app12063125 fatcat:myv4tem3yngftgpjyupxxc7m4i

Data Access Control Based on Blockchain in Medical Cyber Physical Systems

Fulong Chen, Jing Huang, Canlin Wang, Yuqing Tang, Cheng Huang, Dong Xie, Taochun Wang, Chuanxin Zhao, Zhe-Li Liu
2021 Security and Communication Networks  
, and specify the role assignment and access task matching of users, so as to achieve secure and effective data access control.  ...  Combined with blockchain technology, we design the medical cyber physical systems based on blockchain data access control mechanism and unite data in the chain of union Fabric network resources access  ...  Acknowledgments e authors would like to thank their colleagues and students in Anhui Provincial Key Laboratory of Network and Information Security. e authors thank National Natural Science Foundation of  ... 
doi:10.1155/2021/3395537 fatcat:57shc5zfivfmfjcwlgjae4y2pq
« Previous Showing results 1 — 15 out of 16,174 results