149,090 Hits in 2.6 sec

Token-Based Access Control

Guohua Gan, E Chen, Zhiyuan Zhou, Yan Zhu
2020 IEEE Access  
the system architecture of token-based access control.  ...  Last, this paper uses a token-based access control simulation system to verify that token-based access control has certain comparative advantages in robustness, trustworthiness, circulation, concurrency  ...  correctly is an access control mode called token-based access control.  ... 
doi:10.1109/access.2020.2979746 fatcat:i5pmfc3dpbbqljnyqn4zhhfzci

An Emergency Token Based Multiple Access Control Scheme for Wireless ATM Networks [chapter]

Kun Pang, Zhisheng Niu, Junli Zheng, Xuedao Gu
2000 Broadband Communications  
Token buffer of MT(Mobile Terminal) are constructed in BS(Base Station) for future slot allocation to reduce overhead of access request.  ...  This paper proposes an emergency token based MAC scheme for wireless ATM networks.  ...  There are some typical MAC(Multiple Access Control) schemes such as DRAMA(Dynamic Resource Allocation Media Access) [2] , DQRUMA (Distributed Queueing Request Update Multiple Access) [3] , and PNP (Polling  ... 
doi:10.1007/978-0-387-35579-5_28 fatcat:3fexdjsm3bdpphsbvnlt37oyie

A Token-Based Access Control System for RDF Data in the Clouds

Arindam Khaled, Mohammad Farhan Husain, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham
2010 2010 IEEE Second International Conference on Cloud Computing Technology and Science  
This work proposes a token-based access control system that is being implemented in Hadoop (an open source cloud computing framework).  ...  It defines six types of access levels and an enforcement strategy for the resulting access control policies.  ...  To our knowledge, access control has not yet been implemented on RDF stores in Hadoop. Doing so is the subject of this work. Our system implements a token-based access control system.  ... 
doi:10.1109/cloudcom.2010.76 dblp:conf/cloudcom/KhaledHKHT10 fatcat:5kbp3y54xzacpdu2zhofblrzmy

Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment

Timothy Claeys, Franck Rousseau, Bernard Tourancheau
2017 2017 International Workshop on Secure Internet of Things (SIoT)  
By designing self-securing tokens the security of the framework no longer depends on the security of the network stack.  ...  We use basic PKI functionalities to bootstrap a chain-of-trust between the devices which simplifies future token exchanges.  ...  PROPOSED AUTHORIZATION ARCHITECTURE We design a new token-based access control scheme with authenticated key establishment for IoT platforms.  ... 
doi:10.1109/siot.2017.00006 dblp:conf/siot/ClaeysRT17 fatcat:dxakuxhfobcw7bhpzm2p4fdy34

An access control model for the Internet of Things based on zero-knowledge token and blockchain

Lihua Song, Xinran Ju, Zongke Zhu, Mengchen Li
2021 EURASIP Journal on Wireless Communications and Networking  
Secondly, encrypted access control token is used to gain the access permission of the resources, which makes the user's identity invisible and effectively avoids attribute ownership exposure problem.  ...  Finally, a prototype of IoT access control system based on blockchain and zero-knowledge proof technology is implemented.  ...  Authors' contributions ML studies the blockchain and attribution-based access control model and builds the access framework.  ... 
doi:10.1186/s13638-021-01986-4 doaj:514a2b5ca99c4c7c8bfc074b5ec2ad11 fatcat:l2hvzxdiovhqddrgxtvmzsh4mu

Aggregated Sensor Payload Submission Model for Token-Based Access Control in the Web of Things

Mohammad Amir, Prashant Pillai, Yim-Fun Hu
2015 2015 3rd International Conference on Future Internet of Things and Cloud  
This study builds on previous work on token-based access control mechanisms and presents a comparison of two different approaches used for handling sensing devices and data in the WoT.  ...  /FiCloud.2015 Citation: Amir M, Pillai P and Hu Y-F (2015) Aggregated sensor payload submission model for token-based access control in the Web of Abstract-Web of Things (WoT) can be considered as a merger  ...  User/Identity-Based Access Control (UBAC) 2. Authorisation-Based Access Control (ABAC) 3. Role-Based Access Control (RBAC) 4.  ... 
doi:10.1109/ficloud.2015.22 dblp:conf/ficloud/AmirPH15 fatcat:tieqy2xuzfexznbsncmud2k5qe

Design and Implementation of The Capability Token based Access Control System in the Internet of Things
IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현

Bum-Ki Lee, Mi-Sun Kim, Jae-Hyun Seo
2015 Journal of the Korea Institute of Information Security and Cryptology  
In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments.  ...  The proposed system is expected to decrease the process time of access control by using capability tokens.  ...  Compare ACL with CL based access control Fig. 3. ACL-based Authorization Infrastructure Fig. 1.  ... 
doi:10.13089/jkiisc.2015.25.2.439 fatcat:jcxsupruybhj5hr6aqpb72ikae

Design and Implementation of Cloud Storage Flow Access Control Based on Token Bucket Algorithm

Mingzhen Ai, Wen Yu
2018 Proceedings of the 2018 2nd International Conference on Advances in Energy, Environment and Chemical Science (AEECS 2018)   unpublished
Based on the token bucket algorithm, this paper put forward three kinds of flow access control strategy to cloud storage service interface, which can provide fine-grained flow access control for different  ...  In the application process of cloud storage, object storage service interface is growing rapidly, so as to ensure stability and reliability, the flow control of object storage service is required.  ...  Based on object storage platform and the token bucket algorithm, this paper will study flow access control strategy of the cloud storage service interface, implementing fine-grained flow control for different  ... 
doi:10.2991/aeecs-18.2018.37 fatcat:26fhz5fdz5glvhbyk7sghfiqmu

An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role

Se-Ra Oh, Young-Gab Kim, Sanghyun Cho
2019 Sensors  
Therefore, we analyze the main requirements for an IoT access control framework to properly design our framework and propose an interoperable access control framework based on OAuth 2.0 and Role.  ...  Furthermore, the proposed framework is compared with other IoT access control approaches based on the selected requirements in this paper.  ...  In the case of the existing OAuth-based access control framework, each token should be issued to access each resource in heterogeneous IoT platforms, and the token owner should manage all issued tokens  ... 
doi:10.3390/s19081884 fatcat:bow5cd2rdra6fo42ox4ompakzi

Privacy of Capability Token in the IoT Service System

Deresa Jang, Jin-bo Kim, Mi-Sun Kim, Jae-Hyun Seo
2016 Journal of multimedia information system  
The recent development of the Internet of things (IoT) has led to the introduction of new access control measures.  ...  Even during the access control for security, however, there might be privacy infringements due to unwanted information provision and collection.  ...  In this paper, we examined the privacy protection for token-based access control in the IoT environment.  ... 
doi:10.9717/jmis.2016.3.3.103 dblp:journals/jmmis/JangKKS16 fatcat:ayld72ljwrhtnl2afuvr5pjhz4

Supporting Secure Collaborations with Attribute-based Access Control

Carlos Rubio-Medrano, Clinton D'Souza, Gail-Joon Ahn
2013 Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Attribute-based access control (ABAC) has been regarded in recent years as an effective way for providing security guarantees in collaboration environments, due to its alleged flexibility and efficiency  ...  for meeting the access control requirements of heterogeneous organizations.  ...  Second, derived from the aforementioned set of access control requirements based on organizational jobs, an access control model depicting the well-known role-based access control (RBAC) [5] immediately  ... 
doi:10.4108/icst.collaboratecom.2013.254168 dblp:conf/colcom/Rubio-MedranoDA13 fatcat:cfzpiaujvbchxlzuzx2dxo7ea4

A New Token-Based Channel Access Protocol for Wavelength Division Multiplexed Multiprocessor Interconnects

Joon-Ho Ha, Timothy Mark Pinkston
2000 Journal of Parallel and Distributed Computing  
This paper presents a token-based channel access protocol for wavelength division multiplexed optically interconnected multiprocessors.  ...  The proposed token-based time division multiple access protocol minimizes latency by allowing dynamic allocation of slots to use channels efficiently.  ...  To overcome this, we propose a token-based TDMA, referred to as T-TDMA, which uses a token as supplemental control mechanism to pass control of channel access in conjunction with the slotted channel access  ... 
doi:10.1006/jpdc.1999.1599 fatcat:lofnf7nlmrbtnernbfbf6exsry

Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts

Hien Truong, José L. Hernández-Ramos, Juan A. Martinez, Jorge Bernal Bernabe, Wenting Li, Agustin Marin Frutos, Antonio Skarmeta, Bharat Bhushan
2022 Security and Communication Networks  
This work proposes CapBlock, a design that integrates a capability-based access control model and blockchain technology for a fully distributed evaluation of authorization policies and generation of access  ...  While well-known access control models are widely used in web and cloud scenarios, the IoT ecosystem needs to address the requirements of lightness, decentralization, and scalability to control the access  ...  Distributed Capability-Based Access Control.  ... 
doi:10.1155/2022/1828747 fatcat:d6n3kuijknb7tdor4mhxfixime

Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things [article]

Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara
2021 arXiv   pre-print
In this way, the proposed scheme enables not only distributed, fee-less and scalable access control thanks to the IOTA but also fine-grained attribute-based access control thanks to the CP-ABE.  ...  Although blockchain-based IoT access control schemes have been the most popular ones, they suffer from several significant limitations, such as high monetary cost and low throughput of processing access  ...  Access Control (RBAC), Attribute-Based Access Control (ABAC) and Capability-Based Access Control (CapBAC) are representative ones.  ... 
arXiv:2103.04016v1 fatcat:aj7c7qcscfeljokgijdwaajxwe

Entitlement-Based Access Control for Smart Cities Using Blockchain

Fariza Sabrina, Julian Jang-Jaccard
2021 Sensors  
Our proposed entitlement-based access control model is flexible as it facilitates a resource owner to safely delegate access rights to any entities beyond the trust boundary of an organization.  ...  We present a novel entitlement-based blockchain-enabled access control architecture that can be used for smart cities (and for any ap-plication domains that require large-scale IoT deployments).  ...  Some of these proposed schemes are based on traditional AC schemes, such as RBAC (role-based access control), ABAC (attribute-based access control), and CapBAC (capability-based access control) while others  ... 
doi:10.3390/s21165264 fatcat:42pp5n4bjza3djtck7v76uzjuq
« Previous Showing results 1 — 15 out of 149,090 results