A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Token-Based Access Control
2020
IEEE Access
the system architecture of token-based access control. ...
Last, this paper uses a token-based access control simulation system to verify that token-based access control has certain comparative advantages in robustness, trustworthiness, circulation, concurrency ...
correctly is an access control mode called token-based access control. ...
doi:10.1109/access.2020.2979746
fatcat:i5pmfc3dpbbqljnyqn4zhhfzci
An Emergency Token Based Multiple Access Control Scheme for Wireless ATM Networks
[chapter]
2000
Broadband Communications
Token buffer of MT(Mobile Terminal) are constructed in BS(Base Station) for future slot allocation to reduce overhead of access request. ...
This paper proposes an emergency token based MAC scheme for wireless ATM networks. ...
There are some typical MAC(Multiple Access Control) schemes such as DRAMA(Dynamic Resource Allocation Media Access) [2] , DQRUMA (Distributed Queueing Request Update Multiple Access) [3] , and PNP (Polling ...
doi:10.1007/978-0-387-35579-5_28
fatcat:3fexdjsm3bdpphsbvnlt37oyie
A Token-Based Access Control System for RDF Data in the Clouds
2010
2010 IEEE Second International Conference on Cloud Computing Technology and Science
This work proposes a token-based access control system that is being implemented in Hadoop (an open source cloud computing framework). ...
It defines six types of access levels and an enforcement strategy for the resulting access control policies. ...
To our knowledge, access control has not yet been implemented on RDF stores in Hadoop. Doing so is the subject of this work. Our system implements a token-based access control system. ...
doi:10.1109/cloudcom.2010.76
dblp:conf/cloudcom/KhaledHKHT10
fatcat:5kbp3y54xzacpdu2zhofblrzmy
Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment
2017
2017 International Workshop on Secure Internet of Things (SIoT)
By designing self-securing tokens the security of the framework no longer depends on the security of the network stack. ...
We use basic PKI functionalities to bootstrap a chain-of-trust between the devices which simplifies future token exchanges. ...
PROPOSED AUTHORIZATION ARCHITECTURE We design a new token-based access control scheme with authenticated key establishment for IoT platforms. ...
doi:10.1109/siot.2017.00006
dblp:conf/siot/ClaeysRT17
fatcat:dxakuxhfobcw7bhpzm2p4fdy34
An access control model for the Internet of Things based on zero-knowledge token and blockchain
2021
EURASIP Journal on Wireless Communications and Networking
Secondly, encrypted access control token is used to gain the access permission of the resources, which makes the user's identity invisible and effectively avoids attribute ownership exposure problem. ...
Finally, a prototype of IoT access control system based on blockchain and zero-knowledge proof technology is implemented. ...
Authors' contributions ML studies the blockchain and attribution-based access control model and builds the access framework. ...
doi:10.1186/s13638-021-01986-4
doaj:514a2b5ca99c4c7c8bfc074b5ec2ad11
fatcat:l2hvzxdiovhqddrgxtvmzsh4mu
Aggregated Sensor Payload Submission Model for Token-Based Access Control in the Web of Things
2015
2015 3rd International Conference on Future Internet of Things and Cloud
This study builds on previous work on token-based access control mechanisms and presents a comparison of two different approaches used for handling sensing devices and data in the WoT. ...
/FiCloud.2015 Citation: Amir M, Pillai P and Hu Y-F (2015) Aggregated sensor payload submission model for token-based access control in the Web of Abstract-Web of Things (WoT) can be considered as a merger ...
User/Identity-Based Access Control (UBAC) 2. Authorisation-Based Access Control (ABAC) 3. Role-Based Access Control (RBAC) 4. ...
doi:10.1109/ficloud.2015.22
dblp:conf/ficloud/AmirPH15
fatcat:tieqy2xuzfexznbsncmud2k5qe
Design and Implementation of The Capability Token based Access Control System in the Internet of Things
IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현
2015
Journal of the Korea Institute of Information Security and Cryptology
IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현
In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. ...
The proposed system is expected to decrease the process time of access control by using capability tokens. ...
Compare ACL with CL based access
control
Fig. 3. ACL-based Authorization Infrastructure
Fig. 1. ...
doi:10.13089/jkiisc.2015.25.2.439
fatcat:jcxsupruybhj5hr6aqpb72ikae
Design and Implementation of Cloud Storage Flow Access Control Based on Token Bucket Algorithm
2018
Proceedings of the 2018 2nd International Conference on Advances in Energy, Environment and Chemical Science (AEECS 2018)
unpublished
Based on the token bucket algorithm, this paper put forward three kinds of flow access control strategy to cloud storage service interface, which can provide fine-grained flow access control for different ...
In the application process of cloud storage, object storage service interface is growing rapidly, so as to ensure stability and reliability, the flow control of object storage service is required. ...
Based on object storage platform and the token bucket algorithm, this paper will study flow access control strategy of the cloud storage service interface, implementing fine-grained flow control for different ...
doi:10.2991/aeecs-18.2018.37
fatcat:26fhz5fdz5glvhbyk7sghfiqmu
An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role
2019
Sensors
Therefore, we analyze the main requirements for an IoT access control framework to properly design our framework and propose an interoperable access control framework based on OAuth 2.0 and Role. ...
Furthermore, the proposed framework is compared with other IoT access control approaches based on the selected requirements in this paper. ...
In the case of the existing OAuth-based access control framework, each token should be issued to access each resource in heterogeneous IoT platforms, and the token owner should manage all issued tokens ...
doi:10.3390/s19081884
fatcat:bow5cd2rdra6fo42ox4ompakzi
Privacy of Capability Token in the IoT Service System
2016
Journal of multimedia information system
The recent development of the Internet of things (IoT) has led to the introduction of new access control measures. ...
Even during the access control for security, however, there might be privacy infringements due to unwanted information provision and collection. ...
In this paper, we examined the privacy protection for token-based access control in the IoT environment. ...
doi:10.9717/jmis.2016.3.3.103
dblp:journals/jmmis/JangKKS16
fatcat:ayld72ljwrhtnl2afuvr5pjhz4
Supporting Secure Collaborations with Attribute-based Access Control
2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
Attribute-based access control (ABAC) has been regarded in recent years as an effective way for providing security guarantees in collaboration environments, due to its alleged flexibility and efficiency ...
for meeting the access control requirements of heterogeneous organizations. ...
Second, derived from the aforementioned set of access control requirements based on organizational jobs, an access control model depicting the well-known role-based access control (RBAC) [5] immediately ...
doi:10.4108/icst.collaboratecom.2013.254168
dblp:conf/colcom/Rubio-MedranoDA13
fatcat:cfzpiaujvbchxlzuzx2dxo7ea4
A New Token-Based Channel Access Protocol for Wavelength Division Multiplexed Multiprocessor Interconnects
2000
Journal of Parallel and Distributed Computing
This paper presents a token-based channel access protocol for wavelength division multiplexed optically interconnected multiprocessors. ...
The proposed token-based time division multiple access protocol minimizes latency by allowing dynamic allocation of slots to use channels efficiently. ...
To overcome this, we propose a token-based TDMA, referred to as T-TDMA, which uses a token as supplemental control mechanism to pass control of channel access in conjunction with the slotted channel access ...
doi:10.1006/jpdc.1999.1599
fatcat:lofnf7nlmrbtnernbfbf6exsry
Enabling Decentralized and Auditable Access Control for IoT through Blockchain and Smart Contracts
2022
Security and Communication Networks
This work proposes CapBlock, a design that integrates a capability-based access control model and blockchain technology for a fully distributed evaluation of authorization policies and generation of access ...
While well-known access control models are widely used in web and cloud scenarios, the IoT ecosystem needs to address the requirements of lightness, decentralization, and scalability to control the access ...
Distributed Capability-Based Access Control. ...
doi:10.1155/2022/1828747
fatcat:d6n3kuijknb7tdor4mhxfixime
Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things
[article]
2021
arXiv
pre-print
In this way, the proposed scheme enables not only distributed, fee-less and scalable access control thanks to the IOTA but also fine-grained attribute-based access control thanks to the CP-ABE. ...
Although blockchain-based IoT access control schemes have been the most popular ones, they suffer from several significant limitations, such as high monetary cost and low throughput of processing access ...
Access Control (RBAC), Attribute-Based Access Control (ABAC) and Capability-Based Access Control (CapBAC) are representative ones. ...
arXiv:2103.04016v1
fatcat:aj7c7qcscfeljokgijdwaajxwe
Entitlement-Based Access Control for Smart Cities Using Blockchain
2021
Sensors
Our proposed entitlement-based access control model is flexible as it facilitates a resource owner to safely delegate access rights to any entities beyond the trust boundary of an organization. ...
We present a novel entitlement-based blockchain-enabled access control architecture that can be used for smart cities (and for any ap-plication domains that require large-scale IoT deployments). ...
Some of these proposed schemes are based on traditional AC schemes, such as RBAC (role-based access control), ABAC (attribute-based access control), and CapBAC (capability-based access control) while others ...
doi:10.3390/s21165264
fatcat:42pp5n4bjza3djtck7v76uzjuq
« Previous
Showing results 1 — 15 out of 149,090 results