A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs
[article]
2018
arXiv
pre-print
, scalable, lightweight and fine grained AC solution to IoT systems. ...
Implemented and tested on a Raspberry Pi device and on a local private blockchain network, our experimental results demonstrate the feasibility of the proposed BlendCAC approach to offer a decentralized ...
This work has demonstrated that our proposed BlendCAC framework is a promising approach to provide a scalable, fine-grained and lightweight access control for IoT networks. ...
arXiv:1804.09267v1
fatcat:gybholdhv5c4hktfhuzpmbjrcy
Access Control for Databases: Concepts and Systems
2010
Foundations and Trends in Databases
We then cover approaches to fine-grained access control. ...
Fine Grained Access Control through Query Rewriting We review two prominent approaches that address the problem of fine grained database authorization from the perspective of query rewriting. ...
doi:10.1561/1900000014
fatcat:trrsnypzyvcq5phpgvee7dumva
Flexible, Decentralized Access Control for Smart Buildings with Smart Contracts
[article]
2020
arXiv
pre-print
, providing fine-grained, auditable access control. ...
Our methodology relies on blockchain smart contracts to describe, grant, audit, and revoke fine-grained permissions for building occupants and visitors, in a decentralized fashion. ...
We develop APIs to help interact with the smart contracts; this will define fine-grained access control for any type of user. ...
arXiv:2010.08176v1
fatcat:3qki5iwcqvh6ba2ornlnfznjmy
Access Control in Location-Based Services
[chapter]
2009
Lecture Notes in Computer Science
Such applications introduces new aspects of access control which should be addressed. ...
On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with ...
LBAC systems however may be flawed by the intrinsic errors of location measurements, in calculating such fine-grained knowledge. ...
doi:10.1007/978-3-642-03511-1_5
fatcat:fnfc35xbhfdwvgpmhgxgqkmtly
Access control and the Resource Description Framework: A survey
2016
Semantic Web Journal
A set of access control requirements that can be used to categorise existing access control strategies is proposed and a number of challenges that still need to be overcome are identified. ...
This paper provides an overview of the various access control models, standards and policy languages, and the different access control enforcement strategies for the Resource Description Framework (the ...
[78] , the authors demonstrate how both the PPO and the PPM can be used to cater for fine grained access control on a mobile device. ...
doi:10.3233/sw-160236
fatcat:4b4el2ueozdtvjlzswlsd4p6my
A blockchain-based framework for electronic medical records sharing with fine-grained access control
2020
PLoS ONE
Furthermore, we use attribute-based encryption scheme to ensure that only the attributes meeting the access policy can decrypt the encrypted electronic medical records. ...
Firstly, we perform a hash calculation on the electronic medical data and store the corresponding value on the blockchain to ensure its integrity and authenticity. ...
In this case, one of the most controversial issue is how to ensure the privacy, security, and sharability of EMRs while achieving fine-grained access control. ...
doi:10.1371/journal.pone.0239946
pmid:33022027
fatcat:pznhv2d4mzcivj43p5snzlyizi
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey
[article]
2021
arXiv
pre-print
authentication information. ...
The ML-based stealing attack is reviewed in perspectives of three categories of targeted controlled information, including controlled user activities, controlled ML model-related information, and controlled ...
During the reconnaissance, the legitimate user accesses the shared TLBs, which reflects victims' fine-grained cache memories. ...
arXiv:2102.07969v1
fatcat:h4br22tpjre2lisc4zbzpy2iee
BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment
2022
KSII Transactions on Internet and Information Systems
This guarantees better fine-grained access control and makes patients to share data at ease. ...
To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment ...
As a result, the tamper probability of distributed blockchains drops rapidly and approaches zero finally. ...
doi:10.3837/tiis.2022.05.012
fatcat:ee54yigzlbaf5oygzanlxk4rxy
Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things
[article]
2020
arXiv
pre-print
We also realize access procedure control by mandating every tokoin a fine-grained access policy defining who is allowed to do what at when in where by how. ...
To tackle this challenge, we propose Tokoin-Based Access Control (TBAC), an accountable access control model enabled by blockchain and Trusted Execution Environment (TEE) technologies, to offer fine-graininess ...
First, fine-grained access control can be achieved by realizing an access policy that defines who is allowed to do what at when in where by how, where who, what, when and where constitute the access constraints ...
arXiv:2011.04919v1
fatcat:wf4vqm2ivfd33fatjz5hlxzptm
Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams
[article]
2021
arXiv
pre-print
Droplet's contribution lies in coupling two key ideas: (i) a cryptographically-enforced access control construction for encrypted data streams which enables users to define fine-grained stream-specific ...
This paper presents Droplet, a decentralized data access control service. ...
(ii) fine-grained access control; specify who can access what temporal segment of a data stream. ...
arXiv:1806.02057v3
fatcat:lfe3247sj5bb3kdpw33ywb2eny
Access Control in Publicly Verifiable Outsourced Computation
2015
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15
Thus there is a need for access control mechanisms in PVC environments. In this work, we define a new framework for Publicly Verifiable Outsourced Computation with Access Control (PVC-AC). ...
We formally define algorithms to provide different PVC functionality for each entity within a large outsourced computation environment, and discuss the forms of access control policies that are applicable ...
The first author acknowledges support from BAE Systems Advanced Technology Centre under a CASE Award. ...
doi:10.1145/2714576.2714636
dblp:conf/ccs/AldermanJCC15
fatcat:ui7a7usfprh65fszzru5tbhhpq
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme
2022
Zenodo
Attribute-Based Encryption (ABE) is a known cryptographic primitive that enables fine-grained access control over encrypted data. ...
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Things, where various devices with low computational power and different security levels are interconnected ...
An ABE scheme is a superior cryptographic tool for fine-grained access control of encrypted data, which is utilized in various applications [9] . ...
doi:10.5281/zenodo.5882163
fatcat:ky63vukw7fa4rmatosweyg7gx4
Research on Access Control in Cloud Storage System: From Single to Multi-Clouds
2018
American Journal of Software Engineering and Applications
The access control researches here refer to cipher-text and cross-domain access control in cloud storage system. ...
Firstly, we discuss about the focuses in recent researches and challenges of access control in cloud storage system. ...
to realize fine-grained access control in the open network even policy evaluation can be done in cipher text. ...
doi:10.11648/j.ajsea.20180701.11
fatcat:inq3arpscndbbg45rhivqfv6am
"Context-aware access control and presentation for linked data" by Luca Costabello with Prateek Jain as coordinator
2015
ACM SIGWEB Newsletter
An early version of a context-aware access control system for Linked Data has been published at the Linked Data on the Web Workshop (LDOW), co-located with WWW 2012 [Costabello 2012b ]. ...
Shi3ld for SPARQL, as presented in this thesis, appears in a 2012 paper presented at the European Conference on Artificial Intelligence (ECAI), [Costabello 2012a]. ...
[Flouris 2010 ] present a fine-grained access control framework on top of RDF repositories. ...
doi:10.1145/2749279.2749282
fatcat:rtsg57v7fbcb7egtdfnyfvb6wu
MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme
2022
Zenodo
Attribute-Based Encryption (ABE) is a known cryptographic primitive that enables fine-grained access control over encrypted data. ...
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Things, where various devices with low computational power and different security levels are interconnected ...
An ABE scheme is a superior cryptographic tool for fine-grained access control of encrypted data, which is utilized in various applications [9] . ...
doi:10.5281/zenodo.6024799
fatcat:ickfh5ie6nemvgtp5yjxt6x7je
« Previous
Showing results 1 — 15 out of 2,760 results