Filters








2,760 Hits in 8.3 sec

BlendCAC: A BLockchain-ENabled Decentralized Capability-based Access Control for IoTs [article]

Ronghua Xu, Yu Chen, Erik Blasch, Genshe Chen
2018 arXiv   pre-print
, scalable, lightweight and fine grained AC solution to IoT systems.  ...  Implemented and tested on a Raspberry Pi device and on a local private blockchain network, our experimental results demonstrate the feasibility of the proposed BlendCAC approach to offer a decentralized  ...  This work has demonstrated that our proposed BlendCAC framework is a promising approach to provide a scalable, fine-grained and lightweight access control for IoT networks.  ... 
arXiv:1804.09267v1 fatcat:gybholdhv5c4hktfhuzpmbjrcy

Access Control for Databases: Concepts and Systems

Elisa Bertino
2010 Foundations and Trends in Databases  
We then cover approaches to fine-grained access control.  ...  Fine Grained Access Control through Query Rewriting We review two prominent approaches that address the problem of fine grained database authorization from the perspective of query rewriting.  ... 
doi:10.1561/1900000014 fatcat:trrsnypzyvcq5phpgvee7dumva

Flexible, Decentralized Access Control for Smart Buildings with Smart Contracts [article]

Leepakshi Bindra, Kalvin Eng, Omid Ardakanian, Eleni Stroulia
2020 arXiv   pre-print
, providing fine-grained, auditable access control.  ...  Our methodology relies on blockchain smart contracts to describe, grant, audit, and revoke fine-grained permissions for building occupants and visitors, in a decentralized fashion.  ...  We develop APIs to help interact with the smart contracts; this will define fine-grained access control for any type of user.  ... 
arXiv:2010.08176v1 fatcat:3qki5iwcqvh6ba2ornlnfznjmy

Access Control in Location-Based Services [chapter]

Claudio A. Ardagna, Marco Cremonini, Sabrina De Capitani di Vimercati, Pierangela Samarati
2009 Lecture Notes in Computer Science  
Such applications introduces new aspects of access control which should be addressed.  ...  On the one side, precise location information may play an important role and can be used to develop Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with  ...  LBAC systems however may be flawed by the intrinsic errors of location measurements, in calculating such fine-grained knowledge.  ... 
doi:10.1007/978-3-642-03511-1_5 fatcat:fnfc35xbhfdwvgpmhgxgqkmtly

Access control and the Resource Description Framework: A survey

Sabrina Kirrane, Alessandra Mileo, Stefan Decker, Bernardo Cuenca Grau
2016 Semantic Web Journal  
A set of access control requirements that can be used to categorise existing access control strategies is proposed and a number of challenges that still need to be overcome are identified.  ...  This paper provides an overview of the various access control models, standards and policy languages, and the different access control enforcement strategies for the Resource Description Framework (the  ...  [78] , the authors demonstrate how both the PPO and the PPM can be used to cater for fine grained access control on a mobile device.  ... 
doi:10.3233/sw-160236 fatcat:4b4el2ueozdtvjlzswlsd4p6my

A blockchain-based framework for electronic medical records sharing with fine-grained access control

Jin Sun, Lili Ren, Shangping Wang, Xiaomin Yao, He Debiao
2020 PLoS ONE  
Furthermore, we use attribute-based encryption scheme to ensure that only the attributes meeting the access policy can decrypt the encrypted electronic medical records.  ...  Firstly, we perform a hash calculation on the electronic medical data and store the corresponding value on the blockchain to ensure its integrity and authenticity.  ...  In this case, one of the most controversial issue is how to ensure the privacy, security, and sharability of EMRs while achieving fine-grained access control.  ... 
doi:10.1371/journal.pone.0239946 pmid:33022027 fatcat:pznhv2d4mzcivj43p5snzlyizi

Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey [article]

Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang
2021 arXiv   pre-print
authentication information.  ...  The ML-based stealing attack is reviewed in perspectives of three categories of targeted controlled information, including controlled user activities, controlled ML model-related information, and controlled  ...  During the reconnaissance, the legitimate user accesses the shared TLBs, which reflects victims' fine-grained cache memories.  ... 
arXiv:2102.07969v1 fatcat:h4br22tpjre2lisc4zbzpy2iee

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

2022 KSII Transactions on Internet and Information Systems  
This guarantees better fine-grained access control and makes patients to share data at ease.  ...  To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment  ...  As a result, the tamper probability of distributed blockchains drops rapidly and approaches zero finally.  ... 
doi:10.3837/tiis.2022.05.012 fatcat:ee54yigzlbaf5oygzanlxk4rxy

Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things [article]

Chunchi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lv
2020 arXiv   pre-print
We also realize access procedure control by mandating every tokoin a fine-grained access policy defining who is allowed to do what at when in where by how.  ...  To tackle this challenge, we propose Tokoin-Based Access Control (TBAC), an accountable access control model enabled by blockchain and Trusted Execution Environment (TEE) technologies, to offer fine-graininess  ...  First, fine-grained access control can be achieved by realizing an access policy that defines who is allowed to do what at when in where by how, where who, what, when and where constitute the access constraints  ... 
arXiv:2011.04919v1 fatcat:wf4vqm2ivfd33fatjz5hlxzptm

Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams [article]

Hossein Shafagh, Lukas Burkhalter, Anwar Hithnawi, Sylvia Ratnasamy
2021 arXiv   pre-print
Droplet's contribution lies in coupling two key ideas: (i) a cryptographically-enforced access control construction for encrypted data streams which enables users to define fine-grained stream-specific  ...  This paper presents Droplet, a decentralized data access control service.  ...  (ii) fine-grained access control; specify who can access what temporal segment of a data stream.  ... 
arXiv:1806.02057v3 fatcat:lfe3247sj5bb3kdpw33ywb2eny

Access Control in Publicly Verifiable Outsourced Computation

James Alderman, Christian Janson, Carlos Cid, Jason Crampton
2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15  
Thus there is a need for access control mechanisms in PVC environments. In this work, we define a new framework for Publicly Verifiable Outsourced Computation with Access Control (PVC-AC).  ...  We formally define algorithms to provide different PVC functionality for each entity within a large outsourced computation environment, and discuss the forms of access control policies that are applicable  ...  The first author acknowledges support from BAE Systems Advanced Technology Centre under a CASE Award.  ... 
doi:10.1145/2714576.2714636 dblp:conf/ccs/AldermanJCC15 fatcat:ui7a7usfprh65fszzru5tbhhpq

MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme

Farhad Aghili, Mahdi Sedaghat, Dave Singelee, Maanak Gupta
2022 Zenodo  
Attribute-Based Encryption (ABE) is a known cryptographic primitive that enables fine-grained access control over encrypted data.  ...  Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Things, where various devices with low computational power and different security levels are interconnected  ...  An ABE scheme is a superior cryptographic tool for fine-grained access control of encrypted data, which is utilized in various applications [9] .  ... 
doi:10.5281/zenodo.5882163 fatcat:ky63vukw7fa4rmatosweyg7gx4

Research on Access Control in Cloud Storage System: From Single to Multi-Clouds

Zhijie Fan
2018 American Journal of Software Engineering and Applications  
The access control researches here refer to cipher-text and cross-domain access control in cloud storage system.  ...  Firstly, we discuss about the focuses in recent researches and challenges of access control in cloud storage system.  ...  to realize fine-grained access control in the open network even policy evaluation can be done in cipher text.  ... 
doi:10.11648/j.ajsea.20180701.11 fatcat:inq3arpscndbbg45rhivqfv6am

"Context-aware access control and presentation for linked data" by Luca Costabello with Prateek Jain as coordinator

Luca Costabello
2015 ACM SIGWEB Newsletter  
An early version of a context-aware access control system for Linked Data has been published at the Linked Data on the Web Workshop (LDOW), co-located with WWW 2012 [Costabello 2012b ].  ...  Shi3ld for SPARQL, as presented in this thesis, appears in a 2012 paper presented at the European Conference on Artificial Intelligence (ECAI), [Costabello 2012a].  ...  [Flouris 2010 ] present a fine-grained access control framework on top of RDF repositories.  ... 
doi:10.1145/2749279.2749282 fatcat:rtsg57v7fbcb7egtdfnyfvb6wu

MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control Scheme

Farhad Aghili, Mahdi Sedaghat, Dave Singelee, Maanak Gupta
2022 Zenodo  
Attribute-Based Encryption (ABE) is a known cryptographic primitive that enables fine-grained access control over encrypted data.  ...  Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Things, where various devices with low computational power and different security levels are interconnected  ...  An ABE scheme is a superior cryptographic tool for fine-grained access control of encrypted data, which is utilized in various applications [9] .  ... 
doi:10.5281/zenodo.6024799 fatcat:ickfh5ie6nemvgtp5yjxt6x7je
« Previous Showing results 1 — 15 out of 2,760 results