User-driven access control: Rethinking permission granting in modern operating systems

F Roesner, T Kohno, A Moshchuk… - … IEEE Symposium on …, 2012 - ieeexplore.ieee.org
… shows that our design presents reasonable tradeoffs for … the number of user actions
required for granting permissions. In … As with ACG ownership as described in Section 4.1.2, …

Who's controlling my device? Multi-user multi-device-aware access control system for shared smart home environment

AK Sikder, L Babun, ZB Celik, H Aksu… - ACM Transactions on …, 2022 - dl.acm.org
… of requests made by the users to control device usage in a … are the smart device owners,
and all four users have access to … In this section, we present the architecture of the Kratos+ and …

World of empowered IoT users

SH Hashemi, F Faghri, P Rausch… - 2016 IEEE first …, 2016 - ieeexplore.ieee.org
… In our system, data owner grants the access to the data. • … In order to address a variety of use
cases we present three … is required to formally prove our proposed capability based access …

[HTML][HTML] A capability-based security approach to manage access control in the internet of things

S Gusmeroli, S Piccione, D Rotondi - Mathematical and Computer …, 2013 - Elsevier
… its proof of ownership to use our access control mechanism; … In our current system the PDP
and the Revocation Service … or communication resources required by our CapBAC system are …

Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication

P Hanumanthappa, S Singh - 2012 International Conference …, 2012 - ieeexplore.ieee.org
… The user data present in the environment will be very … system for authentication. Also the
author mentions that the … transaction will send the request to the central key server to grant

Toward a usage-based security framework for collaborative computing systems

X Zhang, M Nakae, MJ Covington… - … on Information and System …, 2008 - dl.acm.org
… under the title “A Usage-based Authorization Frame- … in collaborative systems, we present
an access control model based … access request but also during the ongoing stage of the usage

[PDF][PDF] Three Way Authentication Protocol for Privacy Preserving and Ownership Authentication Transfer for Ubiquitous Computing

BH Pradeep, S Singh - WSEAS Transactions on communications, 2014 - core.ac.uk
… access to the valuable information present at the server, due … transaction will send the request
to the central key server to grantuser requests the central key server to start the ownership

A usage-based authorization framework for collaborative computing systems

X Zhang, M Nakae, MJ Covington… - Proceedings of the …, 2006 - dl.acm.org
systems, we present an access control model based on UCON [… type, ownership, etc., but
also, application specific attributes can … request is generated, a usage cannot be granted; after …

[HTML][HTML] Capability-based IoT access control using blockchain

Y Liu, Q Lu, S Chen, Q Qu, H O'Connor… - Digital Communications …, 2021 - Elsevier
… paper, we present an architecture for capability-based IoT access … When the device owner
decides to grant a device service … At a specific request rate, the response time remains stable, …

FairAccess: a new Blockchain‐based access control framework for the Internet of Things

A Ouaddah, A Abou Elkalam… - Security and …, 2016 - Wiley Online Library
… that are used to grant, get, delegate, and revoke access. It is … Section 3 introduces and presents
an architecture overview … signatures that are required to (i) prove ownership of resources …