This work proposes to exploit blockchain technology to define Access Control systems that guarantee the auditability of access control policies evaluation. The key idea of our proposal …
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences, not only for cyber-security, but also for safety, as the cyber and physical worlds are …
Internet of Things (IoT) is a paradigm which has become extremely popular, with applications spanning from ehealth to industrial controls. IoT architectures are distributed …
I Akaichi, S Kirrane - arXiv preprint arXiv:2203.04800, 2022 - arxiv.org
The management of data and digital assets poses various challenges, including the need to adhere to legal requirements with respect to personal data protection and copyright. Usage …
The Internet of Things (IoT) is enabling smart houses, where multiple users with complex social relationships interact with smart devices. This requires sophisticated access control …
Fifth generation softwarized network systems will make it possible to flexibly partition the network infrastructure into logically independent network slices, hosting end-to-end network …
Access control systems are widely used means for the protection of computing systems. They are defined in terms of access control policies regulating the access to system …
Although data is a key part in smart cities, traditionally there has been no systematic effort to enable the sharing of data in a trustworthy manner among applications or services. In order …
D Mangiuc - Accounting and Management Information …, 2017 - pdfs.semanticscholar.org
As the cloud-based technologies gain more customers each day, the need for understanding the “economics of cloud” arises, together with the need for strategic …