Literature review of Industry 4.0 and related technologies

E Oztemel, S Gursev - Journal of intelligent manufacturing, 2020 - Springer
Manufacturing industry profoundly impact economic and societal progress. As being a
commonly accepted term for research centers and universities, the Industry 4.0 initiative has …

A blockchain based approach for the definition of auditable access control systems

DDF Maesa, P Mori, L Ricci - Computers & Security, 2019 - Elsevier
This work proposes to exploit blockchain technology to define Access Control systems that
guarantee the auditability of access control policies evaluation. The key idea of our proposal …

[HTML][HTML] A cloud-edge based data security architecture for sharing and analysing cyber threat information

DW Chadwick, W Fan, G Costantino… - Future generation …, 2020 - Elsevier
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences,
not only for cyber-security, but also for safety, as the cyber and physical worlds are …

Implementing usage control in internet of things: a smart home use case

A La Marra, F Martinelli, P Mori… - 2017 IEEE Trustcom …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) is a paradigm which has become extremely popular, with
applications spanning from ehealth to industrial controls. IoT architectures are distributed …

Usage control specification, enforcement, and robustness: A survey

I Akaichi, S Kirrane - arXiv preprint arXiv:2203.04800, 2022 - arxiv.org
The management of data and digital assets poses various challenges, including the need to
adhere to legal requirements with respect to personal data protection and copyright. Usage …

The EGRBAC model for smart home IoT

S Ameer, J Benson, R Sandhu - 2020 IEEE 21st International …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is enabling smart houses, where multiple users with complex
social relationships interact with smart devices. This requires sophisticated access control …

Pushing forward security in network slicing by leveraging continuous usage control

B Martini, P Mori, F Marino, A Saracino… - IEEE …, 2020 - ieeexplore.ieee.org
Fifth generation softwarized network systems will make it possible to flexibly partition the
network infrastructure into logically independent network slices, hosting end-to-end network …

A rigorous framework for specification, analysis and enforcement of access control policies

A Margheri, M Masi, R Pugliese… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Access control systems are widely used means for the protection of computing systems.
They are defined in terms of access control policies regulating the access to system …

Policy-based usage control for a trustworthy data sharing platform in smart cities

QH Cao, M Giyyarpuram, R Farahbakhsh… - Future Generation …, 2020 - Elsevier
Although data is a key part in smart cities, traditionally there has been no systematic effort to
enable the sharing of data in a trustworthy manner among applications or services. In order …

[PDF][PDF] Accountants and the cloud–Involving the professionals

D Mangiuc - Accounting and Management Information …, 2017 - pdfs.semanticscholar.org
As the cloud-based technologies gain more customers each day, the need for
understanding the “economics of cloud” arises, together with the need for strategic …