Evolving Access Control Paradigms: A Comprehensive Multi-Dimensional Analysis of Security Risks and System Assurance in Cyber Engineering

NR Mayeke, AT Arigbabu, OO Olaniyi… - Available at …, 2024 - papers.ssrn.com
This study evaluates the effectiveness of traditional access control paradigms—Role-Based
Access Control (RBAC), Policy-Based Access Control (PBAC), and Attribute-Based Access …

A Blockchain based Scalable Domain Access Control Framework for Industrial Internet of Things

M Usman, MS Sarfraz, MU Aftab, U Habib… - IEEE Access, 2024 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) applications consist of resource constrained
interconnected devices that make them vulnerable to data leak and integrity violation …

Fabrication of Flexible Role-Based Access Control based on Blockchain for Internet of Things Use Cases

T Zaidi, M Usman, MU Aftab, H Aljuaid… - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) connects many objects and allows continuous communication
and data sharing has emerged as a revolutionary technology. However, expanding IoT …

Deep Ontology Alignment Using a Natural Language Processing Approach for Automatic M2M Translation in IIoT

S Javed, M Usman, F Sandin, M Liwicki, H Mokayed - Sensors, 2023 - mdpi.com
The technical capabilities of modern Industry 4.0 and Industry 5.0 are vast and growing
exponentially daily. The present-day Industrial Internet of Things (IIoT) combines manifold …

Intrusion Two-Level Detection System Using Machine Learning Techniques for Industrial Internet of Things (IIoT)

A Bushnag - 2023 IEEE International Conference on Internet of …, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) can be distributed on a large scale with thousands of
devices. The massive number of devices can lead to security flows since the IIoT devices …