[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …

Blockchain-based authentication and authorization for smart city applications

C Esposito, M Ficco, BB Gupta - Information Processing & Management, 2021 - Elsevier
The platforms supporting the smart city applications are rarely implemented from scratch by
a municipality and/or totally owned by a single company, but are more typically realized by …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

A knowledge graph empowered online learning framework for access control decision-making

M You, J Yin, H Wang, J Cao, K Wang, Y Miao… - World Wide Web, 2023 - Springer
Abstract Knowledge graph, as an extension of graph data structure, is being used in a wide
range of areas as it can store interrelated data and reveal interlinked relationships between …

User authentication using Blockchain based smart contract in role-based access control

P Kamboj, S Khare, S Pal - Peer-to-Peer Networking and Applications, 2021 - Springer
Since the last few decades, information security has become a significant challenge for
organizations' system administrators. However, the Role-Based Access Control (RBAC) …

A survey on interdependent privacy

M Humbert, B Trubert, K Huguenin - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
The privacy of individuals does not only depend on their own actions and data but may also
be affected by the privacy decisions and by the data shared by other individuals. This …

[PDF][PDF] ELVIRA: An Explainable Agent for Value and Utility-Driven Multiuser Privacy.

F Mosca, JM Such - AAMAS, 2021 - kclpure.kcl.ac.uk
Online social networks fail to support users to adequately share coowned content, which
leads to privacy violations. Scholars proposed collaborative mechanisms to support users …

An explainable assistant for multiuser privacy

F Mosca, J Such - Autonomous Agents and Multi-Agent Systems, 2022 - Springer
Multiuser Privacy (MP) concerns the protection of personal information in situations where
such information is co-owned by multiple users. MP is particularly problematic in …

Bluesky: Towards convergence of zero trust principles and score-based authorization for iot enabled smart systems

S Ameer, M Gupta, S Bhatt, R Sandhu - Proceedings of the 27th ACM on …, 2022 - dl.acm.org
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses
from static, network-based perimeters to focus on users, assets, and resources. It assumes …