We present a method for computing the best provisioning of security resources for Internet of Things (IoT) scenarios characterized by a high degree of mobility. The security infrastructure …
RK Aluvalu, L Muddana - 2016 IEEE International Conference …, 2016 - ieeexplore.ieee.org
Cloud computing is a distributed computing paradigm and provides services to the customers through the internet. Cloud computing virtualizes system by pooling and sharing …
A Bumiller, O Barais, N Aillery… - 2022 15th International …, 2022 - ieeexplore.ieee.org
In many situations, it is of interest for authentication systems to adapt to context (eg, when the user's behavior differs from the previous behavior). Hence, during authentication events …
Abstract The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an enabling technology that can improve the quality of our daily lives, for instance by measuring …
Risk-aware access control systems grant or deny access to resources based on the notion of risk. It has many advantages compared to classical approaches, allowing for more flexibility …
Access control enforces authorization policies in order to prohibit unauthorized users from performing actions that could trigger a security violation. There exist numerous access …
Risk-aware access control systems grant or deny access to resources based on some notion of risk. In this paper we propose a model that considers the risk of leaking privacy-critical …
Substantial advances in Information and Communication Technologies (ICT) bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems …
SS Zmiewski, J Laufer, ZÁ Mann - Proceedings of the 17th International …, 2022 - dl.acm.org
Data processing systems operate in increasingly dynamic environments, such as in cloud or edge computing. In such environments, changes at run time can result in the dynamic …