Uncertainty-aware authentication model for fog computing in IoT

M Heydari, A Mylonas, V Katos… - … conference on fog …, 2019 - ieeexplore.ieee.org
Since the term “Fog Computing” has been coined by Cisco Systems in 2012, security and
privacy issues of this promising paradigm are still open challenges. Among various security …

Shortfall-based optimal placement of security resources for mobile IoT scenarios

A Rullo, E Serra, E Bertino, J Lobo - … Oslo, Norway, September 11-15, 2017 …, 2017 - Springer
We present a method for computing the best provisioning of security resources for Internet of
Things (IoT) scenarios characterized by a high degree of mobility. The security infrastructure …

A dynamic attribute-based risk aware access control model (DA-RAAC) for cloud computing

RK Aluvalu, L Muddana - 2016 IEEE International Conference …, 2016 - ieeexplore.ieee.org
Cloud computing is a distributed computing paradigm and provides services to the
customers through the internet. Cloud computing virtualizes system by pooling and sharing …

Towards a Better Understanding of Impersonation Risks

A Bumiller, O Barais, N Aillery… - 2022 15th International …, 2022 - ieeexplore.ieee.org
In many situations, it is of interest for authentication systems to adapt to context (eg, when
the user's behavior differs from the previous behavior). Hence, during authentication events …

Known unknowns: Indeterminacy in authentication in IoT

M Heydari, A Mylonas, VHF Tafreshi… - Future Generation …, 2020 - Elsevier
Abstract The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an
enabling technology that can improve the quality of our daily lives, for instance by measuring …

Risk-based privacy-aware information disclosure

A Armando, M Bezzi, N Metoui… - International Journal of …, 2015 - igi-global.com
Risk-aware access control systems grant or deny access to resources based on the notion of
risk. It has many advantages compared to classical approaches, allowing for more flexibility …

Authorization strategies and classification of access control models

A Mohamed, D Auer, D Hofer, J Küng - Future Data and Security …, 2021 - Springer
Access control enforces authorization policies in order to prohibit unauthorized users from
performing actions that could trigger a security violation. There exist numerous access …

Risk-aware information disclosure

A Armando, M Bezzi, N Metoui, A Sabetta - International Workshop on …, 2014 - Springer
Risk-aware access control systems grant or deny access to resources based on some notion
of risk. In this paper we propose a model that considers the risk of leaking privacy-critical …

A methodology and toolkit for deploying reliable security policies in critical infrastructures

F Jaïdi, F Labbene Ayachi… - Security and …, 2018 - Wiley Online Library
Substantial advances in Information and Communication Technologies (ICT) bring out novel
concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems …

Automatic online quantification and prioritization of data protection risks

SS Zmiewski, J Laufer, ZÁ Mann - Proceedings of the 17th International …, 2022 - dl.acm.org
Data processing systems operate in increasingly dynamic environments, such as in cloud or
edge computing. In such environments, changes at run time can result in the dynamic …