A Location-Aware Authentication Model to Handle Uncertainty in IoT

M Heydari, A Mylonas, V Katos… - … on Internet of Things …, 2019 - ieeexplore.ieee.org
The process of authentication for location-aware services is more challenging over the
Internet of Things (IoT) than before due to a number of inherent IoT characteristics like …

Content-Based Access Control

W Zeng - 2015 - kuscholarworks.ku.edu
In conventional database, the most popular access control model specifies policies explicitly
for each role of every user against each data object manually. Nowadays, in large-scale …

[PDF][PDF] A risk management approach for distributed event-based systems

S Savinov, P Alencar - 2014 - cs.uwaterloo.ca
In this paper we present a Risk Management System. The goal of the RMS is to decrease
risks related to information access. The goal is met by taking the context of operations into …

[PDF][PDF] Mejora de los sistemas de gestión de identidades federados mediante técnicas de análisis de comportamientos

A García de Marina Martín - 2022 - burjcdigital.urjc.es
En primer lugar, me gustaría agradecer a mis directores de tesis, Marta e Isaac, sin vuestra
confianza este trabajo no hubiese sido posible. Habéis sido fuentes de inspiración y me …

[引用][C] 基于模糊聚类的移动节点访问风险综合评判

王建军, 李建平, 杜仕甫 - 小型微型计算机系统, 2014

[PDF][PDF] RISK AWARE HIER-ARCHICAL ATTRIBUTE SET-BASED ENCRYPTION (RA-HASBE) ACCESS CONTROL MODEL

RK Aluvalu, L Muddana - Annals. Computer Science …, 2016 - anale-informatica.tibiscus.ro
Business organizations widely accepting cloud computing to handle their complex business
process and increased business transactions. Organizations IT infrastructure and IT …

[PDF][PDF] Engineering Ecosystems of Systems: UML Profile, Credential Design, and Risk-balanced Cellular Access Control

D Bissessar - 2021 - ruor.uottawa.ca
This thesis proposes an Ecosystem perspective for the engineering of SoS and CPS and
illustrates the impact of this perspective in three areas of contribution category First, from a …

Anomalous behaviour detection for cyber defence in modern industrial control systems

G Ahmadi-Assalemi - 2022 - wlv.openrepository.com
The fusion of pervasive internet connectivity and emerging technologies in smart cities
creates fragile cyber-physical-natural ecosystems. Industrial Control Systems (ICS) are …

Usability, Sicherheit und Privatsphäre von risikobasierter Authentifizierung

S Wiefling - 2020 - epb.bibl.th-koeln.de
Risikobasierte Authentifizierung (RBA) ist eine adaptive Sicherheitsmaßnahme zur Stärkung
passwortbasierter Authentifizierung. Sie zeichnet Merkmale während des Logins auf und …

[PDF][PDF] Enabling trajectory constraints for usage control policies with backtracking particle filters

P Marcus, M Kessel… - … Conference on Mobile …, 2013 - personales.upv.es
A number of studies extended access control policies with constraints, aiming at the
restriction of mobile users' access to appropriate authorized areas. Recent research …