L Tan, N Shi, C Yang, K Yu - IEEE Access, 2020 - ieeexplore.ieee.org
Cyber-Physical-Social System (CPSS) big data is specified as the global historical data which is usually stored in cloud, the local real-time data which is usually stored in the fog …
D Han, Y Zhu, D Li, W Liang, A Souri… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are widely considered in smart cities, intelligent medicine, and intelligent transportation, among other fields that facilitate people's lives, producing a …
MDA Islam, S Madria - 2019 IEEE international conference on …, 2019 - ieeexplore.ieee.org
IoT devices produce a lot of valuable and sensitive data that is often shared with external parties to provide different kinds of useful services. Traditional IoT access control systems …
X Qin, Y Huang, Z Yang, X Li - Journal of systems architecture, 2021 - Elsevier
Ciphertext-policy attribute-based encryption (CP-ABE) has been widely studied and used in access control schemes for secure data sharing. Since in most of the existing attribute-based …
A Ouaddah, A Abou Elkalam… - Security and …, 2016 - Wiley Online Library
Security and privacy are huge challenges in Internet of Things (IoT) environments, but unfortunately, the harmonization of the IoT‐related standards and protocols is hardly and …
S Rouhani, R Deters - IEEE/WIC/ACM International Conference on Web …, 2019 - dl.acm.org
Access control is a mechanism in computer security that regulates access to the system resources. The current access control systems face many problems, such as the presence of …
A Ouaddah, AA Elkalam, AA Ouahman - Europe and MENA cooperation …, 2017 - Springer
Access control face big challenges in IoT. Unfortunately, it is hard to implement current access control standards on smart object due to its constrained nature while the introduction …
S Sun, R Du, S Chen, W Li - IEEE Access, 2021 - ieeexplore.ieee.org
Most IoT devices cannot afford to be a blockchain node due to the high computation and storage loads. Thus, the blockchain is usually deployed on one delegate node, eg, the edge …
H Liu, D Han, D Li - IEEE Access, 2020 - ieeexplore.ieee.org
IoT devices have some special characteristics, such as mobility, limited performance, and distributed deployment, which makes it difficult for traditional centralized access control …