Decentralized, blockchain based access control framework for the heterogeneous internet of things

C Dukkipati, Y Zhang, LC Cheng - … of the Third ACM Workshop on …, 2018 - dl.acm.org
Privacy and safety are the most needed features while accessing the data in the IoT. Due to
the complicated decentralization and heterogeneous environment present in IoT, the …

Privacy aware decentralized access control system

S Shafeeq, M Alam, A Khan - Future Generation Computer Systems, 2019 - Elsevier
IoT security and privacy have proven to be a significant challenge. The traditional access
control protocols are not suitable for IoT mainly due to a massive scale, ubiquitous …

Paasword: A holistic data privacy and security by design framework for cloud services

Y Verginadis, A Michalas, P Gouvas, G Schiefer… - Journal of Grid …, 2017 - Springer
Enterprises increasingly recognize the compelling economic and operational benefits from
virtualizing and pooling IT resources in the cloud. Nevertheless, the significant and valuable …

A dynamic and automated access control management system for social networks

S Abid, MI Daud - Security and Communication Networks, 2022 - Wiley Online Library
In recent years, online social networks (OSNs) have become an essential part of our social
life. In OSNs, users can post resources to predefined groups of users, for example, family …

[PDF][PDF] Ad hoc Iteration and Re-execution of Activities in Workflows

M Sonntag, D Karastoyanova - International Journal On Advances in …, 2012 - Citeseer
The repeated execution of workflow logic is usually modeled with loop constructs in the
workflow model. But there are cases where it is not known at design time that a subset of …

A dynamic access control model

N Boustia, A Mokhtari - Applied Intelligence, 2012 - Springer
The proposed dynamic access control model is based on description logic (DL) augmented
with a default (δ) and an exception (ε) operator to capture context features. Currently, this …

[PDF][PDF] Modeling disjunctive context in access control

N Boustia, S Dahlab, A Mokhtari, A Usthb - context, 2012 - personales.upv.es
To provide dynamic authorizations to users, access control must take into account context.
Using this idea, we develop a Contextual Multi-Level Access Control Model based on …

Security model based encryption to protect data on cloud

Y Ghebghoub, O Boussaid, S Oukid - Proceedings of the International …, 2014 - dl.acm.org
Cloud Computing has been developed to deliver information technologies services on
demand to organizations such as well as individual users. In this paper, we will describe an …

[PDF][PDF] Access restrictions to and with description logic web ontologies

M Knechtel - 2010 - d-nb.info
Access restrictions are essential in standard information systems and became an issue for
ontologies in the following two aspects. Ontologies can represent explicit and implicit …

Assuring Privacy of Medical Records in an Open Collaborative Environment-A Case Study of Walloon Region's eHealth Platform

S Naqvi, G Dallons, A Michot, C Ponsard - … for Life: 5th IFIP WG 9.2, 9.6 …, 2010 - Springer
In many European countries, elderly citizens constitute a growing part of the population. In
some countries like Belgium, it is expected to be as high as one third of the population by …