M Abomhara, GM Køien - … conference on privacy and security in …, 2014 - ieeexplore.ieee.org
The Internet of Things at large will foster billions of devices, people and services to interconnect and exchange information and useful data. As IoT systems will be ubiquitous …
X Zhang, F Parisi-Presicce, R Sandhu… - ACM Transactions on …, 2005 - dl.acm.org
The recent usage control model (UCON) is a foundation for next-generation access control models with distinguishing properties of decision continuity and attribute mutability. A usage …
In recent years, the increasing development of wireless communication technologies and IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This …
M Gupta, R Sandhu - Proceedings of the 26th ACM symposium on …, 2021 - dl.acm.org
The ubiquitous presence of smart devices along with advancements in connectivity coupled with the elastic capabilities of cloud and edge systems have nurtured and revolutionized …
Toward a Multi-Tenancy Authorization System for Cloud Services Page 1 Cloud Computing 48 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES ■ 1540-7993/10/$26.00 …
The Internet of Things (IoT) is an emerging technology with a high market growth rate. In the IoT, machines and users from different levels must collaborate to exchange data and share …
Blockchains are gaining traction as secure and reliable platforms for data sharing in fields such as banking, supply chain management, food production, energy, the Internet, and …
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources. It assumes …
J Zrenner, FO Möller, C Jung, A Eitel… - Journal of Enterprise …, 2019 - emerald.com
Purpose Current business challenges force companies to exchange critical and sensitive data. The data provider pays great attention to the usage of their data and wants to control it …