Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …

Security and privacy in the Internet of Things: Current status and open issues

M Abomhara, GM Køien - … conference on privacy and security in …, 2014 - ieeexplore.ieee.org
The Internet of Things at large will foster billions of devices, people and services to
interconnect and exchange information and useful data. As IoT systems will be ubiquitous …

Formal model and policy specification of usage control

X Zhang, F Parisi-Presicce, R Sandhu… - ACM Transactions on …, 2005 - dl.acm.org
The recent usage control model (UCON) is a foundation for next-generation access control
models with distinguishing properties of decision continuity and attribute mutability. A usage …

DCapBAC: embedding authorization logic into smart things through ECC optimizations

JL Hernández-Ramos, AJ Jara, L Marín… - … Journal of Computer …, 2016 - Taylor & Francis
In recent years, the increasing development of wireless communication technologies and
IPv6 is enabling a seamless integration of smart objects into the Internet infrastructure. This …

Towards activity-centric access control for smart collaborative ecosystems

M Gupta, R Sandhu - Proceedings of the 26th ACM symposium on …, 2021 - dl.acm.org
The ubiquitous presence of smart devices along with advancements in connectivity coupled
with the elastic capabilities of cloud and edge systems have nurtured and revolutionized …

Toward a multi-tenancy authorization system for cloud services

JMA Calero, N Edwards, J Kirschnick… - IEEE Security & …, 2010 - ieeexplore.ieee.org
Toward a Multi-Tenancy Authorization System for Cloud Services Page 1 Cloud Computing
48 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SOCIETIES ■ 1540-7993/10/$26.00 …

A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics

ZM Iqal, A Selamat, O Krejcar - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology with a high market growth rate. In the
IoT, machines and users from different levels must collaborate to exchange data and share …

Integrity and privacy-aware, patient-centric health record access control framework using a blockchain

RA Abutaleb, SS Alqahtany, TA Syed - Applied Sciences, 2023 - mdpi.com
Blockchains are gaining traction as secure and reliable platforms for data sharing in fields
such as banking, supply chain management, food production, energy, the Internet, and …

Bluesky: Towards convergence of zero trust principles and score-based authorization for iot enabled smart systems

S Ameer, M Gupta, S Bhatt, R Sandhu - Proceedings of the 27th ACM on …, 2022 - dl.acm.org
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses
from static, network-based perimeters to focus on users, assets, and resources. It assumes …

Usage control architecture options for data sovereignty in business ecosystems

J Zrenner, FO Möller, C Jung, A Eitel… - Journal of Enterprise …, 2019 - emerald.com
Purpose Current business challenges force companies to exchange critical and sensitive
data. The data provider pays great attention to the usage of their data and wants to control it …