Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures

E Ben Hamida, H Noura, W Znaidi - Electronics, 2015 - mdpi.com
Due to the growing number of vehicles on the roads worldwide, road traffic accidents are
currently recognized as a major public safety problem. In this context, connected vehicles …

Towards a secure ITS: Overview, challenges and solutions

L Sleem, HN Noura, R Couturier - Journal of Information Security and …, 2020 - Elsevier
Abstract Intelligent Transportation Systems (ITS), the heart of the new revolution of smart
transport, has evolved from the well-known Vehicular Ad hoc Networks (VANETs) to become …

Authentication strategies in vehicular communications: a taxonomy and framework

MA Rezazadeh Baee, L Simpson, X Boyen… - EURASIP Journal on …, 2021 - Springer
In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry
computing and communication platforms to enable new versatile systems known as …

Safety and consistency of subject attributes for attribute-based pre-authorization systems

M Shakarami, R Sandhu - National Cyber Summit (NCS) Research Track, 2020 - Springer
Attribute-based access control (ABAC) systems typically enforce pre-authorization, whereby
an access decision is made once prior to granting or denying access. This decision utilizes …

Breaking the Web Barriers of the e‐Administration Using an Accessible Digital Certificate Based on a Cryptographic Token

B García, A Gómez, R Conde… - Advances in …, 2015 - Wiley Online Library
The purpose of developing e‐Government is to make public administrations more efficient
and transparent and to allow citizens to more comfortably and effectively access information …

Data dissemination and policy enforcement in multi-level secure multi-domain environments

J Son, E Hamouda, G Pannosian… - International Journal of …, 2024 - inderscienceonline.com
Several challenges exist in disseminating multi-level secure (MLS) data in multi-domain
environments. First, the security domains participating in data dissemination generally use …

Trust-based hexagonal clustering for efficient certificate management scheme in mobile ad hoc networks

VS Janani, MSK Manikandan - Sādhanā, 2016 - Springer
The wireless and dynamic nature of mobile ad hoc networks (MANET) render them more
vulnerable to security attacks. However, providing a security mechanism implicitly has been …

[图书][B] Operation and administration of access control in IoT environments

M Shakarami - 2022 - search.proquest.com
Abstract The Internet of Things (IoT) denotes a network of evolving and expanding number
of technologies embedded in smart things with at least one network interface to interact with …

Data Dissemination and Policy Enforcement in Multi-Level Secure Multi-Domain Environments

J Son, E Hamouda, G Pannosian… - Available at SSRN …, 2023 - papers.ssrn.com
Several challenges exist in disseminating Multi-Level Secure (MLS) data in multi-domain
environments. First, the security domains participating in data dissemination generally use …

[PDF][PDF] Authorization certificate based access control in embedded environments

L af Heurlin - 2015 - aaltodoc.aalto.fi
The results show that in our use case, the faster platform can evaluate access permissions
within 1.3 s from Client device starting device discovery and the slower one within 3.2 s …