[HTML][HTML] Blockchain-based access control techniques for IoT applications

S Namane, I Ben Dhaou - Electronics, 2022 - mdpi.com
The Internet of Things is gaining more importance in the present era of Internet technology. It
is considered as one of the most important technologies of everyday life. Moreover, IoT …

Access control in Internet of Things: A survey

R Trabelsi, G Fersi, M Jmaiel - Computers & Security, 2023 - Elsevier
The speedy boom of Internet of Things (IoT) devices has revolutionized many fields
including smart cities, healthcare, smart homes, etc. Most of these devices exchange …

Bluesky: Towards convergence of zero trust principles and score-based authorization for iot enabled smart systems

S Ameer, M Gupta, S Bhatt, R Sandhu - Proceedings of the 27th ACM on …, 2022 - dl.acm.org
Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses
from static, network-based perimeters to focus on users, assets, and resources. It assumes …

Hybrid approaches (ABAC and RBAC) toward secure access control in smart home IoT

S Ameer, J Benson, R Sandhu - IEEE transactions on …, 2022 - ieeexplore.ieee.org
Smart homes are interconnected homes in which a wide variety of digital devices with
limited resources communicate with multiple users and among themselves using multiple …

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey

M Humayun, N Tariq, M Alfayad, M Zakwan… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has revolutionized various domains, enabling interconnected
devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in …

[HTML][HTML] Blockchain-based decentralized identification in iot: An overview of existing frameworks and their limitations

SM Hosseini, J Ferreira, PC Bartolomeu - Electronics, 2023 - mdpi.com
The popularity of the Internet of Things (IoT) and Industrial IoT (IIoT) has caused a rapid
increase in connected entities and exposed its lack of adequate Identity Management (IdM) …

Enforcement of separation of duty constraints in attribute-based access control

B Yang - Computers & Security, 2023 - Elsevier
While the verification of separation of duty (SoD) constraints on attribute based access
control (ABAC) systems has been defined and examined in existing works, it still remains an …

An extended Attribute-based access control with controlled delegation in IoT

S Tegane, F Semchedine, A Boudries - Journal of Information Security and …, 2023 - Elsevier
Access control is one of the main concerns for securing the Internet of Things (IoT) due to its
inherent features. It is particularly challenging to manage access policies and authorization …

A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics

ZM Iqal, A Selamat, O Krejcar - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging technology with a high market growth rate. In the
IoT, machines and users from different levels must collaborate to exchange data and share …

Attribute-Based Management of Secure Kubernetes Cloud Bursting

M Femminella, M Palmucci, G Reali… - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
In modern cloud computing, the need for flexible and scalable orchestration of services,
combined with robust security measures, is paramount. In this paper, we propose an …