Access control in the Internet of Things: Big challenges and new opportunities

A Ouaddah, H Mousannif, A Abou Elkalam… - Computer Networks, 2017 - Elsevier
In this paper, an extensive state of the art review of different access control solutions in IoT
within the Objectives, Models, Architecture and Mechanisms (OM-AM) way is provided. An …

Organizational information security policies: a review and research framework

WA Cram, JG Proudfoot, J D'arcy - European Journal of Information …, 2017 - Taylor & Francis
A major stream of research within the field of information systems security examines the use
of organizational policies that specify how users of information and technology resources …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

[PDF][PDF] Using social media to enhance emergency situation awareness

J Yin, A Lampert, M Cameron, B Robinson… - IEEE intelligent …, 2012 - delvalle.bphc.org
Enabling situation awareness in a given environment thus relies on being able to identify an
appropriate set of perception elements, coupled with higher-level comprehension patterns …

Attribute-based access control for AWS internet of things and secure industries of the future

S Bhatt, TK Pham, M Gupta, J Benson, J Park… - IEEE …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every
aspect. With a disruption of IoT devices and applications, attackers are leveraging weak …

Monitoring metric first-order temporal properties

D Basin, F Klaedtke, S Müller, E Zălinescu - Journal of the ACM (JACM), 2015 - dl.acm.org
Runtime monitoring is a general approach to verifying system properties at runtime by
comparing system events against a specification formalizing which event sequences are …

A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart cities

J Wu, K Ota, M Dong, C Li - IEEE Access, 2016 - ieeexplore.ieee.org
In smart cities, wireless sensor networks (WSNs) act as a type of core infrastructure that
collects data from the city to implement smart services. The security of WSNs is one of the …

Security analysis in role-based access control

N Li, MV Tripunitara - ACM Transactions on Information and System …, 2006 - dl.acm.org
The administration of large role-based access control (RBAC) systems is a challenging
problem. In order to administer such systems, decentralization of administration tasks by the …

Usage control in computer security: A survey

A Lazouski, F Martinelli, P Mori - Computer Science Review, 2010 - Elsevier
Protecting access to digital resources is one of the fundamental problems recognized in
computer security. As yet it remains a challenging problem to work out, starting from the …

An attribute-based approach toward a secured smart-home IoT access control and a comparison with a role-based approach

S Ameer, J Benson, R Sandhu - Information, 2022 - mdpi.com
The area of smart homes is one of the most popular for deploying smart connected devices.
One of the most vulnerable aspects of smart homes is access control. Recent advances in …