Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges

R Roman, J Lopez, M Mambo - Future Generation Computer Systems, 2018 - Elsevier
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …

A survey of intrusion detection for in-vehicle networks

W Wu, R Li, G Xie, J An, Y Bai… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The development of the complexity and connectivity of modern automobiles has caused a
massive rise in the security risks of in-vehicle networks (IVNs). Nevertheless, existing IVN …

[HTML][HTML] Risk-based access control model: A systematic literature review

HF Atlam, MA Azad, MO Alassafi, AA Alshdadi… - Future Internet, 2020 - mdpi.com
Most current access control models are rigid, as they are designed using static policies that
always give the same outcome in different circumstances. In addition, they cannot adapt to …

An overview of risk estimation techniques in risk-based access control for the internet of things

H Atlam, A Alenezi, R Walters, G Wills - 2017 - eprints.soton.ac.uk
The Internet of Things (IoT) represents a modern approach where boundaries between real
and digital domains are progressively eliminated by changing over consistently every …

Developing an adaptive Risk-based access control model for the Internet of Things

HF Atlam, A Alenezi, RJ Walters… - … on internet of things …, 2017 - ieeexplore.ieee.org
The Internet of Things (IoT) is creating a revolution in the number of connected devices.
Cisco reported that there were 25 billion IoT devices in 2015 and modest estimation that this …

[PDF][PDF] Validation of an adaptive risk-based access control model for the internet of things

HF Atlam, A Alenezi, RK Hussein… - International Journal of …, 2018 - mecs-press.net
The Internet of Things (IoT) has spread into multiple dimensions that incorporate different
physical and virtual things. These things are connected together using different …

An efficient security risk estimation technique for Risk-based access control model for IoT

HF Atlam, GB Wills - Internet of Things, 2019 - Elsevier
The need to increase information sharing in the Internet of Things (IoT) applications made
the risk-based access control model to be the best candidate for both academic and …

[HTML][HTML] Fuzzy logic with expert judgment to implement an adaptive risk-based access control model for IoT

HF Atlam, RJ Walters, GB Wills, J Daniel - Mobile Networks and …, 2021 - Springer
Abstract The Internet of Things (IoT) is becoming the future of the Internet with a large
number of connected devices that are predicted to reach about 50 billion by 2020. With …

A discussion on context-awareness to better support the IoT cloud/edge continuum

DMA Da Silva, RC Sofia - IEEE Access, 2020 - ieeexplore.ieee.org
This article debates on notions of context-awareness as a relevant asset of networking and
computing architectures for an Internet of Things (IoT), in particular in regards to a smoother …

Your iots are (not) mine: On the remote binding between iot devices and users

J Chen, C Zuo, W Diao, S Dong, Q Zhao… - 2019 49th Annual …, 2019 - ieeexplore.ieee.org
Nowadays, IoT clouds are increasingly deployed to facilitate users to manage and control
their IoT devices. Unlike the traditional cloud services with communication between a client …