Al-Jaroodi et al., 2009 - Google Patents
A survey of security middleware for pervasive and ubiquitous systemsAl-Jaroodi et al., 2009
View PDF- Document ID
- 6092285933277820981
- Author
- Al-Jaroodi J
- Al-Dhaheri A
- Al-Abdouli F
- Mohamed N
- Publication year
- Publication venue
- 2009 International Conference on Network-Based Information Systems
External Links
Snippet
Pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating with everyday components and handling tasks in a faster and better way. As a result, technologies to …
- 238000011161 development 0 abstract description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun et al. | Blockchain-based IoT access control system: towards security, lightweight, and cross-domain | |
Ali et al. | xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things | |
Liu et al. | Privacy protection for fog computing and the internet of things data based on blockchain | |
CN108702360B (en) | Digital asset protection policy using dynamic network attributes | |
Malamas et al. | A forensics-by-design management framework for medical devices based on blockchain | |
Sicari et al. | Security, privacy and trust in Internet of Things: The road ahead | |
Khalid et al. | Towards SDN-based smart contract solution for IoT access control | |
Majumder et al. | Taxonomy and classification of access control models for cloud environments | |
Shi et al. | BacS: a blockchain-based access control scheme in distributed internet of things | |
Dramé-Maigné et al. | Centralized, distributed, and everything in between: Reviewing access control solutions for the IoT | |
Ghaffari et al. | Authentication and access control based on distributed ledger technology: A survey | |
Al-Jaroodi et al. | Security middleware approaches and issues for ubiquitous applications | |
Shammar et al. | An attribute‐based access control model for Internet of Things using hyperledger fabric blockchain | |
Rabehaja et al. | Design and implementation of a secure and flexible access-right delegation for resource constrained environments | |
Benedyczak et al. | Key aspects of the UNICORE 6 security model | |
Xu et al. | Decentralized access control for IoT based on blockchain and smart contract | |
Alayda et al. | A novel hybrid approach for access control in cloud computing | |
Trabelsi et al. | Access control in Internet of Things: A survey | |
Rashid et al. | RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations | |
Ouaddah et al. | FairAccess2. 0: a smart contract-based authorisation framework for enabling granular access control in IoT | |
Al-Jaroodi et al. | Security issues of service-oriented middleware | |
Merlec et al. | SC-CAAC: A Smart Contract-Based Context-Aware Access Control Scheme for Blockchain-Enabled IoT Systems | |
Roy et al. | BloAC: A blockchain-based secure access control management for the Internet of Things | |
Ghosh et al. | Securing loosely-coupled collaboration in cloud environment through dynamic detection and removal of access conflicts | |
Al-Jaroodi et al. | A survey of security middleware for pervasive and ubiquitous systems |