Heydari et al., 2020 - Google Patents
Known unknowns: Indeterminacy in authentication in IoTHeydari et al., 2020
View PDF- Document ID
- 9544431953202653116
- Author
- Heydari M
- Mylonas A
- Tafreshi V
- Benkhelifa E
- Singh S
- Publication year
- Publication venue
- Future Generation Computer Systems
External Links
Snippet
Abstract The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an enabling technology that can improve the quality of our daily lives, for instance by measuring parameters from the environment (eg, humidity, temperature, weather, energy consumption …
- 238000000034 method 0 abstract description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | A survey on secure data analytics in edge computing | |
He et al. | A survey on zero trust architecture: Challenges and future trends | |
Sicari et al. | 5G In the internet of things era: An overview on security and privacy challenges | |
Liao et al. | Blockchain on security and forensics management in edge computing for IoT: A comprehensive survey | |
Pal et al. | Blockchain for IoT access control: Recent trends and future research directions | |
CN108702360B (en) | Digital asset protection policy using dynamic network attributes | |
Liu et al. | A semi-centralized trust management model based on blockchain for data exchange in iot system | |
Sicari et al. | Security, privacy and trust in Internet of Things: The road ahead | |
Cho et al. | A survey on trust management for mobile ad hoc networks | |
US20150135277A1 (en) | Methods for Generating and Using Trust Blueprints in Security Architectures | |
Zhang et al. | Access control in internet of things: A survey | |
Lata et al. | Security and privacy issues in fog computing environment | |
Heydari et al. | Known unknowns: Indeterminacy in authentication in IoT | |
Ghaffari et al. | Authentication and access control based on distributed ledger technology: A survey | |
Aaqib et al. | IoT trust and reputation: a survey and taxonomy | |
Ouechtati et al. | Trust-abac towards an access control system for the internet of things | |
Ouechtati et al. | Towards a self-adaptive access control middleware for the Internet of Things | |
Ko et al. | Secure service virtualization in IoT by dynamic service dependency verification | |
Macedo et al. | Assigning trust to devices in the context of consumer IoT applications | |
Duy et al. | B-DAC: a decentralized access control framework on northbound interface for securing SDN using blockchain | |
Gong et al. | A trusted attestation scheme for data source of internet of things in smart city based on dynamic trust classification | |
Ahamed et al. | An enhanced context-aware capability-based access control model for the internet of things in healthcare | |
Otta et al. | Cloud identity and access management solution with blockchain | |
Yan et al. | Heterogeneous data access control based on trust and reputation in mobile cloud computing | |
Ryutov et al. | Adaptive trust negotiation and access control for grids |