Nothing Special   »   [go: up one dir, main page]

Heydari et al., 2020 - Google Patents

Known unknowns: Indeterminacy in authentication in IoT

Heydari et al., 2020

View PDF
Document ID
9544431953202653116
Author
Heydari M
Mylonas A
Tafreshi V
Benkhelifa E
Singh S
Publication year
Publication venue
Future Generation Computer Systems

External Links

Snippet

Abstract The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an enabling technology that can improve the quality of our daily lives, for instance by measuring parameters from the environment (eg, humidity, temperature, weather, energy consumption …
Continue reading at eprints.staffs.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Liu et al. A survey on secure data analytics in edge computing
He et al. A survey on zero trust architecture: Challenges and future trends
Sicari et al. 5G In the internet of things era: An overview on security and privacy challenges
Liao et al. Blockchain on security and forensics management in edge computing for IoT: A comprehensive survey
Pal et al. Blockchain for IoT access control: Recent trends and future research directions
CN108702360B (en) Digital asset protection policy using dynamic network attributes
Liu et al. A semi-centralized trust management model based on blockchain for data exchange in iot system
Sicari et al. Security, privacy and trust in Internet of Things: The road ahead
Cho et al. A survey on trust management for mobile ad hoc networks
US20150135277A1 (en) Methods for Generating and Using Trust Blueprints in Security Architectures
Zhang et al. Access control in internet of things: A survey
Lata et al. Security and privacy issues in fog computing environment
Heydari et al. Known unknowns: Indeterminacy in authentication in IoT
Ghaffari et al. Authentication and access control based on distributed ledger technology: A survey
Aaqib et al. IoT trust and reputation: a survey and taxonomy
Ouechtati et al. Trust-abac towards an access control system for the internet of things
Ouechtati et al. Towards a self-adaptive access control middleware for the Internet of Things
Ko et al. Secure service virtualization in IoT by dynamic service dependency verification
Macedo et al. Assigning trust to devices in the context of consumer IoT applications
Duy et al. B-DAC: a decentralized access control framework on northbound interface for securing SDN using blockchain
Gong et al. A trusted attestation scheme for data source of internet of things in smart city based on dynamic trust classification
Ahamed et al. An enhanced context-aware capability-based access control model for the internet of things in healthcare
Otta et al. Cloud identity and access management solution with blockchain
Yan et al. Heterogeneous data access control based on trust and reputation in mobile cloud computing
Ryutov et al. Adaptive trust negotiation and access control for grids