Zhang et al., 2016 - Google Patents
Access control in internet of things: A surveyZhang et al., 2016
View PDF- Document ID
- 3219049415578674483
- Author
- Zhang Y
- Wu X
- Publication year
- Publication venue
- arXiv preprint arXiv:1610.01065
External Links
Snippet
Cheating is a real problem in the Internet of Things. The fundamental question that needs to be answered is how we can trust the validity of the data being generated in the first place. The problem, however, isn't inherent in whether or not to embrace the idea of an open …
- 238000000034 method 0 abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhang et al. | Access control in internet of things: A survey | |
Istiaque Ahmed et al. | Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction | |
He et al. | A survey on zero trust architecture: Challenges and future trends | |
Ahmed et al. | Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges | |
Chanal et al. | Security and privacy in IoT: a survey | |
Sicari et al. | Security, privacy and trust in Internet of Things: The road ahead | |
Jamali et al. | Towards the internet of things | |
Deebak et al. | TAB-SAPP: A trust-aware blockchain-based seamless authentication for massive IoT-enabled industrial applications | |
Popescul et al. | Data security in smart cities: challenges and solutions | |
Mubarakali | An efficient authentication scheme using blockchain technology for wireless sensor networks | |
Burhan et al. | A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions | |
Sicari et al. | Insights into security and privacy towards fog computing evolution | |
Haque et al. | Security in pervasive computing: Current status and open issues | |
Fan et al. | Understanding security in smart city domains from the ant-centric perspective | |
Pal | Internet of things and access control: sensing, monitoring and controlling access in IoT-enabled healthcare systems | |
Ouechtati et al. | Towards a self-adaptive access control middleware for the Internet of Things | |
Iqbal et al. | Internet of things (IoT): On-going security challenges and risks | |
Wang et al. | A review on trust evaluation for internet of things | |
Kokila et al. | Authentication, access control and scalability models in internet of things security-A review | |
Patel et al. | Internet of things security: challenges, advances, and analytics | |
Heydari et al. | Known unknowns: Indeterminacy in authentication in IoT | |
Kiyomoto et al. | Security issues on IT systems during disasters: a survey | |
Akhuseyinoglu et al. | Access control approaches for smart cities | |
Abbasi et al. | Security of IoT application layer: Requirements, threats, and solutions | |
Deebak et al. | Privacy preserving based on seamless authentication with provable key verification using miomt for b5g-enabled healthcare systems |