Nothing Special   »   [go: up one dir, main page]

Zhang et al., 2016 - Google Patents

Access control in internet of things: A survey

Zhang et al., 2016

View PDF
Document ID
3219049415578674483
Author
Zhang Y
Wu X
Publication year
Publication venue
arXiv preprint arXiv:1610.01065

External Links

Snippet

Cheating is a real problem in the Internet of Things. The fundamental question that needs to be answered is how we can trust the validity of the data being generated in the first place. The problem, however, isn't inherent in whether or not to embrace the idea of an open …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party

Similar Documents

Publication Publication Date Title
Zhang et al. Access control in internet of things: A survey
Istiaque Ahmed et al. Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction
He et al. A survey on zero trust architecture: Challenges and future trends
Ahmed et al. Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges
Chanal et al. Security and privacy in IoT: a survey
Sicari et al. Security, privacy and trust in Internet of Things: The road ahead
Jamali et al. Towards the internet of things
Deebak et al. TAB-SAPP: A trust-aware blockchain-based seamless authentication for massive IoT-enabled industrial applications
Popescul et al. Data security in smart cities: challenges and solutions
Mubarakali An efficient authentication scheme using blockchain technology for wireless sensor networks
Burhan et al. A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions
Sicari et al. Insights into security and privacy towards fog computing evolution
Haque et al. Security in pervasive computing: Current status and open issues
Fan et al. Understanding security in smart city domains from the ant-centric perspective
Pal Internet of things and access control: sensing, monitoring and controlling access in IoT-enabled healthcare systems
Ouechtati et al. Towards a self-adaptive access control middleware for the Internet of Things
Iqbal et al. Internet of things (IoT): On-going security challenges and risks
Wang et al. A review on trust evaluation for internet of things
Kokila et al. Authentication, access control and scalability models in internet of things security-A review
Patel et al. Internet of things security: challenges, advances, and analytics
Heydari et al. Known unknowns: Indeterminacy in authentication in IoT
Kiyomoto et al. Security issues on IT systems during disasters: a survey
Akhuseyinoglu et al. Access control approaches for smart cities
Abbasi et al. Security of IoT application layer: Requirements, threats, and solutions
Deebak et al. Privacy preserving based on seamless authentication with provable key verification using miomt for b5g-enabled healthcare systems