Articles with "based access" as a keyword



Photo by arthurbizkit from unsplash

Blockchain‐based access control with k $k$ ‐times tamper resistance in cloud environment

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.22904

Abstract: While cloud computing services such as cloud storage are fairly mature, it remains challenging to design efficient and secure cryptographic schemes to facilitate fine‐grained access control and achieve other features. For example, existing ciphertext‐policy attribute‐based… read more here.

Keywords: blockchain based; control times; based access; access control ... See more keywords
Photo by heathermount from unsplash

Capability-Based Access Control with ECC Key Management for the M2M Local Cloud Platform

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-5216-x

Abstract: One of the critical requirement in managing security of any computing system is access control, which includes protection and access management to the available resources. This requirement becomes more strict especially in a distributed computing… read more here.

Keywords: based access; management; access control; access ... See more keywords
Photo from wikipedia

PRESTvO: PRivacy Enabled Smartphone Based Access to Vehicle On-Board Units

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3003574

Abstract: Smartphones are quickly moving toward complementing or even replacing traditional car keys. We advocate a role-based access control policy mixed with attributes that facilitates access to various functionalities of vehicular on-board units from smartphones. We… read more here.

Keywords: vehicle; based access; access; board units ... See more keywords
Photo by nightcrawler1986 from unsplash

Managing Constraints in Role Based Access Control

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3011310

Abstract: Role-based access control (RBAC) is the most popular access control model currently adopted in several contexts to define security management. Constraints play a crucial role since they can drive the selection of the best representation… read more here.

Keywords: based access; role; access; role based ... See more keywords
Photo by thinkmagically from unsplash

Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3101218

Abstract: Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect. With a disruption of IoT devices and applications, attackers are leveraging weak authentication and access control mechanisms on these… read more here.

Keywords: based access; access; model; iot ... See more keywords
Photo by olav_ahrens from unsplash

SmartAccess: Attribute-Based Access Control System for Medical Records Based on Smart Contracts

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3217201

Abstract: Cross-organisation data sharing is challenging because all the involved organisations must agree on ‘how’ and ‘why’ the data is processed. Due to a lack of transparency, the organisations need to trust that others comply with… read more here.

Keywords: system; smart contracts; based access; access control ... See more keywords
Photo from wikipedia

Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2020.3030308

Abstract: We design a new blockchain-based access control protocol in IoT-enabled smart-grid system, called DBACP-IoTSG. Through the proposed DBACP-IoTSG, the data is securely brought to the service providers from their respective smart meters (SMs). The peer-to-peer… read more here.

Keywords: blockchain based; based access; control protocol; dbacp iotsg ... See more keywords
Photo by laurenmancke from unsplash

SmartABAC: Enabling Constrained IoT Devices to Make Complex Policy-Based Access Control Decisions

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3110142

Abstract: While attribute-based access control (ABAC) is a promising technique to govern interactions in the Internet of Things (IoT), most existing ABAC models are designed to run on remote servers or gateway devices. This scenario is… read more here.

Keywords: based access; constrained iot; iot devices; access ... See more keywords
Photo by nate_dumlao from unsplash

Joint Reservation and Contention-Based Access for URLLC-Enabled D2D Communications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Communications Letters"

DOI: 10.1109/lcomm.2021.3121515

Abstract: This letter investigates the ultra-reliable and low-latency link allocation for device-to-device (D2D) communications in face of sporadic packet arrivals. Specifically, contention-based access scheme has been widely used to achieve low-latency transmission, where the users can… read more here.

Keywords: reservation; packet; d2d communications; based access ... See more keywords
Photo from wikipedia

Smart Contract-Based Access Control Through Off-Chain Signature and On-Chain Evaluation

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Circuits and Systems II: Express Briefs"

DOI: 10.1109/tcsii.2021.3125500

Abstract: Access control is essential in computer security systems to regulate the access to critical or valuable resources. Conventional access control models mainly rely on a centralized and trusted server to mediate each attempted access from… read more here.

Keywords: contract; based access; access control; access ... See more keywords
Photo from wikipedia

Enabling Attribute-Based Access Control in NoSQL Databases

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Emerging Topics in Computing"

DOI: 10.1109/tetc.2022.3193577

Abstract: NoSQL databases are being increasingly used for efficient management of high volumes of unstructured data in applications like information retrieval, natural language processing, social computing, etc. However, unlike traditional databases, data protection measures such as… read more here.

Keywords: based access; nosql databases; access control; attribute based ... See more keywords