Ahmad et al., 2018 - Google Patents
A lazy approach to access control as a service (ACaaS) for IoT: an AWS case studyAhmad et al., 2018
View PDF- Document ID
- 8435777433956639034
- Author
- Ahmad T
- Morelli U
- Ranise S
- Zannone N
- Publication year
- Publication venue
- Proceedings of the 23nd ACM on symposium on access control models and technologies
External Links
Snippet
The Internet of Things (IoT) is receiving considerable attention from both industry and academia because of the new business models that it enables and the new security and privacy challenges that it generates. Major Cloud Service Providers (CSPs) have proposed …
- 238000011156 evaluation 0 description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0815—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahmad et al. | A lazy approach to access control as a service (ACaaS) for IoT: an AWS case study | |
US9130920B2 (en) | Monitoring of authorization-exceeding activity in distributed networks | |
Tapas et al. | Blockchain-based IoT-cloud authorization and delegation | |
US10911428B1 (en) | Use of metadata for computing resource access | |
US11102189B2 (en) | Techniques for delegation of access privileges | |
Batalla et al. | RETRACTED ARTICLE: Deployment of smart home management system at the edge: mechanisms and protocols | |
CN113360862A (en) | Unified identity authentication system, method, electronic device and storage medium | |
KR20170107967A (en) | Identity infrastructure as a service | |
Fernández et al. | A model to enable application-scoped access control as a service for IoT using OAuth 2.0 | |
Ahmad et al. | Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system | |
EP2795522B1 (en) | Techniques to store secret information for global data centers | |
Ribeiro de Mello et al. | Multi-factor authentication for shibboleth identity providers | |
Nakandala et al. | Apache Airavata security manager: Authentication and authorization implementations for a multi-tenant escience framework | |
Fongen et al. | Identity management and integrity protection in publish-subscribe systems | |
Zwattendorfer et al. | Middleware architecture for cross-border identification and authentication | |
Hakobyan | Authentication and authorization systems in cloud environments | |
da Silva Torres | Identity management: analysis of secure authentication propositions | |
Berdonces Bonelo | OpenID Connect Client Registration API for Federated Cloud Platforms | |
Mehak et al. | EACF: extensible access control framework for cloud environments | |
Ahmad | Access Control for IoT: Problems and Solutions in the Smart Home | |
Borselius et al. | A security architecture for agent-based mobile systems | |
Bayliss et al. | The design, development and application of a proxy credential auditing infrastructure for collaborative research | |
Bühler | Distributed Authentication Mesh | |
Lupascu | Design and implementation of a secure platform for IoT device management | |
Deshapriya | Remote management framework for IoT devices utilizing Blockchain |