[go: up one dir, main page]

Ahmad et al., 2018 - Google Patents

A lazy approach to access control as a service (ACaaS) for IoT: an AWS case study

Ahmad et al., 2018

View PDF
Document ID
8435777433956639034
Author
Ahmad T
Morelli U
Ranise S
Zannone N
Publication year
Publication venue
Proceedings of the 23nd ACM on symposium on access control models and technologies

External Links

Snippet

The Internet of Things (IoT) is receiving considerable attention from both industry and academia because of the new business models that it enables and the new security and privacy challenges that it generates. Major Cloud Service Providers (CSPs) have proposed …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0815Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations

Similar Documents

Publication Publication Date Title
Ahmad et al. A lazy approach to access control as a service (ACaaS) for IoT: an AWS case study
US9130920B2 (en) Monitoring of authorization-exceeding activity in distributed networks
Tapas et al. Blockchain-based IoT-cloud authorization and delegation
US10911428B1 (en) Use of metadata for computing resource access
US11102189B2 (en) Techniques for delegation of access privileges
Batalla et al. RETRACTED ARTICLE: Deployment of smart home management system at the edge: mechanisms and protocols
CN113360862A (en) Unified identity authentication system, method, electronic device and storage medium
KR20170107967A (en) Identity infrastructure as a service
Fernández et al. A model to enable application-scoped access control as a service for IoT using OAuth 2.0
Ahmad et al. Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system
EP2795522B1 (en) Techniques to store secret information for global data centers
Ribeiro de Mello et al. Multi-factor authentication for shibboleth identity providers
Nakandala et al. Apache Airavata security manager: Authentication and authorization implementations for a multi-tenant escience framework
Fongen et al. Identity management and integrity protection in publish-subscribe systems
Zwattendorfer et al. Middleware architecture for cross-border identification and authentication
Hakobyan Authentication and authorization systems in cloud environments
da Silva Torres Identity management: analysis of secure authentication propositions
Berdonces Bonelo OpenID Connect Client Registration API for Federated Cloud Platforms
Mehak et al. EACF: extensible access control framework for cloud environments
Ahmad Access Control for IoT: Problems and Solutions in the Smart Home
Borselius et al. A security architecture for agent-based mobile systems
Bayliss et al. The design, development and application of a proxy credential auditing infrastructure for collaborative research
Bühler Distributed Authentication Mesh
Lupascu Design and implementation of a secure platform for IoT device management
Deshapriya Remote management framework for IoT devices utilizing Blockchain