[go: up one dir, main page]

He et al., 2018 - Google Patents

Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})

He et al., 2018

View PDF
Document ID
2418164496343167794
Author
He W
Golla M
Padhi R
Ofek J
Dürmuth M
Fernandes E
Ur B
Publication year
Publication venue
27th USENIX Security Symposium (USENIX Security 18)

External Links

Snippet

Computing is transitioning from single-user devices to the Internet of Things (IoT), in which multiple users with complex social relationships interact with a single device. Currently deployed techniques fail to provide usable access-control specification or authentication in …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
He et al. Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})
Sikder et al. Kratos: Multi-user multi-device-aware access control system for the smart home
US11961350B2 (en) Consensus based authentication and authorization process
Zeng et al. End user security and privacy concerns with smart homes
He The University of Chicago
US10834249B2 (en) Information throttle that enforces policies for workplace use of electronic devices
Jang et al. Enabling multi-user controls in smart home devices
Mohammad et al. Access control and authorization in smart homes: A survey
Jin et al. Exploring the needs of users for supporting privacy-protective behaviors in smart homes
Hu et al. Multiparty access control for online social networks: model and mechanisms
Sikder et al. Who’s controlling my device? Multi-user multi-device-aware access control system for shared smart home environment
Ghosh et al. SoftAuthZ: a context-aware, behavior-based authorization framework for home IoT
CN111859463B (en) Method and system for secure and reliable identity-based computing
US20160330578A1 (en) Partial information throttle based on compliance with an agreement
CA2757923A1 (en) Method and system for controlling the use of an electronic device
Malkin et al. Optimistic access control for the smart home
Saeidi et al. If this context then that concern: Exploring users' concerns with ifttt applets
Tabassum et al. Exploring privacy implications of awareness and control mechanisms in smart home devices
US20210160234A1 (en) Centralized biometric user profile setup in internet gateway device for network access
Hundlani et al. No passwords needed: The iterative design of a parent-child authentication mechanism
Raburn Exploring why consumers do not use current cybersecurity mitigation strategies for IoT smart devices in the home
More et al. Improved multiparty access control mechanism for OSN
He Making Interactions with Home IoT Devices More Secure, Private, and Usable
Krawiecka Leveraging the heterogeneity of the internet of things devices to improve the security of smart environments
Lin et al. A blockchain-based approach to improving smart home security with situation-aware access control