He et al., 2018 - Google Patents
Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}})He et al., 2018
View PDF- Document ID
- 2418164496343167794
- Author
- He W
- Golla M
- Padhi R
- Ofek J
- Dürmuth M
- Fernandes E
- Ur B
- Publication year
- Publication venue
- 27th USENIX Security Symposium (USENIX Security 18)
External Links
Snippet
Computing is transitioning from single-user devices to the Internet of Things (IoT), in which multiple users with complex social relationships interact with a single device. Currently deployed techniques fail to provide usable access-control specification or authentication in …
- 238000000034 method 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
He et al. | Rethinking access control and authentication for the home internet of things ({{{{{IoT}}}}}) | |
Sikder et al. | Kratos: Multi-user multi-device-aware access control system for the smart home | |
US11961350B2 (en) | Consensus based authentication and authorization process | |
Zeng et al. | End user security and privacy concerns with smart homes | |
He | The University of Chicago | |
US10834249B2 (en) | Information throttle that enforces policies for workplace use of electronic devices | |
Jang et al. | Enabling multi-user controls in smart home devices | |
Mohammad et al. | Access control and authorization in smart homes: A survey | |
Jin et al. | Exploring the needs of users for supporting privacy-protective behaviors in smart homes | |
Hu et al. | Multiparty access control for online social networks: model and mechanisms | |
Sikder et al. | Who’s controlling my device? Multi-user multi-device-aware access control system for shared smart home environment | |
Ghosh et al. | SoftAuthZ: a context-aware, behavior-based authorization framework for home IoT | |
CN111859463B (en) | Method and system for secure and reliable identity-based computing | |
US20160330578A1 (en) | Partial information throttle based on compliance with an agreement | |
CA2757923A1 (en) | Method and system for controlling the use of an electronic device | |
Malkin et al. | Optimistic access control for the smart home | |
Saeidi et al. | If this context then that concern: Exploring users' concerns with ifttt applets | |
Tabassum et al. | Exploring privacy implications of awareness and control mechanisms in smart home devices | |
US20210160234A1 (en) | Centralized biometric user profile setup in internet gateway device for network access | |
Hundlani et al. | No passwords needed: The iterative design of a parent-child authentication mechanism | |
Raburn | Exploring why consumers do not use current cybersecurity mitigation strategies for IoT smart devices in the home | |
More et al. | Improved multiparty access control mechanism for OSN | |
He | Making Interactions with Home IoT Devices More Secure, Private, and Usable | |
Krawiecka | Leveraging the heterogeneity of the internet of things devices to improve the security of smart environments | |
Lin et al. | A blockchain-based approach to improving smart home security with situation-aware access control |