4.5 Article

Specification and adaptive verification of access control policy for cyber-physical-social spaces

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Theory & Methods

Recent advancements and challenges of Internet of Things in smart agriculture: A survey

Bam Bahadur Sinha et al.

Summary: This paper discusses the important components, new technologies, security issues, challenges, and future trends of IoT in the agriculture domain. The goal is to help potential researchers identify relevant IoT problems and adopt suitable technologies based on application requirements. The significance of IoT and Data Analytics for smart agriculture is emphasized.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2022)

Article Computer Science, Hardware & Architecture

oGBAC-A Group Based Access Control Framework for Information Sharing in Online Social Networks

Donghui Hu et al.

Summary: The paper introduces a group-based access control framework to prevent privacy disclosure when sharing information in online social networks. By extending group-centric secure information sharing models and incorporating ideas from attribute-based access control, the framework ensures privacy protection by imposing restrictions on information flow among groups. The security and efficiency of the implemented system is analyzed to demonstrate the effectiveness of the oGBAC model.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

Service Composition in Cyber-Physical-Social Systems

Shangguang Wang et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2020)

Article Computer Science, Information Systems

A Survey on Access Control in the Age of Internet of Things

Jing Qiu et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Hardware & Architecture

G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework

Nathalie Baracaldo et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification

Yan Cao et al.

COMPUTERS & SECURITY (2019)

Article Computer Science, Hardware & Architecture

Access control in Internet-of-Things: A survey

Sowmya Ravidas et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Information Systems

Specification and Verification of a Topology-Aware Access Control Model for Cyber-Physical Space

Yan Cao et al.

TSINGHUA SCIENCE AND TECHNOLOGY (2019)

Article Computer Science, Information Systems

Privacy preserving fine-grained location-based access control for mobile cloud

Yaser Baseri et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Hardware & Architecture

On the Interplay Between Cyber and Physical Spaces for Adaptive Security

Christos Tsigkanos et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Computer Science, Information Systems

Ts-RBAC: A RBAC model with transformation

Gang Liu et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Hardware & Architecture

An Access Control Model for Online Social Networks Using User-to-User Relationships

Yuan Cheng et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)

Article Computer Science, Hardware & Architecture

A framework and risk assessment approaches for risk-based access control in the cloud

Daniel Ricardo dos Santos et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

CAAC - An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures

Krishna K. Venkatasubramanian et al.

ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

A formal role-based access control model for security policies in multi-domain mobile networks

D. Unal et al.

COMPUTER NETWORKS (2013)

Article Computer Science, Artificial Intelligence

Physical-Cyber-Social Computing: An Early 21st Century Approach

Amit Sheth et al.

IEEE INTELLIGENT SYSTEMS (2013)

Article Computer Science, Information Systems

Specification, Validation, and Enforcement of a Generalized Spatio-Temporal Role-Based Access Control Model

Ramadan Abdunabi et al.

IEEE SYSTEMS JOURNAL (2013)

Article Computer Science, Software Engineering

A verification environment for bigraphs

Gian Perrone et al.

INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING (2013)

Article Computer Science, Information Systems

On the formalization and analysis of a spatio-temporal role-based access control model

Manachai Toahchoodee et al.

JOURNAL OF COMPUTER SECURITY (2011)

Article Computer Science, Information Systems

Access control for smarter healthcare using policy spaces

Claudio A. Ardagna et al.

COMPUTERS & SECURITY (2010)