[go: up one dir, main page]

Yousefnezhad et al., 2017 - Google Patents

Authentication and access control for open messaging interface standard

Yousefnezhad et al., 2017

View PDF
Document ID
16920645915655119760
Author
Yousefnezhad N
Filippov R
Javed A
Buda A
Madhikermi M
Främling K
Publication year
Publication venue
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

External Links

Snippet

The number of Internet of Things (IoT) vendors is rapidly growing, providing solutions for all levels of the IoT stack. Despite the universal agreement on the need for a standardized technology stack, following the model of the world-wide-web, a large number of industry …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/08Protocols for interworking or protocol conversion

Similar Documents

Publication Publication Date Title
Kamboj et al. User authentication using Blockchain based smart contract in role-based access control
Bertin et al. Access control in the Internet of Things: a survey of existing approaches and open research questions
US9639678B2 (en) Identity risk score generation and implementation
US9560080B2 (en) Extending organizational boundaries throughout a cloud architecture
WO2009032511A2 (en) Transferable restricted security tokens
CN103563294A (en) Authentication and authorization methods for cloud computing platform security
Aramide Decentralized identity for secure network access: A blockchain-based approach to user-centric authentication
Kyriakidou et al. Decentralized identity with applications to security and privacy for the internet of things
CN116707849A (en) Method for setting cloud service access rights and cloud management platform for enclave instances
Huang et al. A novel zero-trust identity framework for agentic AI: Decentralized authentication and fine-grained access control
Yousefnezhad et al. Authentication and access control for open messaging interface standard
Ghosh et al. Securing loosely-coupled collaboration in cloud environment through dynamic detection and removal of access conflicts
Marillonnet et al. An Efficient User‐Centric Consent Management Design for Multiservices Platforms
Khalil et al. IoT-MAAC: Multiple attribute access control for IoT environments
Mangiuc Cloud identity and access management–A model proposal
KR102317717B1 (en) Internet of things service access control system and method using smart contract based on tangle network
Rosado et al. Security services architecture for secure mobile grid systems
Amdouni et al. Exploring the flexibility of network access control in the recursive InterNetwork Architecture
Craß et al. A decentralized access control model for dynamic collaboration of autonomous peers
Copeland et al. Reduce cyber security vulnerabilities: Identity layer
Xiao et al. A review of geni authentication and access control mechanisms
Yahya et al. Cloud MA-MOrBAC: A Cloud Distributed Access Control Model Based on Mobile Agents.
Fotiou et al. Relationship-based Access Control for Data Spaces
Huang et al. Agentic AI Identity Security
Tapas Toward trustless internet of things: a blockchain-based approach