Yousefnezhad et al., 2017 - Google Patents
Authentication and access control for open messaging interface standardYousefnezhad et al., 2017
View PDF- Document ID
- 16920645915655119760
- Author
- Yousefnezhad N
- Filippov R
- Javed A
- Buda A
- Madhikermi M
- Främling K
- Publication year
- Publication venue
- Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
External Links
Snippet
The number of Internet of Things (IoT) vendors is rapidly growing, providing solutions for all levels of the IoT stack. Despite the universal agreement on the need for a standardized technology stack, following the model of the world-wide-web, a large number of industry …
- 238000005516 engineering process 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/08—Protocols for interworking or protocol conversion
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kamboj et al. | User authentication using Blockchain based smart contract in role-based access control | |
| Bertin et al. | Access control in the Internet of Things: a survey of existing approaches and open research questions | |
| US9639678B2 (en) | Identity risk score generation and implementation | |
| US9560080B2 (en) | Extending organizational boundaries throughout a cloud architecture | |
| WO2009032511A2 (en) | Transferable restricted security tokens | |
| CN103563294A (en) | Authentication and authorization methods for cloud computing platform security | |
| Aramide | Decentralized identity for secure network access: A blockchain-based approach to user-centric authentication | |
| Kyriakidou et al. | Decentralized identity with applications to security and privacy for the internet of things | |
| CN116707849A (en) | Method for setting cloud service access rights and cloud management platform for enclave instances | |
| Huang et al. | A novel zero-trust identity framework for agentic AI: Decentralized authentication and fine-grained access control | |
| Yousefnezhad et al. | Authentication and access control for open messaging interface standard | |
| Ghosh et al. | Securing loosely-coupled collaboration in cloud environment through dynamic detection and removal of access conflicts | |
| Marillonnet et al. | An Efficient User‐Centric Consent Management Design for Multiservices Platforms | |
| Khalil et al. | IoT-MAAC: Multiple attribute access control for IoT environments | |
| Mangiuc | Cloud identity and access management–A model proposal | |
| KR102317717B1 (en) | Internet of things service access control system and method using smart contract based on tangle network | |
| Rosado et al. | Security services architecture for secure mobile grid systems | |
| Amdouni et al. | Exploring the flexibility of network access control in the recursive InterNetwork Architecture | |
| Craß et al. | A decentralized access control model for dynamic collaboration of autonomous peers | |
| Copeland et al. | Reduce cyber security vulnerabilities: Identity layer | |
| Xiao et al. | A review of geni authentication and access control mechanisms | |
| Yahya et al. | Cloud MA-MOrBAC: A Cloud Distributed Access Control Model Based on Mobile Agents. | |
| Fotiou et al. | Relationship-based Access Control for Data Spaces | |
| Huang et al. | Agentic AI Identity Security | |
| Tapas | Toward trustless internet of things: a blockchain-based approach |