The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last decade, online social networks have seen a boom with respect to the use and applications. Many users upload large quantity of data that may risk the data security and access control. Trust-based access control strategy was used initially for the owner and his friends in order to restrict the data access using a well defined Trust Rule. The paper has implemented trust-based access control...
The Future Internet (FI) sees the world of objects completely connected over the Internet constantly. A well-managed identity management system should provide necessary tools for controlling user access and access to critical information. In this paper we quote the proposed architecture from our previous work that provides a solution to the discussed issues and derive a mathematical model for the...
Delegation is required to access the critical information when an authorized user is unavailable. It provides flexibility to access control. Different mechanisms are introduced for delegation in previous work, but some of them require the user to be present while performing delegation. To overcome such explicit delegation, auto-delegation is introduced. The decision theory based auto-delegation (DTA-d)...
Internet of things (IoT) is an emerging paradigm where the devices around us (persistent and non-persistent) are connected to each other to provide seamless communication, and contextual services. In the IoT, each device cannot be authenticated in the short time due to unbounded number of devices. Equally, it is difficult to get receipt of their authentication request at the same time. Therefore,...
Key management using public key cryptography is less preferable due to several limitations like relatively high computation cost, encryption of preferably short messages, complex encryption-decryption algorithms etc. So we resort to private key management technique. In order to exchange messages between nodes in a Wireless Network, secret shared cryptographic keys must be established between the nodes...
In the Internet of thing (IoT), the activities of daily life are supported by a multitude of heterogeneous, loosely coupled ubiquitous devices. Traditional access control model are not suitable to the nomadic, decentralized and dynamic scenarios in the IoT where identities are not known in advance. This makes the trust management in IoT more promising to address the access control issues .This paper...
Mobile technology and Internet is becoming an integral part of our daily life. Various transactions like shopping, ticket booking and banking transactions have been done on the fly. The technology like Smartphone adds portability for these activities. To manage information and applications on Smartphone, user must provide credentials or profiles to service provider with their details filled by logging...
Internet of Things (IoT) is becoming integral and mandatory part of everyday life. Scalability and manageability is intimidating due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is important to establish secure communication between multiple devices and services. In this paper, the concept of capability for access control is introduced where...
Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay and denial of service attacks, the concept of capability for access control is introduced. This paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.