“…π πππ· ππ£π = π¦ β π=1 πΎ π ππ· ππ (10) Step Six (Ranking): ''The scores obtained are based on the π ππ π· ππ£π & π πππ· ππ£π , which are calculated using the rated methods specified in Eqs. (11) and (12), respectively''.…”
Section: Analysis Of the Suggested Schemesmentioning
confidence: 99%
“…In Eqs. (11) and ( 12) are utilized to compute the π πππ· ππ£π and π(π πππ· ππ£π ). After performing defuzzification on the evaluation score, the alternatives were ranked using Eq.…”
Section: π(π ππ π·mentioning
confidence: 99%
“…This model offers a fundamental level of safety [10]. Users' permissions are delegated to them in accordance with their roles within a system using the (RBAC) model [11]. Access decisions are made based on the relationships between roles and permissions and between users and roles.…”
Section: Introductionmentioning
confidence: 99%
“…This model offers a fundamental level of safety [10]. Users' permissions are delegated to them in accordance with their roles within a system using the (RBAC) model [11]. Access control models, including RBAC, tend to have lower management efficiency when it comes to the complex requirements of IoT systems.…”
Section: Introductionmentioning
confidence: 99%
“…This highlights the need for alternative access control models better suited to IoT environments' dynamic and expansive nature. Implementing detailed access control scenarios in these models is challenging while simultaneously applying the principle of least privilege [11]. Nevertheless, the IoT requires an access control model that is dynamic, fine-grained and goes beyond user-centricity.…”
“…π πππ· ππ£π = π¦ β π=1 πΎ π ππ· ππ (10) Step Six (Ranking): ''The scores obtained are based on the π ππ π· ππ£π & π πππ· ππ£π , which are calculated using the rated methods specified in Eqs. (11) and (12), respectively''.…”
Section: Analysis Of the Suggested Schemesmentioning
confidence: 99%
“…In Eqs. (11) and ( 12) are utilized to compute the π πππ· ππ£π and π(π πππ· ππ£π ). After performing defuzzification on the evaluation score, the alternatives were ranked using Eq.…”
Section: π(π ππ π·mentioning
confidence: 99%
“…This model offers a fundamental level of safety [10]. Users' permissions are delegated to them in accordance with their roles within a system using the (RBAC) model [11]. Access decisions are made based on the relationships between roles and permissions and between users and roles.…”
Section: Introductionmentioning
confidence: 99%
“…This model offers a fundamental level of safety [10]. Users' permissions are delegated to them in accordance with their roles within a system using the (RBAC) model [11]. Access control models, including RBAC, tend to have lower management efficiency when it comes to the complex requirements of IoT systems.…”
Section: Introductionmentioning
confidence: 99%
“…This highlights the need for alternative access control models better suited to IoT environments' dynamic and expansive nature. Implementing detailed access control scenarios in these models is challenging while simultaneously applying the principle of least privilege [11]. Nevertheless, the IoT requires an access control model that is dynamic, fine-grained and goes beyond user-centricity.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citationsβcitations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.