2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) 2018
DOI: 10.1109/compsac.2018.10306
|View full text |Cite
|
Sign up to set email alerts
|

Access Control Model for IoT Environment Including Automated Configuration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…If the attribute information is correctly granted, the ABAC model can handle the increasing number of access control entities and changes in the attribute information. By performing the automated configuration of the IoT devices based on the ABAC model, it is possible to efficiently manage access control in largescale IoT environments [6].…”
Section: Related Work 21 Access Controlmentioning
confidence: 99%
See 3 more Smart Citations
“…If the attribute information is correctly granted, the ABAC model can handle the increasing number of access control entities and changes in the attribute information. By performing the automated configuration of the IoT devices based on the ABAC model, it is possible to efficiently manage access control in largescale IoT environments [6].…”
Section: Related Work 21 Access Controlmentioning
confidence: 99%
“…A query language or policy description language such as extensible access control markup language [19], can be used to describe the access policy. The detailed approach of automated registration of clients and services and the access control based on the attribute information in the IoT environment have been studied in our previous work [6].…”
Section: Access Policy Configurationmentioning
confidence: 99%
See 2 more Smart Citations