2020 International Wireless Communications and Mobile Computing (IWCMC) 2020
DOI: 10.1109/iwcmc48107.2020.9148090
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Access Control Policies for IoT Deployments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…Typically, the policies are stored in a specific format, for example, Extensible Access Control Markup Language (XACML). In addition, the PAP makes the complete access control policies available for the policy decision point to grant or deny permissions [ 32 , 33 ]. In an IoT environment, PAP should be designed so that policies can be added, removed or modified at runtime.…”
Section: Access Control Authorization Architecturementioning
confidence: 99%
See 4 more Smart Citations
“…Typically, the policies are stored in a specific format, for example, Extensible Access Control Markup Language (XACML). In addition, the PAP makes the complete access control policies available for the policy decision point to grant or deny permissions [ 32 , 33 ]. In an IoT environment, PAP should be designed so that policies can be added, removed or modified at runtime.…”
Section: Access Control Authorization Architecturementioning
confidence: 99%
“…Once the evaluation is performed at the PDP, the PEP retrieves the decision and forwards it to the subject that made the request. Moreover, based on the decision, the PEP is responsible for enforcing the actions that the subject can perform on a resource (e.g., read, write or both) [ 32 , 34 , 35 ].…”
Section: Access Control Authorization Architecturementioning
confidence: 99%
See 3 more Smart Citations