Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies 2022
DOI: 10.1145/3532105.3535020
|View full text |Cite
|
Sign up to set email alerts
|

BlueSky

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…Zero trust in IoT Resource-constrained IoT devices connected to the network are ubiquitous today, which motivates the integration of IoT and cloud services, but also expands the attack surface (Ameer et al 2022;Refaey et al 2019). The security of IoT devices, network architecture and resource is the primary issues to successfully implement zero trust in IoT in real practice.…”
Section: Analyzing Key Research Hotspots and Future Trends For Zero T...mentioning
confidence: 99%
See 1 more Smart Citation
“…Zero trust in IoT Resource-constrained IoT devices connected to the network are ubiquitous today, which motivates the integration of IoT and cloud services, but also expands the attack surface (Ameer et al 2022;Refaey et al 2019). The security of IoT devices, network architecture and resource is the primary issues to successfully implement zero trust in IoT in real practice.…”
Section: Analyzing Key Research Hotspots and Future Trends For Zero T...mentioning
confidence: 99%
“…Zero trust security is based on the principle of "never trust, always verify" (Adahman et al 2022), which means that no implicit trust is given to assets or user accounts just because of their physical or network location (Ameer et al 2022). A zero trust architecture will not grant access to resources unless the user/device, asset, or workload is confirmed through a robust authentication and authorization process (Piya et al 2021).…”
Section: Introductionmentioning
confidence: 99%
“…IoT devices often operate in dynamic environments where access requirements change based on context [18]. Adapting to these changes in real-time, especially with constrained computational resources, necessitates efficient and lightweight access control algorithms.…”
Section: Limited Computational Resourcesmentioning
confidence: 99%