2023
DOI: 10.1109/tdsc.2022.3216297
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Approaches (ABAC and RBAC) Toward Secure Access Control in Smart Home IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 68 publications
0
5
0
Order By: Relevance
“…In a groundbreaking study [15] uses a hybrid method, namely the EGRBAC (RBAC) and HABAC (ABAC) models in smart home IoT. Where the research combines two methods based on role-centric and attribute-centric approaches in model building which produces HyBACRC and HyBACAC.…”
Section: Extensible Access Control Markup (Xacml)mentioning
confidence: 99%
See 2 more Smart Citations
“…In a groundbreaking study [15] uses a hybrid method, namely the EGRBAC (RBAC) and HABAC (ABAC) models in smart home IoT. Where the research combines two methods based on role-centric and attribute-centric approaches in model building which produces HyBACRC and HyBACAC.…”
Section: Extensible Access Control Markup (Xacml)mentioning
confidence: 99%
“…Both RBAC and ABAC have their own advantages and disadvantages in big corporate applications. Therefore, there is a requirement for a hybrid access control model that combines the strengths of both models [15] [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The study [38], evaluates the proposed approach on a prototype smart home system and demonstrates its effectiveness in preventing unauthorized access and ensuring data privacy. The workflow primarily consists of four phases.…”
Section: A System Design and Architecturementioning
confidence: 99%
“…Technologies such as access control, encryption, and blockchain are fortunately capable of addressing the challenges faced by IoT data sharing. Access control stands out as a leading technology for securing IoT data, permitting users to access data within specified limits, legally [7][8][9]. It is widely recognized that conventional access control models provide only broad and coarse-grained access control, rendering them inadequate for the typical open environments of the IoT.…”
Section: Introductionmentioning
confidence: 99%