2018
DOI: 10.1109/jiot.2018.2864300
|View full text |Cite
|
Sign up to set email alerts
|

On the Design of a Decentralized and Multiauthority Access Control Scheme in Federated and Cloud-Assisted Cyber-Physical Systems

Abstract: While enabling brand new services and opportunities, the federation of vertical Internet of Things platforms presents new challenges in terms of secure and controlled access to heterogeneous resources, especially when authorization permissions must be regulated by multiple decentralized authorities. The work presented herein designs, develops, and experimentally validates a flexible and effective Attribute-Based Access Control framework, properly devised to operate in a federated and cloudassisted Cyber-Physic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 26 publications
(20 citation statements)
references
References 39 publications
0
18
0
Order By: Relevance
“…In distributed cybersecurity frameworks identity management and access control capabilities are of great importance, to verify the authenticity of any physical and logical entity belonging to the whole architecture and verify the authorization to accessing to heterogeneous resources and services distributed and deployed across different organizations. The most representative works on this topic can be found in [12,16,18,22,37,40,43,47,48].…”
Section: State Of the Art On Cyber-security Frameworkmentioning
confidence: 99%
See 2 more Smart Citations
“…In distributed cybersecurity frameworks identity management and access control capabilities are of great importance, to verify the authenticity of any physical and logical entity belonging to the whole architecture and verify the authorization to accessing to heterogeneous resources and services distributed and deployed across different organizations. The most representative works on this topic can be found in [12,16,18,22,37,40,43,47,48].…”
Section: State Of the Art On Cyber-security Frameworkmentioning
confidence: 99%
“…In RBAC, access rights are based on roles and privileges of the users. Starting from the ABAC logic, other approaches aim to solve the access control problem through cryptographic mechanisms [18,37,47,48].…”
Section: State Of the Art On Cyber-security Frameworkmentioning
confidence: 99%
See 1 more Smart Citation
“…It should be understood, however, that an aider need not be a singular entity. The notion of federated IoT, for example, captures an operational mode that lends itself naturally to security, e.g., [ 34 ]. Through such a view, both thing/entity and aider become dually physical and logical.…”
Section: Remarks On Some Open Issuesmentioning
confidence: 99%
“…The results also indicated the interaction between message latency and aiding effectiveness. Indeed, considerations for IoT security cannot be made in isolation of other cyber or physical phenomena with which it interacts [34]. This further spans to physical consideration within the cyber modules, e.g., processor overheating or actuation failure [37].…”
Section: The (Cyber-physical) Systems Viewmentioning
confidence: 99%