2018
DOI: 10.1109/jsyst.2015.2450313
|View full text |Cite
|
Sign up to set email alerts
|

Policy-Controlled Authenticated Access to LLN-Connected Healthcare Resources

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 36 publications
0
12
0
Order By: Relevance
“…To this end, the integration of XSACd with the work we presented in [32], will be investigated in the future.…”
Section: Discussionmentioning
confidence: 99%
“…To this end, the integration of XSACd with the work we presented in [32], will be investigated in the future.…”
Section: Discussionmentioning
confidence: 99%
“…The policies are securely maintained at the framework's back-end framework, which is installed on a laptop. Furthermore, we use the lightweight cryptographic library (ULCL) [71] to develop a service for secure storage. This service encrypts information at the device-end to safeguard data from disclosure in case where the equipment gets compromised.…”
Section: Motivating Examplementioning
confidence: 99%
“…The RBAC model lacks support for time and location constraints. Towards this end, researchers have developed new models to accommodate spatio-temporal requirements [3,5,7,9]. The Generalized Spatio-Temporal Role-Based Access Control model (GSTRBAC) is an extension of RBAC [1] that integrates time and location into authorization decisions.…”
Section: Introductionmentioning
confidence: 99%