2020
DOI: 10.3390/s20102960
|View full text |Cite
|
Sign up to set email alerts
|

RESPOnSE—A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments

Abstract: The enforcement of fine-grained access control policies in constrained dynamic networks can become a challenging task. The inherit constraints present in those networks, which result from the limitations of the edge devices in terms of power, computational capacity and storage, require an effective and efficient access control mechanism to be in place to provide suitable monitoring and control of actions and regulate the access over the resources. In this article, we present RESPOnSE, a framework for the speci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 63 publications
(68 reference statements)
0
2
0
Order By: Relevance
“…Next, the AHP method appears, with 21 occurrences [6, 49-52, 55, 62, 64, 66, 67, 71, 77, 84, 90, 106, 121, 123, 127, 129, 134, 135]. In the third place, the fuzzy method [55, 58, 63, 72, 77, 87, 89-91, 96, 101, 114, 122, 124, 127, 129, 134] and TOPSIS method [50,51,55,59,67,80,84,90,97,103,104,108,118,125,127,129,134], with 17 occurrences each. In addition to those mentioned, the methods of the PROMETHEE family stand out with 9 occurrences [52,77,88,89,93,94,97,115,133].…”
Section: Figure 11 Word Cloudmentioning
confidence: 99%
“…Next, the AHP method appears, with 21 occurrences [6, 49-52, 55, 62, 64, 66, 67, 71, 77, 84, 90, 106, 121, 123, 127, 129, 134, 135]. In the third place, the fuzzy method [55, 58, 63, 72, 77, 87, 89-91, 96, 101, 114, 122, 124, 127, 129, 134] and TOPSIS method [50,51,55,59,67,80,84,90,97,103,104,108,118,125,127,129,134], with 17 occurrences each. In addition to those mentioned, the methods of the PROMETHEE family stand out with 9 occurrences [52,77,88,89,93,94,97,115,133].…”
Section: Figure 11 Word Cloudmentioning
confidence: 99%
“…In the first paper of the special issue [ 1 ], entitled “RESPOnSE—A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments”, Michailidou et al address the problem of enforcing fine-grained access control policies in constrained dynamic networks. They propose the RESPOnSE framework, in which the computational burden is transferred to high-tier nodes, while low-tier nodes apply risk-aware policy enforcement.…”
Section: Contributionsmentioning
confidence: 99%
“…In the first paper of the special issue [1], entitled "RESPOnSE-A Framework for Enforcing Risk-Aware Security Policies in Constrained Dynamic Environments", Michailidou et al address the problem of enforcing fine-grained access control policies in constrained dynamic networks.…”
Section: Contributionsmentioning
confidence: 99%