2015
DOI: 10.1093/jigpal/jzv045
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…Malik et al have focused on IoT-based traditional access control and social network systems [61]. is author recommends some critical issues for access control systems; the access control systems must be dynamic and proficient in changing the access authorizations at runtime based on requirements [61,62]. It should be fine-grained to secure sensitive and private resources [52,61].…”
Section: Related Workmentioning
confidence: 99%
“…Malik et al have focused on IoT-based traditional access control and social network systems [61]. is author recommends some critical issues for access control systems; the access control systems must be dynamic and proficient in changing the access authorizations at runtime based on requirements [61,62]. It should be fine-grained to secure sensitive and private resources [52,61].…”
Section: Related Workmentioning
confidence: 99%
“…High level rules/conditions of access rights must be allowed by the access control models for better management of increased complexity [11]. • Access control models should be dynamic; it should be able to modify the policies at runtime according to the requirements [14].…”
mentioning
confidence: 99%