Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an efficient access control model for the IoT require selecting an appropriate access policy language to implement access policies. Therefore, this paper presents an overview of most common access policy languages. It starts with discussing different access ...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
International audienceOne of the most interesting paradigms of Ambient Intelligence is that networks...
Empirical thesis.Bibliography: pages 263-311.1. Introduction -- 2. Background and related work -- 3....
Pervasive computing and Internet of Things (IoT) have recently received considerable interest to dep...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
International audienceThe MQTT (Message Queuing Telemetry Transport) protocol has become the main pr...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
The Internet of Things (IoT), smart sensors and mobile wearable devices are helping to provide healt...
Internet of Things (IoT) provides a wide range of services in domestic and industrial environments. ...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Policy languages have become the most common way to protect the online resources from unauthorized a...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
International audienceOne of the major challenges of the Internet of Things (IoT) involves the limit...
Abstract. Social Networks, as the main axis of Web 2.0, are creating a number of interesting challen...
The OASIS XACML standard emerged as a pure declarative language allowing to express access control. ...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
International audienceOne of the most interesting paradigms of Ambient Intelligence is that networks...
Empirical thesis.Bibliography: pages 263-311.1. Introduction -- 2. Background and related work -- 3....
Pervasive computing and Internet of Things (IoT) have recently received considerable interest to dep...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
International audienceThe MQTT (Message Queuing Telemetry Transport) protocol has become the main pr...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
The Internet of Things (IoT), smart sensors and mobile wearable devices are helping to provide healt...
Internet of Things (IoT) provides a wide range of services in domestic and industrial environments. ...
With the widespread use of web services, there is a need for adequate security and privacy support t...
Policy languages have become the most common way to protect the online resources from unauthorized a...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
International audienceOne of the major challenges of the Internet of Things (IoT) involves the limit...
Abstract. Social Networks, as the main axis of Web 2.0, are creating a number of interesting challen...
The OASIS XACML standard emerged as a pure declarative language allowing to express access control. ...
Part 2: Security, Access Control and Intrusion DetectionInternational audienceUsage control model (U...
International audienceOne of the most interesting paradigms of Ambient Intelligence is that networks...
Empirical thesis.Bibliography: pages 263-311.1. Introduction -- 2. Background and related work -- 3....