Smart cities require new access control models for Internet of Things (IoT) devices that preserve user privacy while guaranteeing scalability and efficiency. Researchers believe that anonymous access can protect the private information even if the private information is not stored in authorization organization. Many attribute-based access control (ABAC) models that support anonymous access expose the attributes of the subject to the authorization organization during the authorization process, which allows the authorization organization to obtain the attributes of the subject and infer the identity of the subject. The ABAC with anonymous access proposed in this paper called ABSAC strengthens the identity-less of ABAC by combining homomorphic...
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect...
As an important method of protecting data confidentiality in the Internet of Things (IoT), access co...
Abstract. Recently, there has been considerable interest in attribute based access control (ABAC) to...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
Attribute-based access control (ABAC) is a very powerful and flexible security technique making it p...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Th...
The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and ...
Sharing of information is fundamental to modern computing environments across many application domai...
The area of smart homes is one of the most popular for deploying smart connected devices. One of the...
2021 Summer.Includes bibliographical references.Attribute-Based Access Control (ABAC) is a methodolo...
A Grid community is composed of diverse stake holders, such as data resource providers, computing re...
Nowadays, fog computing provides computation, storage, and application services to end users in the ...
Attribute-based access control (ABAC) is a new generation of access control techniques. It enables f...
In this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PA...
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect...
As an important method of protecting data confidentiality in the Internet of Things (IoT), access co...
Abstract. Recently, there has been considerable interest in attribute based access control (ABAC) to...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
Attribute-based access control (ABAC) is a very powerful and flexible security technique making it p...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Th...
The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and ...
Sharing of information is fundamental to modern computing environments across many application domai...
The area of smart homes is one of the most popular for deploying smart connected devices. One of the...
2021 Summer.Includes bibliographical references.Attribute-Based Access Control (ABAC) is a methodolo...
A Grid community is composed of diverse stake holders, such as data resource providers, computing re...
Nowadays, fog computing provides computation, storage, and application services to end users in the ...
Attribute-based access control (ABAC) is a new generation of access control techniques. It enables f...
In this paper, we propose an accountable privacy preserving attribute-based framework, called Ins-PA...
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect...
As an important method of protecting data confidentiality in the Internet of Things (IoT), access co...
Abstract. Recently, there has been considerable interest in attribute based access control (ABAC) to...