SEPD: An Access Control Model for Resource Sharing in an IoT Environment

@inproceedings{Pereira2019SEPDAA,
  title={SEPD: An Access Control Model for Resource Sharing in an IoT Environment},
  author={Henrique G. G. Pereira and Philip W. L. Fong},
  booktitle={ESORICS},
  year={2019}
}
In an open Internet-of-Things (IoT) environment, the chance encounters of smart devices have made it difficult to articulate access control policies for complete strangers. Based on the metaphor of public sphere, the access control model SEPD is proposed to ease policy administration and facilitate trust inspiration for IoT devices. We articulate a system architecture for SEPD, and offer an in-depth study of its access control policies, known as presence policies. In particular, we characterize… 
A Survey on Recent Advanced Research of CPS Security
TLDR
An overview of the CPS security studies from the last five years and 142 related works from A- or B-level conferences/journals recommended by the China Computer Federation are provided to show the current worldwide CPS security research situation.

References

SHOWING 1-10 OF 44 REFERENCES
HCAP: A History-Based Capability System for IoT Devices
TLDR
A history-based capability system, HCAP, for enforcing permission sequencing constraints in a distributed authorization environment is proposed, and security guarantees are formally established, and empirically evaluate its performance.
Access control in the Internet of Things: a survey of existing approaches and open research questions
TLDR
Future directions for research on access control for the IoT are provided: scalability, heterogeneity, openness and flexibility, identity of objects, personal data handling, dynamic access control policies, and usable security.
Access Control in Internet of Things: A Survey
TLDR
This paper presents an overview of the existing work on trust computing, access control models and systems in IoT, which not only summarizes the latest research progress, but also provides an understanding of the limitations and open issues of theexisting work.
Securing Home IoT Environments with Attribute-Based Access Control
TLDR
The NIST Next Generation Access Control (NGAC) specification is considered for ABAC requirements because of several reasons, including its support for adaptive policies, efficiency, and ease of policy management.
LRBAC: A Location-Aware Role-Based Access Control Model
TLDR
This paper shows how the Role-Based Access Control (RBAC) model can be extended to incorporate the notion of location and how this location information can be used to determine whether a subject has access to a given object.
A Survey on Security and Privacy Issues in Internet-of-Things
TLDR
This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars
TLDR
A formalized dynamic groups and attribute-based access control (ABAC) model for smart cars ecosystem, where the model not only considers system wide attributes-based security policies but also takes into account the individual user privacy preferences for allowing or denying service notifications, alerts and operations to on-board resources.
Benefits of Location-Based Access Control: A Literature Study
  • A. V. Cleeff, W. Pieters, R. Wieringa
  • Computer Science
    2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
  • 2010
TLDR
A theoretical framework for LBAC evaluation is proposed, based on goals, systems and context, and criteria for evaluating the usefulness of an LBAC system are formulated and applied.
Relationship-based access control: protection model and policy language
TLDR
This work formulate an archetypical ReBAC model to capture the essence of the paradigm, that is, authorization decisions are based on the relationship between the resource owner and the resource accessor in a social network maintained by the protection system.
...
1
2
3
4
5
...