SEPD: An Access Control Model for Resource Sharing in an IoT Environment
@inproceedings{Pereira2019SEPDAA, title={SEPD: An Access Control Model for Resource Sharing in an IoT Environment}, author={Henrique G. G. Pereira and Philip W. L. Fong}, booktitle={ESORICS}, year={2019} }
In an open Internet-of-Things (IoT) environment, the chance encounters of smart devices have made it difficult to articulate access control policies for complete strangers. Based on the metaphor of public sphere, the access control model SEPD is proposed to ease policy administration and facilitate trust inspiration for IoT devices. We articulate a system architecture for SEPD, and offer an in-depth study of its access control policies, known as presence policies. In particular, we characterize…
One Citation
A Survey on Recent Advanced Research of CPS Security
- Computer ScienceApplied Sciences
- 2021
An overview of the CPS security studies from the last five years and 142 related works from A- or B-level conferences/journals recommended by the China Computer Federation are provided to show the current worldwide CPS security research situation.
References
SHOWING 1-10 OF 44 REFERENCES
HCAP: A History-Based Capability System for IoT Devices
- Computer ScienceSACMAT
- 2018
A history-based capability system, HCAP, for enforcing permission sequencing constraints in a distributed authorization environment is proposed, and security guarantees are formally established, and empirically evaluate its performance.
Security, privacy and trust in Internet of Things: The road ahead
- Computer ScienceComput. Networks
- 2015
Access control in the Internet of Things: a survey of existing approaches and open research questions
- Computer ScienceAnn. des Télécommunications
- 2019
Future directions for research on access control for the IoT are provided: scalability, heterogeneity, openness and flexibility, identity of objects, personal data handling, dynamic access control policies, and usable security.
Access Control in Internet of Things: A Survey
- Computer ScienceArXiv
- 2016
This paper presents an overview of the existing work on trust computing, access control models and systems in IoT, which not only summarizes the latest research progress, but also provides an understanding of the limitations and open issues of theexisting work.
Securing Home IoT Environments with Attribute-Based Access Control
- Computer Science
- 2018
The NIST Next Generation Access Control (NGAC) specification is considered for ABAC requirements because of several reasons, including its support for adaptive policies, efficiency, and ease of policy management.
LRBAC: A Location-Aware Role-Based Access Control Model
- Computer ScienceICISS
- 2006
This paper shows how the Role-Based Access Control (RBAC) model can be extended to incorporate the notion of location and how this location information can be used to determine whether a subject has access to a given object.
A Survey on Security and Privacy Issues in Internet-of-Things
- Computer ScienceIEEE Internet of Things Journal
- 2017
This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars
- Computer ScienceCODASPY
- 2019
A formalized dynamic groups and attribute-based access control (ABAC) model for smart cars ecosystem, where the model not only considers system wide attributes-based security policies but also takes into account the individual user privacy preferences for allowing or denying service notifications, alerts and operations to on-board resources.
Benefits of Location-Based Access Control: A Literature Study
- Computer Science2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
- 2010
A theoretical framework for LBAC evaluation is proposed, based on goals, systems and context, and criteria for evaluating the usefulness of an LBAC system are formulated and applied.
Relationship-based access control: protection model and policy language
- Computer ScienceCODASPY '11
- 2011
This work formulate an archetypical ReBAC model to capture the essence of the paradigm, that is, authorization decisions are based on the relationship between the resource owner and the resource accessor in a social network maintained by the protection system.