The Research of Access Control Based on UCON in the Internet of Things

  title={The Research of Access Control Based on UCON in the Internet of Things},
  author={Guoping Zhang and Wentao Gong},
  journal={J. Softw.},
In this paper, we introduce the internet of things and related architecture and protocols, and the family of usage control (UCON) models, which integrate authorizations (A), obligations (B), and conditions (C). The UCON is a generalization of access control to cover authorizations, obligations, conditions, continuity (ongoing controls), and mutability. In the internet of things' highly dynamic, distributed environment, obligations and conditions are also crucial decision factors for secure… 

Distributed Capability-based Access Control for the Internet of Things

The results obtained through the experiments demonstrate the feasibility of the proposed cryptographic solution against insider threats through a distributed capability-based access control, which allows the deployment of scenarios without the intervention of any intermediate entity.

Identity driven capability based access control (ICAC) scheme for the Internet of Things

Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related to the complexity and dynamics of device identities.

SmartOrBAC Enforcing security in the Internet of Things

This work proposes an authorization access model called SmartOrBAC built around a set of security and performance requirements that enhances the existing OrBAC (Organization-based Access Control) model and adapts it to IoT environments.

Access Control Schemes for Machine to Machine Communication in IoT: Comparative Analysis and Discussion

This paper has studied various access control policies implemented in a wide variety of applications but these mechanisms are unable to fulfill the requirement of Internet of Things (IoT) services.

Dynamic Team Access Control for Collaborative Internet of Things

A new access control model for IoT (Internet of Things), which is based on a dynamic approach, which provides fine-grained access control, supports the well-known least privileges principle and separation of duties for the team members.

Dynamic Access Control Framework for Internet of Things

This research introduces a holistic and dynamic access control framework for IoT environments that consists of an automatic and context-aware policy specification method, continuous policy enforcement mechanism and an adaptive policy adjustment technique.

Security and Privacy in the Internet of Things

This work proposes an authorization access model called SmartOrBAC built around a set of security and performance requirements and enhances the existing OrBAC (Organization-based Access Control) model and adapts it to IoT environments.

Enhanced dynamic team access control for collaborative Internet of Things using context

The enhanced dynamic team access control (EDTMAC) model introduces a formal theoretical model which relies on the top of the role‐based access control model and is flexible and scalable, user‐driven, reliable, and secure against unauthorized access requests.



Towards usage control models: beyond traditional access control

The concept of Usage Control (UCON) is developed that encompasses traditional access control, trust management, and digital rights management and goes beyond them in its definition and scope and offers a promising approach for the next generation of access control.

AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment

A hybrid model of an authentication technique and a role based access control (RBAC) based on X.509 public key certificate and attribute certificate is proposed and the full authentication, authorization, and accountability (AAA) are supported.

Formal model and analysis of usage control

A logical model of UCON is developed based on an extended version of Lamport's temporal logical of actions to formalize the state transitions in a single usage process and shows that preA is at least as expressive as the augmented typed access matrix model (ATAM).

Role-Based Access Control Models

Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.

The Research and Application of Resource Dissemination Based on Credibility and UCON

  • Feng-Yuan WangFei Wang
  • Computer Science
    2007 International Conference on Computational Intelligence and Security (CIS 2007)
  • 2007
This paper researched the access control in the dissemination of usage rights for digital information and realized an application system for resource dissemination in the open network environment and achieved the combinative application of the traditional access control, trust management and digital rights management covered in usage control.

Security architectures for controlled digital information dissemination

This work identifies eight application-level security architectures based on the following three elements: virtual machine, control set and distribution style and describes the architectures and compares their capabilities, merits and demerits.

Role-based authorization constraints specification

An intuitive formal language for specifying role-based authorization constraints named RCL 2000 including its basic elements, syntax, and semantics is introduced and it is shown that there are many alternate formulations of even the simplest SOD properties, with varying degree of flexibility and assurance.

Physical Access Control for Captured RFID Data

This work investigates peer-to-peer privacy for personal RFID data through an access-control policy called Physical Access Control, which protects privacy by constraining the data a user can obtain from the system to those events that occurred when and where that user was physically present.

Connecting Mobile Phones to the Internet of Things: A Discussion of Compatibility Issues Between EPC and NFC

This contribution investigates the drivers and barriers of a fusion of NFC and EPC technology, and discusses the resulting potential from a business perspective.

RFID security and privacy: a research survey

  • A. Juels
  • Business
    IEEE Journal on Selected Areas in Communications
  • 2006
This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.