메뉴 건너뛰기




Volumn 2018-March, Issue , 2018, Pages 253-260

XACML for building access control policies in internet of things

Author keywords

Access Control; Access Policies; Adrbac; Internet of Things; Policy Language; XACML

Indexed keywords

BIG DATA; INTERNET OF THINGS;

EID: 85047877972     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.5220/0006725102530260     Document Type: Conference Paper
Times cited : (48)

References (37)
  • 3
  • 6
    • 85030858737 scopus 로고    scopus 로고
    • Comparative Study on CBIR based on Color Feature
    • Atlam, H.F., Attiya, G., El-Fishawy, N., 2013. Comparative Study on CBIR based on Color Feature. Int. J. Comput. Appl. 78, 975–8887.
    • (2013) Int. J. Comput. Appl. , vol.78 , pp. 975-8887
    • Atlam, H.F.1    Attiya, G.2    El-Fishawy, N.3
  • 7
    • 85047859070 scopus 로고    scopus 로고
    • Integration of Color and Texture Features in CBIR System
    • Atlam, H.F., Attiya, G., El-Fishawy, N., 2017d. Integration of Color and Texture Features in CBIR System. Int. J. Comput. Appl. 164, 23–28.
    • (2017) Int. J. Comput. Appl. , vol.164 , pp. 23-28
    • Atlam, H.F.1    Attiya, G.2    El-Fishawy, N.3
  • 10
    • 85047891952 scopus 로고    scopus 로고
    • Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies
    • Bugiel, S., Heuser, S., Sadeghi, A.-R., 2013. Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies. Proc. 22nd USENIX Secur. Symp. 131–146.
    • (2013) Proc. 22nd USENIX Secur. Symp. , pp. 131-146
    • Bugiel, S.1    Heuser, S.2    Sadeghi, A.-R.3
  • 13
    • 33947625881 scopus 로고    scopus 로고
    • Assessment of access control systems
    • Hu, V.C.V., Ferraiolo, D.F., Kuhn, D.R., 2006. Assessment of access control systems. Nistir 7316 60.
    • (2006) Nistir , vol.7316 , pp. 60
    • Hu, V.C.V.1    Ferraiolo, D.F.2    Kuhn, D.R.3
  • 16
    • 85051963924 scopus 로고    scopus 로고
    • Understanding XACML policy langauge
    • Jayasekara, A., 2011. Understanding XACML policy langauge. Int. J. Inf. Technol. 35–68.
    • (2011) Int. J. Inf. Technol. , pp. 35-68
    • Jayasekara, A.1
  • 17
    • 84873425163 scopus 로고    scopus 로고
    • A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
    • Jin, X., Krishnan, R., Sandhu, R.S., 2012. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. DBSec 12, 41–55.
    • (2012) DBSec , vol.12 , pp. 41-55
    • Jin, X.1    Krishnan, R.2    Sandhu, R.S.3
  • 18
    • 15944413918 scopus 로고    scopus 로고
    • Context sensitivity in role-based access control
    • Kumar, A., Karnik, N.M., Chafle, G., 2002. Context sensitivity in role-based access control. Oper. Syst. Rev. 36, 53–66.
    • (2002) Oper. Syst. Rev. , vol.36 , pp. 53-66
    • Kumar, A.1    Karnik, N.M.2    Chafle, G.3
  • 20
    • 84887579599 scopus 로고    scopus 로고
    • XACML and risk-aware access control
    • T.J.N
    • Liang Chen, Luca Gasparini, and T.J.N., 2013. XACML and risk-aware access control. In: Proc. ICEIS,. pp. 66–75.
    • (2013) Proc. ICEIS , pp. 66-75
    • Chen, L.1    Gasparini, L.2
  • 24
    • 85002424663 scopus 로고    scopus 로고
    • Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things
    • N. P. Mahalle, , Anggorojati, B., Prasad, N.R., Prasad, R., 2013. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things. J. Cyber Secur. Mobil. 1, 309–348.
    • (2013) J. Cyber Secur. Mobil. , vol.1 , pp. 309-348
    • Mahalle, N.P.1    Anggorojati, B.2    Prasad, N.R.3    Prasad, R.4
  • 28
    • 84855407965 scopus 로고    scopus 로고
    • A Survey on Access Control Deployment
    • Suhendra, V., 2011. A Survey on Access Control Deployment. Commun. Comput. Inf. Sci. 11–20.
    • (2011) Commun. Comput. Inf. Sci. , pp. 11-20
    • Suhendra, V.1
  • 30
    • 84875664448 scopus 로고    scopus 로고
    • Access Control Policies and Languages in Open Environments
    • S.D.C. S, F., S, J., S, Springer, Boston, MA
    • Vimercati di, S S.D.C. S, F., S, J., P., S., 2007. Access Control Policies and Languages in Open Environments. In: Advances in Information Security. Springer, Boston, MA, pp. 21–58.
    • (2007) Advances in Information Security , pp. 21-58
    • Vimercati di, S.1
  • 33
    • 84905122477 scopus 로고    scopus 로고
    • Secure administration of cryptographic role-based access control for large-scale cloud storage systems
    • Zhou, L., Varadharajan, V., Hitchens, M., 2014a. Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J. Comput. Syst. Sci. 80, 1518–1533.
    • (2014) J. Comput. Syst. Sci. , vol.80 , pp. 1518-1533
    • Zhou, L.1    Varadharajan, V.2    Hitchens, M.3
  • 34
    • 84905122477 scopus 로고    scopus 로고
    • Secure administration of cryptographic role-based access control for large-scale cloud storage systems
    • Zhou, L., Varadharajan, V., Hitchens, M., 2014b. Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J. Comput. Syst. Sci. 80, 1518–1533.
    • (2014) J. Comput. Syst. Sci. , vol.80 , pp. 1518-1533
    • Zhou, L.1    Varadharajan, V.2    Hitchens, M.3
  • 35
    • 85051984293 scopus 로고    scopus 로고
    • A Practical Mandatory Access Control Model for XML Databases A Practical Mandatory Access Control Model for XML Databases
    • Zhu, H., Jin, R., 2007. A Practical Mandatory Access Control Model for XML Databases A Practical Mandatory Access Control Model for XML Databases. In: 2nd International Conference: Scalable Information Systems. pp. 1–4.
    • (2007) 2nd International Conference: Scalable Information Systems , pp. 1-4
    • Zhu, H.1    Jin, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.