Security Analysis of Access Control Policies for Smart Homes
Abstract
Supplemental Material
- Download
- 18.93 MB
References
Index Terms
- Security Analysis of Access Control Policies for Smart Homes
Recommendations
An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed SystemsRole-based access control (RBAC) is a widely-used protocol to design and build an access control for providing the system security regarding authorization. Even though in the context of internet resources access, the authentication and access control ...
Authentication-enabled attribute-based access control for smart homes
AbstractSmart home technologies constantly bring significant convenience to our daily lives. Unfortunately, increased security risks accompany this convenience. There can be severe consequences when unauthorized or malicious users gain access to smart ...
A flexible hierarchical access control mechanism enforcing extension policies
Some specific information or resources only can be accessed by authorized users. Discretionary access control DAC, mandatory access control MAC, and role-based access control RBAC are three main classes of access control policies. MAC and RBAC are more ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Silvio Ranise,
- Program Chairs:
- Roberto Carbone,
- Daniel Takabi
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Data Availability
Funding Sources
- European Union ? Next Generation EU - PNRR MUR
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 128Total Downloads
- Downloads (Last 12 months)43
- Downloads (Last 6 weeks)2
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in