Essays about: "Fine-grained access control"

Showing result 1 - 5 of 9 essays containing the words Fine-grained access control.

  1. 1. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  2. 2. Integration of Attribute-Based Encryption and IoT: An IoT Security Architecture

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Ziyad Elbanna; [2023]
    Keywords : Internet of things; Attribute based encryption; Fine-grained access control; Key revocation; Proxy re-encryption;

    Abstract : Services relying on internet of things (IoTs) are increasing day by day. IoT makes use of internet services like network connectivity and computing capability to transform everyday objects into smart things that can interact with users, and the environment to achieve a purpose they are designed for. READ MORE

  3. 3. User access control platform based on simple IoT household devices

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ruijie Xiao; [2021]
    Keywords : IoT; Smart Home; Multiuser; Multi-device; Access Control; IoT; Smart hem; Fleranvändare; Multi-enhet; Åtkomstkontroll;

    Abstract : The Internet of Things (IoT) industry has been thriving for the past few years, especially in the household field. The proposal of smart homes has enabled a increasing number of IoT products to enter people’s daily lives. However, the access control in smart homes has gradually grown up to be a prominent problem. READ MORE

  4. 4. Authorization Aspects of the Distributed Dataflow-oriented IoT Framework Calvin

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Tomas Nilsson; [2016]
    Keywords : Authorization; Attribute-Based Access Control; Calvin; Distributed Computing; Internet of Things; Technology and Engineering;

    Abstract : The evolution into a networked society, where a wide variety of devices are connected to the Internet, opens up many new opportunities for creating smart products and applications that dynamically adapt to the current environment. A common scenario will be that applications require or benefit from using several devices at the same time for the execution. READ MORE

  5. 5. Evaluation of Security in Hadoop

    University essay from KTH/Kommunikationsnät

    Author : Mahsa Tabatabaei; [2015]
    Keywords : Hadoop; security; Project Rhino; Project Sentry; splittable crypto codec;

    Abstract : There are different ways to store and process large amount of data. Hadoop iswidely used, one of the most popular platforms to store huge amount of dataand process them in parallel. While storing sensitive data, security plays animportant role to keep it safe. Security was not that much considered whenHadoop was initially designed. READ MORE