[go: up one dir, main page]

Van Bael et al., 2020 - Google Patents

A context-aware break glass access control system for iot environments

Van Bael et al., 2020

Document ID
4513128818995813687
Author
Van Bael D
Kalantari S
Put A
De Decker B
Publication year
Publication venue
2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)

External Links

Snippet

In Internet of Things (IoT) environments, sensors measure and quantify properties of physical locations, objects and even people. Context-aware access control systems include this data in the decision making process to improve their accuracy and precision. However …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security

Similar Documents

Publication Publication Date Title
KR102542720B1 (en) System for providing internet of behavior based intelligent data security platform service for zero trust security
US10129257B2 (en) Authorization server access system
US9077758B1 (en) Test mode authorization logging
US9813285B1 (en) Enterprise server access system
Sattarova Feruza et al. IT security review: Privacy, protection, access control, assurance and system security
Anand et al. Data security and privacy functions in fog computing for healthcare 4.0
WO2011054555A1 (en) Method and system for managing security objects
CN114372771A (en) Power grid equipment full life cycle monitoring system based on sharing service
CN114338105B (en) Zero trust based system for creating fort
AU2022202238B2 (en) Tunneled monitoring service and methods
JP2008112284A (en) Resource management method, resource management system, and computer program
Folasole et al. Security, privacy challenges and available countermeasures in electronic health record systems: a review
Van Bael et al. A context-aware break glass access control system for iot environments
CN119066673B (en) Permission control method, device, storage medium and computer program product
Grunwell et al. Demonstrating accountable-ehealth systems
CN119363367A (en) Method and system for safely detecting information access
Hossain et al. Improving security practices in health information systems with STRIDE threat modeling
Gao et al. Operational Security Analysis and Challenge for IoT Solutions.
Basfar et al. Information security assessment in King Abdullah Medical Complex: A case study
Rajba et al. Identity and Access Management Architecture in the SILVANUS Project
Cerullo et al. Enabling convergence of physical and logical security through intelligent event correlation
JP5095286B2 (en) Communication control system
CN118214607B (en) Security evaluation management method, system, equipment and storage medium based on big data
JP2020095750A (en) Business information protection device, business information protection method, and program
Osop et al. Quality evidence, quality decisions: ways to improve security and privacy of EHR systems