Van Bael et al., 2020 - Google Patents
A context-aware break glass access control system for iot environmentsVan Bael et al., 2020
- Document ID
- 4513128818995813687
- Author
- Van Bael D
- Kalantari S
- Put A
- De Decker B
- Publication year
- Publication venue
- 2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)
External Links
Snippet
In Internet of Things (IoT) environments, sensors measure and quantify properties of physical locations, objects and even people. Context-aware access control systems include this data in the decision making process to improve their accuracy and precision. However …
- 239000011521 glass 0 title abstract description 64
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR102542720B1 (en) | System for providing internet of behavior based intelligent data security platform service for zero trust security | |
| US10129257B2 (en) | Authorization server access system | |
| US9077758B1 (en) | Test mode authorization logging | |
| US9813285B1 (en) | Enterprise server access system | |
| Sattarova Feruza et al. | IT security review: Privacy, protection, access control, assurance and system security | |
| Anand et al. | Data security and privacy functions in fog computing for healthcare 4.0 | |
| WO2011054555A1 (en) | Method and system for managing security objects | |
| CN114372771A (en) | Power grid equipment full life cycle monitoring system based on sharing service | |
| CN114338105B (en) | Zero trust based system for creating fort | |
| AU2022202238B2 (en) | Tunneled monitoring service and methods | |
| JP2008112284A (en) | Resource management method, resource management system, and computer program | |
| Folasole et al. | Security, privacy challenges and available countermeasures in electronic health record systems: a review | |
| Van Bael et al. | A context-aware break glass access control system for iot environments | |
| CN119066673B (en) | Permission control method, device, storage medium and computer program product | |
| Grunwell et al. | Demonstrating accountable-ehealth systems | |
| CN119363367A (en) | Method and system for safely detecting information access | |
| Hossain et al. | Improving security practices in health information systems with STRIDE threat modeling | |
| Gao et al. | Operational Security Analysis and Challenge for IoT Solutions. | |
| Basfar et al. | Information security assessment in King Abdullah Medical Complex: A case study | |
| Rajba et al. | Identity and Access Management Architecture in the SILVANUS Project | |
| Cerullo et al. | Enabling convergence of physical and logical security through intelligent event correlation | |
| JP5095286B2 (en) | Communication control system | |
| CN118214607B (en) | Security evaluation management method, system, equipment and storage medium based on big data | |
| JP2020095750A (en) | Business information protection device, business information protection method, and program | |
| Osop et al. | Quality evidence, quality decisions: ways to improve security and privacy of EHR systems |