Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems

被引:3
作者
Ameer, Safwa [1 ,2 ]
Krishnan, Ram [1 ,3 ]
Sandhu, Ravi [1 ]
Gupta, Maanak [4 ]
机构
[1] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
[2] Univ Texas San Antonio, NSF C SPECC Ctr, Dept Comp Sci, San Antonio, TX 78249 USA
[3] Univ Texas San Antonio, NSF C SPECC Ctr, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
[4] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
来源
PROCEEDINGS OF THE THIRTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2023 | 2023年
关键词
Access control; Score-based; IoT; Zero Trust; ACCESS-CONTROL; INTERNET; THINGS;
D O I
10.1145/3577923.3585046
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The internet of Things (IoT) refers to a network of physical objects that are equipped with sensors, software, and other technologies in order to communicate with other devices and systems over the internet. IoT has emerged as one of the most important technologies of this century over the past few years. To ensure IoT systems' sustainability and security over the long term, several researchers lately motivated the need to incorporate the recently proposed zero trust (ZT) cybersecurity paradigm when designing and implementing access control models for IoT systems. This poster proposes a hybrid access control approach incorporating traditional and deep learning-based authorization techniques toward score-based ZT authorization for IoT systems.
引用
收藏
页码:283 / 285
页数:3
相关论文
共 20 条
[1]   BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems [J].
Ameer, Safwa ;
Gupta, Maanak ;
Bhatt, Smriti ;
Sandhu, Ravi .
PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, :235-244
[2]   ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things [J].
Bhatt, Smriti ;
Sandhu, Ravi .
SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, :203-212
[3]   Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships [J].
Cheng, Yuan ;
Park, Jaehong ;
Sandhu, Ravi .
PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, :646-655
[4]   Access Control Enforcement in IoT: state of the art and open challenges in the Zero Trust era [J].
Colombo, Pietro ;
Ferrari, Elena ;
Tumer, Engin Deniz .
2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021), 2021, :156-163
[5]   Mining ABAC Rules from Sparse Logs [J].
Cotrini, Carlos ;
Weghorn, Thilo ;
Basin, David .
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018), 2018, :31-46
[6]  
Das Saptarshi, 2018, From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday. Lecture Notes in Computer Science (LNCS 11170), P24, DOI 10.1007/978-3-030-04834-1_2
[7]   Securing IoT Devices Using Zero Trust and Blockchain [J].
Dhar, Suparna ;
Bose, Indranil .
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2021, 31 (01) :18-34
[8]   Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things [J].
Dimitrakos, Theo ;
Dilshener, Tezcan ;
Kravtsov, Alexander ;
La Marra, Antonio ;
Martinelli, Fabio ;
Rizos, Athanasios ;
Rosetti, Alessandro ;
Saracino, Andrea .
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, :1801-1812
[9]  
Jaehong Park, 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P242, DOI 10.1109/ARES.2011.42
[10]   A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC [J].
Jin, Xin ;
Krishnan, Ram ;
Sandhu, Ravi .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 :41-55