共 20 条
[1]
BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems
[J].
PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022,
2022,
:235-244
[2]
ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things
[J].
SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES,
2020,
:203-212
[3]
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships
[J].
PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012),
2012,
:646-655
[4]
Access Control Enforcement in IoT: state of the art and open challenges in the Zero Trust era
[J].
2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021),
2021,
:156-163
[5]
Mining ABAC Rules from Sparse Logs
[J].
2018 3RD IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2018),
2018,
:31-46
[6]
Das Saptarshi, 2018, From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday. Lecture Notes in Computer Science (LNCS 11170), P24, DOI 10.1007/978-3-030-04834-1_2
[8]
Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of Things
[J].
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020),
2020,
:1801-1812
[9]
Jaehong Park, 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P242, DOI 10.1109/ARES.2011.42
[10]
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
[J].
DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI,
2012, 7371
:41-55