Token-Based Access Control

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

WiCTP: A Token-based Access Control Mechanism for Wireless Networks

The introduction and growth of large, metropolitan-sized wireless networks has identified a significant problem within the current 802.11 protocol specification; Hidden Nodes. A wireless network may have 2 nodes, A and B, connected to a central Access Point (AP). Node A is within the transmission radius of the AP, but outside the transmission radius of B, and vice versa. Nodes A and B are then ...

متن کامل

Token-Based Access to Digital Information

Several systems have been designed where a physical object is used to access digital information that is stored outside the object, but as yet no common vocabulary exists to describe such systems. We introduce a schema with three types of physical objects that can be linked to digital information: Containers are generic objects used to move information between different devices or platforms; to...

متن کامل

Efficient Token-Based Control in Rings

In this paper we deal with the efficiency of token-based strategies for the basic problem of controlling the allocation of a shared resource in a ring of n processing entities. We propose new protocols that allow a bounded number of exchanged messages per access request to the resource, while this amount is unbounded for classical solutions. We also guarantee all the requests to be served withi...

متن کامل

Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment

In this paper we propose a new authorization and authentication framework for the IoT that combines the security model of OAuth 1.0a with the lightweight building blocks of ACE. By designing self-securing tokens the security of the framework no longer depends on the security of the network stack. We use basic PKI functionalities to bootstrap a chain-of-trust between the devices which simplifies...

متن کامل

Beyond Risk-Based Access Control: Towards Incentive-Based Access Control

In recent years, risk-based access control has been proposed as an alternative to traditional rigid access control models such as multi-level security and role-based access control. While these approaches make the risks associated with exceptional access accountable and encourage the users to take low-risk actions, they also create the disincentives for seeking necessary risky accesses. We intr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.2979746