Token-Based Access Control
نویسندگان
چکیده
منابع مشابه
WiCTP: A Token-based Access Control Mechanism for Wireless Networks
The introduction and growth of large, metropolitan-sized wireless networks has identified a significant problem within the current 802.11 protocol specification; Hidden Nodes. A wireless network may have 2 nodes, A and B, connected to a central Access Point (AP). Node A is within the transmission radius of the AP, but outside the transmission radius of B, and vice versa. Nodes A and B are then ...
متن کاملToken-Based Access to Digital Information
Several systems have been designed where a physical object is used to access digital information that is stored outside the object, but as yet no common vocabulary exists to describe such systems. We introduce a schema with three types of physical objects that can be linked to digital information: Containers are generic objects used to move information between different devices or platforms; to...
متن کاملEfficient Token-Based Control in Rings
In this paper we deal with the efficiency of token-based strategies for the basic problem of controlling the allocation of a shared resource in a ring of n processing entities. We propose new protocols that allow a bounded number of exchanged messages per access request to the resource, while this amount is unbounded for classical solutions. We also guarantee all the requests to be served withi...
متن کاملSecuring Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment
In this paper we propose a new authorization and authentication framework for the IoT that combines the security model of OAuth 1.0a with the lightweight building blocks of ACE. By designing self-securing tokens the security of the framework no longer depends on the security of the network stack. We use basic PKI functionalities to bootstrap a chain-of-trust between the devices which simplifies...
متن کاملBeyond Risk-Based Access Control: Towards Incentive-Based Access Control
In recent years, risk-based access control has been proposed as an alternative to traditional rigid access control models such as multi-level security and role-based access control. While these approaches make the risks associated with exceptional access accountable and encourage the users to take low-risk actions, they also create the disincentives for seeking necessary risky accesses. We intr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2979746