Trust Level Evaluation based Asymmetric Cryptography Protocol for Flexible Access Control in Fog Computing

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access Control in Utilizing Fog Computing for Transport Infrastructure

The integration of the information and communication technologies of cloud computing, Software Defined Networking (SDN) and Internet of Things (IoT) into traditional transportation infrastructures enables the evolution of Intelligent Transportation Systems (ITS). Moreover, the specific requirements for real-time applications and service provision near to consumers introduce the utilization of f...

متن کامل

Trust-Based Access Control for Secure Cloud Computing

Multi-tenancy, elasticity and dynamicity pose several novel challenges for access control in a cloud environment. Accessing subjects may dynamically change, resources requiring protection may be created or modified, and subject access requirements to resources may change during the course of the application execution. Users may need to acquire different permissions from different administrative...

متن کامل

A Trust-Based Access Control Model for Pervasive Computing Applications

With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. In this work, we propose a trust based approach for access control for pervasive computing systems. Our previously proposed belief based trust model is used to evaluate the trustworthiness of users. Fine-grained acces...

متن کامل

An Access Control Protocol for Peer-to-Peer Applications using Asymmetric Cryptography

Virtual rooms and common information spaces are being used more and more frequently. In addition to internet-based solutions, ad-hoc InfoSpaces have been proposed. Their security has not been sufficiently investigated. This paper proposes a new protocol for peer-to-peer data exchange with support for access control for operations in the virtual rooms. Access rights for operations are kept in ac...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of Computer Networks & Communications

سال: 2021

ISSN: 0975-2293

DOI: 10.5121/ijcnc.2021.13307