his.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Securing the Web of Things With Role-Based Access Control
UAE University, United Arab Emirates.
UAE University, United Arab Emirates.
UAE University, United Arab Emirates.ORCID iD: 0000-0002-7312-9089
2015 (English)In: Codes, Cryptology, and Information Security: First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger / [ed] Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi, Springer, 2015, 14-26 p.Chapter in book (Refereed)
Abstract [en]

Real-world things are increasingly becoming fully qualified members of the Web. From, pacemakers and medical records to children’s toys and sneakers, things are connected over the Web and publish information that is available for the whole world to see. It is crucial that there is secure access to this Web of Things (WoT) and to the related information published by things on the Web. In this paper, we introduce an architecture that encompasses Web-enabled things in a secure and scalable manner. Our architecture utilizes the features of the well-known role-based access control (RBAC) to specify the access control policies to the WoT, and we use cryptographic keys to enforce such policies. This approach enables prescribers to WoT services to control who can access what things and how access can continue or should terminate, thereby enabling privacy and security of large amount of data that these things are poised to flood the future Web with.

Place, publisher, year, edition, pages
Springer, 2015. 14-26 p.
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 9084
Keyword [en]
Web of Things, Privacy, Access Control, RBAC, UCON
National Category
Computer Science
Research subject
Technology
Identifiers
URN: urn:nbn:se:his:diva-11909DOI: 10.1007/978-3-319-18681-8_2ISBN: 978-3-319-18680-1 ISBN: 978-3-319-18681-8 OAI: oai:DiVA.org:his-11909DiVA: diva2:902641
Available from: 2016-02-11 Created: 2016-02-11 Last updated: 2016-04-22Bibliographically approved

Open Access in DiVA

fulltext(525 kB)253 downloads
File information
File name FULLTEXT01.pdfFile size 525 kBChecksum SHA-512
ee70e271404e2ac10ae8527a35e1c5cbbac4dd379398bd2872bd22518aebe81abf6b914bcfb9fbc28ada03198aff70a484b633c04a148f21c75f55e52a2a7189
Type fulltextMimetype application/pdf

Other links

Publisher's full text

Search in DiVA

By author/editor
Atif, Yacine
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 253 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 514 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf