![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment
The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized actions. Implementing authorized access control with secure k...
-
Chapter and Conference Paper
Deep Learning-Based Solution for Intrusion Detection in the Internet of Things
Securing the Internet of Things-based environment is a top priority for consumers, businesses, and governments. There are billions of devices connecting and sharing data; an attack might cost billions of doll...
-
Article
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare
Due to the meteoric rise of cloud computing and the Internet of Things (IoT) concepts, remote monitoring of patients in real-time has become possible, and patients can now get healthcare services at home. To a...
-
Chapter and Conference Paper
A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments
Access control is one of the most basic information security requirements, which prevents unauthorized people from accessing the system or facilities. The access control process relies on specified policies an...