Skip to main content

and
  1. No Access

    Article

    BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment

    The increasing number of edge layer devices connected to fog servers in fog computing environments has led to a rise in vulnerable and unauthorized actions. Implementing authorized access control with secure k...

    Akhil Chaurasia, Alok Kumar, Udai Pratap Rao in Cluster Computing (2024)

  2. No Access

    Chapter and Conference Paper

    Deep Learning-Based Solution for Intrusion Detection in the Internet of Things

    Securing the Internet of Things-based environment is a top priority for consumers, businesses, and governments. There are billions of devices connecting and sharing data; an attack might cost billions of doll...

    Akhil Chaurasia, Alok Mishra in Computational Intelligence and Network Sys… (2024)

  3. No Access

    Article

    Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare

    Due to the meteoric rise of cloud computing and the Internet of Things (IoT) concepts, remote monitoring of patients in real-time has become possible, and patients can now get healthcare services at home. To a...

    Pooja Choksy, Akhil Chaurasia, Udai Pratap Rao in Peer-to-Peer Networking and Applications (2023)

  4. No Access

    Chapter and Conference Paper

    A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments

    Access control is one of the most basic information security requirements, which prevents unauthorized people from accessing the system or facilities. The access control process relies on specified policies an...

    Udai Pratap Rao, Pooja Choksy, Akhil Chaurasia in Security, Privacy and Data Analytics (2023)