scholarly journals Design and Implementation of The Capability Token based Access Control System in the Internet of Things

Author(s):  
Bum-Ki Lee ◽  
Mi-Sun Kim ◽  
Jae-Hyun Seo
2012 ◽  
Vol 532-533 ◽  
pp. 576-580
Author(s):  
Ke Chao Wang ◽  
Tian Tian Wang ◽  
Zong Fu Jia ◽  
Ming Kui Zong

Traditional access control system is relatively simple, low efficiency, small storage capacity, which can not meet the initiative, timeliness, and flexibility requirements of security technology in the Internet of Things. To solve this problem, this paper researches and designs the intelligent access control system based on Radio Frequency Identification (RFID) technology. The system consists of an access control management system and an access controller. The system can not only be used as the import and export of safety management, but also contribute to the internal order management, achieve effective control and management of access control region.


2015 ◽  
Vol 20 (5) ◽  
pp. 1763-1779 ◽  
Author(s):  
Jorge Bernal Bernabe ◽  
Jose Luis Hernandez Ramos ◽  
Antonio F. Skarmeta Gomez

2017 ◽  
pp. 507-526
Author(s):  
Peter J. Hawrylak ◽  
Steven Reed ◽  
Matthew Butler ◽  
John Hale

Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources with other people and other devices. The Internet of Things will contain numerous wireless devices. The level of access each user (human or device) is given must be controlled. Most conventional access control schemes are rigid in that they do not account for environmental context. This solution is not sufficient for the Internet of Things. What is needed is a more granular control of access rights and a gradual degradation or expansion of access based on observed facts. This chapter presents an access control system termed the Access of Things, which employs a gradual degradation of privilege philosophy. The Access of Things concept is applicable to the dynamic security environment present in the Internet of Things.


Author(s):  
Peter J. Hawrylak ◽  
Steven Reed ◽  
Matthew Butler ◽  
John Hale

Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources with other people and other devices. The Internet of Things will contain numerous wireless devices. The level of access each user (human or device) is given must be controlled. Most conventional access control schemes are rigid in that they do not account for environmental context. This solution is not sufficient for the Internet of Things. What is needed is a more granular control of access rights and a gradual degradation or expansion of access based on observed facts. This chapter presents an access control system termed the Access of Things, which employs a gradual degradation of privilege philosophy. The Access of Things concept is applicable to the dynamic security environment present in the Internet of Things.


Sign in / Sign up

Export Citation Format

Share Document