Search Results - "Ouaddah, Aafaf"
-
1
Access control in the Internet of Things: Big challenges and new opportunities
Published in Computer networks (Amsterdam, Netherlands : 1999) (15-01-2017)“…In this paper, an extensive state of the art review of different access control solutions in IoT within the Objectives, Models, Architecture and Mechanisms…”
Get full text
Journal Article -
2
FairAccess: a new Blockchain‐based access control framework for the Internet of Things
Published in Security and communication networks (01-12-2016)“…Security and privacy are huge challenges in Internet of Things (IoT) environments, but unfortunately, the harmonization of the IoT‐related standards and…”
Get full text
Journal Article -
3
Machine learning in identity and access management systems: Survey and deep dive
Published in Computers & security (01-04-2024)“…The evolution of identity and access management (IAM) has been driven by the expansion of online services, cloud computing, and the Internet of Things (IoT)…”
Get full text
Journal Article -
4
IoT-Gov: A structured framework for internet of things governance
Published in Computer networks (Amsterdam, Netherlands : 1999) (01-09-2023)“…The rise of artificial intelligence and smart devices with decision-making capabilities has highlighted the critical need for governance in the field of IoT…”
Get full text
Journal Article -
5
Drawing the Boundaries Between Blockchain and Blockchain-Like Systems: A Comprehensive Survey on Distributed Ledger Technologies
Published in Proceedings of the IEEE (01-03-2024)“…Bitcoin's success as a global cryptocurrency has paved the way for the emergence of blockchain, a revolutionary category of distributed systems. However, the…”
Get full text
Journal Article -
6
IoT-Gov: an IoT governance framework using the blockchain
Published in Computing (01-10-2022)“…Internet of Things (IoT) has become an essential technology in different daily life domains including health, industry and finance among many others. The…”
Get full text
Journal Article -
7
BTrust: A New Blockchain-Based Trust Management Protocol for Resource Sharing
Published in Journal of network and systems management (01-10-2022)“…The emergence of blockchain technology and cryptocurrencies opened the possibility for building novel peer-to-peer (P2P) resource allocation and sharing…”
Get full text
Journal Article -
8
Access control in IoT: Survey & state of the art
Published in 2016 5th International Conference on Multimedia Computing and Systems (ICMCS) (01-09-2016)“…The goal of this paper is to survey access control models, protocols and frameworks in IoT. We provide a literature overview and discuss in a qualitative way…”
Get full text
Conference Proceeding -
9
Machine Learning based Identity and Access Management Systems (ML I&AM): a Taxonomy
Published in 2023 7th IEEE Congress on Information Science and Technology (CiSt) (16-12-2023)“…Identity and access management (I&AM) systems are at the heart of every organization that is conscious of its own operations. Major corporations and software…”
Get full text
Conference Proceeding -
10
Drawing the boundaries between Blockchain and Blockchain-like systems: A Comprehensive Survey on Distributed Ledger Technologies
Published 26-09-2024“…Bitcoin's global success has led to the rise of blockchain, but many systems labeled as "blockchain" deviate from its core principles, adding complexity to the…”
Get full text
Journal Article -
11
Exploring blockchain-based Self Sovereign Identity Systems: challenges and comparative analysis
Published in 2021 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) (27-09-2021)“…This paper highlights the challenges that an Identity Management System (IdM) must overcome and gives a comparative analysis of three Self-Sovereign Identity…”
Get full text
Conference Proceeding -
12
SOK: A Comprehensive Survey on Distributed Ledger Technologies
Published in 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (02-05-2022)“…In recent years, Blockchain arose as a key technology in building autonomous decentralised financial systems. Its ability to digitize trust enables building…”
Get full text
Conference Proceeding -
13
GBTrust: Leveraging Edge Attention in Graph Neural Networks for Trust Management in P2P Networks
Published in 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (01-11-2023)“…Trust is an important factor in the success of P2P networks. It is needed to ensure that nodes in the network can be trusted to behave honestly and to deliver…”
Get full text
Conference Proceeding -
14
A Transpilation-Based Approach to Writing Secure Access Control Smart Contracts
Published in 2023 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS) (11-10-2023)“…In blockchain space, access control is a crucial aspect of smart contract development, as it guarantees that only authorized users can execute specific…”
Get full text
Conference Proceeding -
15
DCEA: A Reference model for Distributed Ledger Technologies
Published in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (03-05-2021)“…Bitcoin's notable success at operating autonomously as a global peer-to-peer network opened the door to a new revolutionary class of distributed systems:…”
Get full text
Conference Proceeding -
16
Security analysis and proposal of new access control model in the Internet of Thing
Published in 2015 International Conference on Electrical and Information Technologies (ICEIT) (01-03-2015)“…The Internet of Things (IoT) represents a concept where the barriers between the real world and the cyber-world are progressively annihilated through the…”
Get full text
Conference Proceeding -
17
Access control models in IoT: The road ahead
Published in 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA) (01-11-2015)“…In this paper, we survey access control models, protocols and frameworks in IoT. We briefly provide a literature overview and discuss in a qualitative way the…”
Get full text
Conference Proceeding Journal Article