{"title":"将OM-AM参考应用于ABAC模型以保护云支持的物联网","authors":"Fatima Sifou, M. Marwan, A. Hammouch","doi":"10.1109/icsrs.2018.8688841","DOIUrl":null,"url":null,"abstract":"Security and privacy are the main challenges in the internet of things (IoT) environment. With devices are interconnected and connected to the internet in this open environment, unauthorized alteration, access to confidential data, or even denial of service frequently occurr. To address those vulnerabilities, it is necessary to implement an access. Previous research shows that OM-AM is appropriate for architecture handling security problems in a dynamic environment such as IoT. This framework comprises four layers, i.e. objective, model, architecture and mechanism. Our contribution consists in applying OM-AM to an Attribute-based access control (ABAC) model to protect IoT device ‘data in cloud resources.","PeriodicalId":166131,"journal":{"name":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Applying OM-AM Reference to an ABAC Model for Securing Cloud-Enabled Internet of Things\",\"authors\":\"Fatima Sifou, M. Marwan, A. Hammouch\",\"doi\":\"10.1109/icsrs.2018.8688841\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security and privacy are the main challenges in the internet of things (IoT) environment. With devices are interconnected and connected to the internet in this open environment, unauthorized alteration, access to confidential data, or even denial of service frequently occurr. To address those vulnerabilities, it is necessary to implement an access. Previous research shows that OM-AM is appropriate for architecture handling security problems in a dynamic environment such as IoT. This framework comprises four layers, i.e. objective, model, architecture and mechanism. Our contribution consists in applying OM-AM to an Attribute-based access control (ABAC) model to protect IoT device ‘data in cloud resources.\",\"PeriodicalId\":166131,\"journal\":{\"name\":\"2018 3rd International Conference on System Reliability and Safety (ICSRS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 3rd International Conference on System Reliability and Safety (ICSRS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/icsrs.2018.8688841\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 3rd International Conference on System Reliability and Safety (ICSRS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icsrs.2018.8688841","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Applying OM-AM Reference to an ABAC Model for Securing Cloud-Enabled Internet of Things
Security and privacy are the main challenges in the internet of things (IoT) environment. With devices are interconnected and connected to the internet in this open environment, unauthorized alteration, access to confidential data, or even denial of service frequently occurr. To address those vulnerabilities, it is necessary to implement an access. Previous research shows that OM-AM is appropriate for architecture handling security problems in a dynamic environment such as IoT. This framework comprises four layers, i.e. objective, model, architecture and mechanism. Our contribution consists in applying OM-AM to an Attribute-based access control (ABAC) model to protect IoT device ‘data in cloud resources.