Access Control Models and Architectures For IoT and Cyber Physical Systems by Maanak Gupta & Smriti Bhatt & Asma Hassan Alshehri & Ravi Sandhu
Author:Maanak Gupta & Smriti Bhatt & Asma Hassan Alshehri & Ravi Sandhu
Language: eng
Format: epub
ISBN: 9783030810894
Publisher: Springer International Publishing
B.
Scenario 2: Here, we discuss a comprehensive scenario with a fine grained authorization policy as shown in Fig. 4.6. Sensor_1 is a light sensor that monitors light level of its surrounding environment and if light level is low (i.e., it is dark), then a message is published to turn on outdoor lights which are Light_1 and Light_2. As soon as the lights get turned on, home owner receives a text message notification about the state change of the lights. In this scenario, a more restrictive access control policy is defined for Sensor_1. The policy is based on Sensor_1 thing attributes specified as a Condition in the policy. Figure 4.6b shows the fine grained policy which includes two policy statementsâfirst statement authorizes a client to connect to AWS IoT only if its client ID is Sensor_1, and second statement allows publish, subscribe, and receive operations on any resources if and only if the client requesting access has a thing attribute Belongs and its value is Home1. This policy employs thing attributes which represent the characteristics of IoT things/devices and allow to define more fine grained access control policy as shown in Fig. 4.6b.
Fig. 4.6Smart-home use case scenario 2
Download
Access Control Models and Architectures For IoT and Cyber Physical Systems by Maanak Gupta & Smriti Bhatt & Asma Hassan Alshehri & Ravi Sandhu.epub
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26960)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(20859)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(20615)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(20538)
The Fifty Shades Trilogy & Grey by E L James(19461)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19381)
Shot Through the Heart by Mercy Celeste(19242)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17388)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17356)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(17188)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(17099)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16713)
The Subtle Art of Not Giving a F*ck by Mark Manson(14831)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14443)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(14219)
Cozy crochet hats: 7 Stylish and Beginner-Friendly Patterns from Baby Beanies to Trendy Bucket Hats by Vanilla Lazy(13504)
Scorched Earth by Nick Kyme(13096)
Reichel W. Numerical methods for Electrical Engineering, Meteorology,...2022 by Unknown(12980)
Drei Generationen auf dem Jakobsweg by Stein Pia(11259)