A Study on Secured Access Control in Smart-Infrastructures
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2017 by IJETT Journal|
|Year of Publication : 2017|
|Authors : M.Sharada Varalakshmi
M.Sharada Varalakshmi "A Study on Secured Access Control in Smart-Infrastructures", International Journal of Engineering Trends and Technology (IJETT), V51(3),156-159 September 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Smart- infrastructures work under a real time environment where, security has to be provided to the system during emergencies. Privacy preservation during emergencies is the primary concern of this paper which should provide necessary access privileges to the subjects during the time of emergencies. The principal concepts are discussed in the next section before we proceed to discuss our paper. In this paper, the term crisis, critical and emergency are used interchangeably which mean the same.
 Adelstein, Frank, et al. Fundamentals of mobile and pervasive computing. Vol. 1. New York: McGraw-Hill, 2005.
 Simon, Richard T., and Mary Ellen Zurko. "Separation of duty in role-based environments." Computer Security Foundations Workshop, 1997. Proceedings., 10th. IEEE, 1997.
 Venkatasubramanian, Krishna K., Tridib Mukherjee, and Sandeep KS Gupta. "CAAC--an adaptive and proactive access control approach for emergencies in smart infrastructures." ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8.4 (2014): 20.
 S.Mehrotra, Kalashnikov, Dmitri V., et al. "Index for fast retrieval of uncertain spatial point data." Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems. ACM, 2006.
 Schneier, Bruce, and John Kelsey. "Secure audit logs to support computer forensics." ACM Transactions on Information and System Security (TISSEC) 2.2 (1999): 159-176.
Control, Secured, Infrastructures