Ravi Sandhu
YOU?
Author Swipe
View article: Implementing artificial intelligence in academic and administrative processes through responsible strategic leadership in the higher education institutions
Implementing artificial intelligence in academic and administrative processes through responsible strategic leadership in the higher education institutions Open
Artificial Intelligence (AI) has enormous potential to make a transformative impact in multiple fields. It has made significant strides in Higher Education by reshaping traditional administrative processes, learning, leadership, and teachi…
View article: DUCEx: Enabling Efficient Deployment of the DUCE Data‐Sharing Model for IoT
DUCEx: Enabling Efficient Deployment of the DUCE Data‐Sharing Model for IoT Open
The Internet of Things (IoT) is increasingly becoming a ubiquitous computing service, wherein data storage and sharing are outsourced to multiple cloud providers, considering IoT’s resource‐constrained, self‐organizing networks and short‐r…
View article: ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model
ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control Model Open
Recently, several researchers motivated the need to integrate Zero Trust (ZT) principles when designing and implementing authentication and authorization systems for IoT. An integrated Zero Trust IoT system comprises the network infrastruc…
View article: Specification and Enforcement of Activity Dependency Policies using XACML
Specification and Enforcement of Activity Dependency Policies using XACML Open
The evolving smart and interconnected systems are designed to operate with minimal human intervention. Devices within these smart systems often engage in prolonged operations based on sensor data and contextual factors. Recently, an Activi…
View article: The ACAC_D Model for Mutable Activity Control and Chain of Dependencies in Smart and Collaborative Systems
The ACAC_D Model for Mutable Activity Control and Chain of Dependencies in Smart and Collaborative Systems Open
With the integration of connected devices, artificial intelligence, and heterogeneous networks in IoT-driven cyber-physical systems, our society is evolving as a smart, automated, and connected community. In such dynamic and distributed en…
View article: Machine Learning in Access Control: A Taxonomy and Survey
Machine Learning in Access Control: A Taxonomy and Survey Open
An increasing body of work has recognized the importance of exploiting machine learning (ML) advancements to address the need for efficient automation in extracting access control attributes, policy mining, policy verification, access deci…
View article: BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems
BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems Open
Cyber physical ecosystem connects different intelligent devices over heterogeneous networks. Various operations are performed on smart objects to ensure efficiency and to support automation in smart environments. An Activity (defined by Gu…
View article: Toward Deep Learning Based Access Control
Toward Deep Learning Based Access Control Open
A common trait of current access control approaches is the challenging need to engineer abstract and intuitive access control models. This entails designing access control information in the form of roles (RBAC), attributes (ABAC), or rela…
View article: An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach
An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach Open
The area of smart homes is one of the most popular for deploying smart connected devices. One of the most vulnerable aspects of smart homes is access control. Recent advances in IoT have led to several access control models being developed…
View article: Reachability Analysis for Attributes in ABAC With Group Hierarchy
Reachability Analysis for Attributes in ABAC With Group Hierarchy Open
Attribute-based access control (ABAC) models are widely used to provide fine-grained and adaptable authorization based on the attributes of users, resources, and other relevant entities. Hierarchial group and attribute based access control…
View article: Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems
Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems Open
Internet of Things (IoT) is a rapidly growing industry currently being integrated into both consumer and industrial environments on a wide scale. While the technology is available and deployment has a low barrier of entry in future applica…
View article: Towards Activity-Centric Access Control for Smart Collaborative Ecosystems
Towards Activity-Centric Access Control for Smart Collaborative Ecosystems Open
The ubiquitous presence of smart devices along with advancements in connectivity coupled with the elastic capabilities of cloud and edge systems have nurtured and revolutionized smart ecosystems. Intelligent, integrated cyber-physical syst…
View article: Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms
Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms Open
Smart home IoT systems utilize trigger-action platforms, e.g., IFTTT, to\nmanage devices from various vendors. However, they may be abused by triggering\nmalicious rule execution with forged IoT devices or events violating the\nexecution i…
View article: Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure
Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure Open
Several organizations are utilizing cloud technologies and resources to run a range of applications. These services help businesses save on hardware management, scalability and maintainability concerns of underlying infrastructure. Key clo…
View article: Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future
Attribute-Based Access Control for AWS Internet of Things and Secure Industries of the Future Open
Internet of Things (IoT) is revolutionizing and enhancing the quality of human lives in every aspect. With a disruption of IoT devices and applications, attackers are leveraging weak authentication and access control mechanisms on these Io…
View article: Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems
Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems Open
Traditionally, access control solutions have focused on how to utilize a specific type of decision parameter for access control decisions. While these “decision parameter”-focused approaches have been well accepted, they typically consider…
View article: Cyber Attacks on Smart Farming Infrastructure
Cyber Attacks on Smart Farming Infrastructure Open
Smart farming also known as precision agriculture is gaining more traction for its promising potential to fulfill increasing global food demand and supply. In a smart farm, technologies and connected devices are used in a variety of ways, …
View article: Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets
Secure V2V and V2I Communication in Intelligent Transportation Using Cloudlets Open
Intelligent Transportation System (ITS) is a vision which offers safe, secure and smart travel experience to drivers. This futuristic plan aims to enable vehicles, roadside transportation infrastructures, pedestrian smart-phones and other …
View article: Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem Open
Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid advancements in technologies that support smart devices, ag…
View article: Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control
Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control Open
Future smart cities and intelligent world will have connected vehicles and smart cars as its indispensable and most essential components. The communication and interaction among such connected entities in this vehicular internet of things …
View article: Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars
Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars Open
Smart cars are among the essential components and major drivers of future cities and connected world. The interaction among connected entities in this vehicular internet of things (IoT) domain, which also involves smart traffic infrastruct…
View article: Adaptive Noise Injection against Side-Channel Attacks on ARM Platform
Adaptive Noise Injection against Side-Channel Attacks on ARM Platform Open
In recent years, research efforts have been made to develop safe and secure environments for ARM platform. The new ARMv8 architecture brought in security features by design. However, there are still some security problems with ARMv8. For e…
View article: ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine
ABAC with Group Attributes and Attribute Hierarchies Utilizing the Policy Machine Open
Attribute-Based Access Control (ABAC) has received significant attention in recent years, although the concept has been around for over two decades now. Many ABAC models, with different variations, have been proposed and formalized. Beside…