{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T05:05:38Z","timestamp":1749531938061},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T00:00:00Z","timestamp":1721433600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T00:00:00Z","timestamp":1721433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s10207-024-00881-5","type":"journal-article","created":{"date-parts":[[2024,7,20]],"date-time":"2024-07-20T11:01:32Z","timestamp":1721473292000},"page":"3283-3310","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The $$\\mathrm {ACAC_{D}}$$ model for mutable activity control and chain of dependencies in smart and connected systems"],"prefix":"10.1007","volume":"23","author":[{"given":"Tanjila","family":"Mawla","sequence":"first","affiliation":[]},{"given":"Maanak","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Safwa","family":"Ameer","sequence":"additional","affiliation":[]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,20]]},"reference":[{"key":"881_CR1","doi-asserted-by":"crossref","unstructured":"Ameer, S., Benson, J., Sandhu, R.: The EGRBAC Model for Smart Home IoT. In: IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI), 457\u2013462, (2020)","DOI":"10.1109\/IRI49571.2020.00076"},{"key":"881_CR2","doi-asserted-by":"crossref","unstructured":"Schuster, R., Shmatikov, V., Tromer, E.: Situational access control in the internet of things. In: ACM SIGSAC Conference on Computer and Communications Security, pages 1056\u20131073, (2018)","DOI":"10.1145\/3243734.3243817"},{"issue":"5\u20136","key":"881_CR3","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1016\/j.mcm.2013.02.006","volume":"58","author":"S Gusmeroli","year":"2013","unstructured":"Gusmeroli, S., Piccione, S., Rotondi, D.: A capability-based security approach to manage access control in the internet of things. Math. Comput. Model. 58(5\u20136), 1189\u20131205 (2013)","journal-title":"Math. Comput. Model."},{"key":"881_CR4","doi-asserted-by":"crossref","unstructured":"Gupta, D., et\u00a0al.: Access control model for Google cloud IoT. In: IEEE Conference on Big Data Security on Cloud, 198\u2013208, (2020)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00044"},{"key":"881_CR5","doi-asserted-by":"crossref","unstructured":"Gupta, M., Benson, J., Patwa, F., Sandhu, R.: Secure V2V and V2I communication in intelligent transportation using cloudlets. IEEE Trans. Serv. Comput. (2020)","DOI":"10.1109\/SERVICES51467.2021.00024"},{"key":"881_CR6","doi-asserted-by":"crossref","unstructured":"Ameer, S., Sandhu, R.: The HABAC Model for Smart Home IoT and Comparison to EGRBAC. In: ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 39\u201348, (2021)","DOI":"10.1145\/3445969.3450428"},{"key":"881_CR7","doi-asserted-by":"crossref","unstructured":"Lee, A.T., et\u00a0al.: PARBAC: priority-attribute-based RBAC model for azure IoT cloud. IEEE Internet Things J. 7(4), 2890\u20132900, (2020)","DOI":"10.1109\/JIOT.2019.2963794"},{"key":"881_CR8","doi-asserted-by":"publisher","first-page":"107200","DOI":"10.1109\/ACCESS.2021.3101218","volume":"9","author":"S Bhatt","year":"2021","unstructured":"Bhatt, S., Pham, T.K., Gupta, M., Benson, J., Park, J., Sandhu, R.: Attribute-based access control for AWS internet of things and secure industries of the future. IEEE Access 9, 107200\u2013107223 (2021)","journal-title":"IEEE Access"},{"key":"881_CR9","doi-asserted-by":"crossref","unstructured":"Gupta, M., Benson, J., Patwa, F., Sandhu, R.: Dynamic groups and attribute-based access control for next-generation smart cars. In: Proc. of the ACM Conference on Data and Application Security and Privacy, 61\u201372, (2019)","DOI":"10.1145\/3292006.3300048"},{"key":"881_CR10","doi-asserted-by":"crossref","unstructured":"Xu, R., Chen, Y., Blasch, E., Chen, G.: A federated capability-based access control mechanism for internet of things (iots). In: Sensors and Systems for Space Applications XI, volume 10641, page 106410U. Int. Soc. Opt. Photonics (2018)","DOI":"10.1117\/12.2305619"},{"key":"881_CR11","doi-asserted-by":"publisher","first-page":"151004","DOI":"10.1109\/ACCESS.2021.3126201","volume":"9","author":"J Park","year":"2021","unstructured":"Park, J., Sandhu, R., Gupta, M., Bhatt, S.: Activity control design principles: next generation access control for smart and collaborative systems. IEEE Access 9, 151004\u2013151022 (2021)","journal-title":"IEEE Access"},{"key":"881_CR12","doi-asserted-by":"crossref","unstructured":"Cathey, G., Benson, J., Gupta, M., Sandhu, R.: Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems. In: IEEE TPS-ISA, (2021)","DOI":"10.1109\/TPSISA52974.2021.00008"},{"key":"881_CR13","volume":"174","author":"P Colombo","year":"2021","unstructured":"Colombo, P., Ferrari, E., T\u00fcmer, E.D.: Regulating data sharing across MQTT environments. JNCA 174, 102907 (2021)","journal-title":"JNCA"},{"key":"881_CR14","doi-asserted-by":"crossref","unstructured":"Gupta, M., Sandhu, R.: Towards activity-centric access control for smart collaborative ecosystems. In: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 155\u2013164, (2021)","DOI":"10.1145\/3450569.3463559"},{"key":"881_CR15","doi-asserted-by":"crossref","unstructured":"Mawla, T., Gupta, M., Sandhu, R.: BlueSky: Activity Control: A Vision for \"Active\" Security Models for Smart Collaborative Systems. In: Proceedings of the 27th ACM on symposium on access control models and technologies, 207\u2013216, (2022)","DOI":"10.1145\/3532105.3535017"},{"key":"881_CR16","doi-asserted-by":"crossref","unstructured":"Nicklas, J.-P., Mamrot, M., Winzer, P., Lichte, D., Marchlewitz, S., Wolf, K.-D.: Use case based approach for an integrated consideration of safety and security aspects for smart home applications. In: 2016 11th System of Systems Engineering Conference (SoSE), 1\u20136. IEEE, (2016)","DOI":"10.1109\/SYSOSE.2016.7542908"},{"key":"881_CR17","doi-asserted-by":"crossref","unstructured":"Khoussi, S., Mattas, A.: A brief introduction to smart grid safety and security. In: Handbook of system safety and security, 225\u2013252. Elsevier, (2017)","DOI":"10.1016\/B978-0-12-803773-7.00011-5"},{"key":"881_CR18","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.proeng.2017.06.090","volume":"192","author":"M Lacin\u00e1k","year":"2017","unstructured":"Lacin\u00e1k, M., Ristvej, J.: Smart city, safety and security. Procedia Eng. 192, 522\u2013527 (2017)","journal-title":"Procedia Eng."},{"key":"881_CR19","doi-asserted-by":"crossref","unstructured":"Tokody, D., Albini, A., Ady, L., Rajnai, Z., Pongr\u00e1cz, F.: Safety and security through the design of autonomous intelligent vehicle systems and intelligent infrastructure in the smart city. Interdisciplinary Description of Complex Systems: INDECS, 16(3-A):384\u2013396, (2018)","DOI":"10.7906\/indecs.16.3.11"},{"key":"881_CR20","unstructured":"Threat Modeling | OWASP Foundation \u2014 owasp.org. https:\/\/owasp.org\/www-community\/Threat_Modeling. [Accessed 02-11-2023]"},{"key":"881_CR21","doi-asserted-by":"crossref","unstructured":"Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: Database security XI, 166\u2013181. Springer, (1998)","DOI":"10.1007\/978-0-387-35285-5_10"},{"issue":"1","key":"881_CR22","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/984334.984339","volume":"7","author":"J Park","year":"2004","unstructured":"Park, J., Sandhu, R.: The $$\\text{ UCON}_{{\\rm ABC}} $$ usage control model. ACM Trans. Inf. Syst. Secur. (TISSEC) 7(1), 128\u2013174 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"881_CR23","doi-asserted-by":"crossref","unstructured":"Park, J., Sandhu, R., Cheng, Y.: ACON: Activity-centric access control for social computing. In: IEEE ARES, 242\u2013247, (2011)","DOI":"10.1109\/ARES.2011.42"},{"key":"881_CR24","doi-asserted-by":"crossref","unstructured":"Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: IFIP Annual Conference on Data and Applications Security and Privacy, 41\u201355. Springer, (2012)","DOI":"10.1007\/978-3-642-31540-4_4"},{"key":"881_CR25","doi-asserted-by":"crossref","unstructured":"Gupta, M., others: An Attribute-Based Access Control for Cloud Enabled Industrial Smart Vehicles. IEEE Trans. Ind. Inf. (2020)","DOI":"10.1109\/TII.2020.3022759"},{"key":"881_CR26","doi-asserted-by":"crossref","unstructured":"Bhatt, S., Sandhu, R.: ABAC-CC: Attribute-based access control and communication control for internet of things. In: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 203\u2013212, (2020)","DOI":"10.1145\/3381991.3395618"},{"key":"881_CR27","doi-asserted-by":"crossref","unstructured":"Sandhu, R., Park, J.: Usage control: A vision for next generation access control. In: International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, 17\u201331. Springer, (2003)","DOI":"10.1007\/978-3-540-45215-7_2"},{"issue":"1","key":"881_CR28","doi-asserted-by":"publisher","first-page":"841","DOI":"10.1109\/TDSC.2022.3145358","volume":"20","author":"M Gupta","year":"2022","unstructured":"Gupta, M., Sandhu, R., Mawla, T., Benson, J.: Reachability analysis for attributes in ABAC with group hierarchy. IEEE Trans. Dependable Secure Comput. 20(1), 841\u2013858 (2022)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"881_CR29","doi-asserted-by":"publisher","first-page":"1602","DOI":"10.1109\/TCE.2010.5606303","volume":"56","author":"M-H Cho","year":"2010","unstructured":"Cho, M.-H., Lee, C.-H.: A low-power real-time operating system for ARC (actual remote control) wearable device. IEEE Trans. Consum. Electron. 56(3), 1602\u20131609 (2010)","journal-title":"IEEE Trans. Consum. Electron."},{"key":"881_CR30","doi-asserted-by":"crossref","unstructured":"Yao, X., Farha, F., Li, R., Psychoula, I., Chen, L., Ning, H.: Security and privacy issues of physical objects in the IoT: Challenges and opportunities. Digital Communications and Networks, (2021)","DOI":"10.1016\/j.dcan.2020.09.001"},{"key":"881_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108040","volume":"192","author":"L Babun","year":"2021","unstructured":"Babun, L., et al.: A survey on IoT platforms: Communication, security, and privacy perspectives. Comput. Netw. 192, 108040 (2021)","journal-title":"Comput. Netw."},{"issue":"2","key":"881_CR32","doi-asserted-by":"publisher","first-page":"60","DOI":"10.3390\/info13020060","volume":"13","author":"S Ameer","year":"2022","unstructured":"Ameer, S., Benson, J., Sandhu, R.: An attribute-based approach toward a secured smart-home IoT access control and a comparison with a role-based approach. Information 13(2), 60 (2022)","journal-title":"Information"},{"key":"881_CR33","doi-asserted-by":"crossref","unstructured":"Chen, Y., Meng, L., Zhou, H., Xue, G.: A blockchain-based medical data sharing mechanism with attribute-based access control and privacy protection. Wirel. Commun. Mob. Comput. (2021)","DOI":"10.1155\/2021\/6685762"},{"issue":"8","key":"881_CR34","doi-asserted-by":"publisher","first-page":"6372","DOI":"10.1109\/JIOT.2020.3033434","volume":"8","author":"Y Zhang","year":"2020","unstructured":"Zhang, Y., Yutaka, M., Sasabe, M., Kasahara, S.: Attribute-based access control for smart cities: a smart-contract-driven framework. IEEE Internet Things J. 8(8), 6372\u20136384 (2020)","journal-title":"IEEE Internet Things J."},{"key":"881_CR35","doi-asserted-by":"crossref","unstructured":"Sikder, A.K., et\u00a0al.: Who\u2019s Controlling My Device? Multi-User Multi-Device-Aware Access Control System for Shared Smart Home Environment. ACM Trans. Internet of Things (2022)","DOI":"10.1145\/3543513"},{"key":"881_CR36","doi-asserted-by":"crossref","unstructured":"Clark, S., et\u00a0al.: ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases. In: IFIP Annual Conference on Data and Applications Security and Privacy, 303\u2013315. Springer, (2022)","DOI":"10.1007\/978-3-031-10684-2_17"},{"key":"881_CR37","doi-asserted-by":"crossref","unstructured":"Chakraborty, S., Sandhu, R.: On feasibility of attribute-aware relationship-based access control policy mining. In: IFIP Annual Conference on Data and Applications Security and Privacy, 393\u2013405. Springer, (2021)","DOI":"10.1007\/978-3-030-81242-3_23"},{"key":"881_CR38","unstructured":"Arora, C.: Higher-Order (Temporal) Relationship-Based Access Control. Master\u2019s thesis, Science, (2022)"},{"key":"881_CR39","doi-asserted-by":"crossref","unstructured":"Bayreuther, S., Jacob, F., Grotz, M., Kartmann, R., et\u00a0al.: BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots. In: Proc. of the 27th ACM SACMAT, 185\u2013194, (2022)","DOI":"10.1145\/3532105.3535018"},{"issue":"3","key":"881_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3433542","volume":"21","author":"L Tan","year":"2021","unstructured":"Tan, L., Shi, N., Keping, Yu., Aloqaily, M., Jararweh, Y.: A blockchain-empowered access control framework for smart devices in green internet of things. ACM Trans. Internet Technol. (TOIT) 21(3), 1\u201320 (2021)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"881_CR41","doi-asserted-by":"crossref","unstructured":"Han, D., et\u00a0al.: A blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE Trans. Ind. Inf. (2021)","DOI":"10.1109\/TII.2021.3114621"},{"key":"881_CR42","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.ins.2020.12.035","volume":"554","author":"X Qin","year":"2021","unstructured":"Qin, X., et al.: LBAC: A lightweight blockchain-based access control scheme for the internet of things. Inf. Sci. 554, 222\u2013235 (2021)","journal-title":"Inf. Sci."},{"issue":"4","key":"881_CR43","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.3390\/app11041772","volume":"11","author":"S Algarni","year":"2021","unstructured":"Algarni, S., et al.: Blockchain-based secured access control in an IoT system. Appl. Sci. 11(4), 1772 (2021)","journal-title":"Appl. Sci."},{"key":"881_CR44","doi-asserted-by":"crossref","unstructured":"Nobi, M.N., et\u00a0al.: Toward Deep Learning Based Access Control. In: Proc. of the ACM CODASPY, 143\u2013154, (2022)","DOI":"10.1145\/3508398.3511497"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00881-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00881-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00881-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T01:05:53Z","timestamp":1726275953000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00881-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,20]]},"references-count":44,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["881"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00881-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,7,20]]},"assertion":[{"value":"20 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All authors confirm that the principles of ethical and professional conduct have been followed and declare that they have no Conflict of interest. In addition to that, the research work articulated in this manuscript does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The dataset generated and\/or analyzed during the current study is available from the corresponding author on reasonable request.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Data Policy and Data Availability Statements"}}]}}