Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Using the ACE framework to enforce access and usage control with notifications of revoked access rights
National Research Council, Italy.
National Research Council, Italy; Scuola Superiore Sant’Anna, Italy.
National Research Council, Italy.
RISE Research Institutes of Sweden, Digital Systems, Data Science.ORCID iD: 0000-0001-8842-9810
2024 (English)In: International Journal of Information Security, ISSN 1615-5262, E-ISSN 1615-5270, Vol. 23, no 5, p. 3109-Article in journal (Refereed) Published
Abstract [en]

The standard ACE framework provides authentication and authorization mechanisms similar to those of the standard OAuth 2.0 framework, but it is intended for use in Internet-of-Things environments. In particular, ACE relies on OAuth 2.0, CoAP, CBOR, and COSE as its core building blocks. In ACE, a non-constrained entity called Authorization Server issues Access Tokens to Clients according to some access control and policy evaluation mechanism. An Access Token is then consumed by a Resource Server, which verifies the Access Token and lets the Client accordingly access a protected resource it hosts. Access Tokens have a validity which is limited over time, but they can also be revoked by the Authorization Server before they expire. In this work, we propose the Usage Control framework as an underlying access control means for the ACE Authorization Server, and we assess its performance in terms of time required to issue and revoke Access Tokens. Moreover, we implement and evaluate a method relying on the Observe extension for CoAP, which allows to notify Clients and Resource Servers about revoked Access Tokens. Through results obtained in a real testbed, we show how this method reduces the duration of illegitimate access to protected resources following the revocation of an Access Token, as well as the time spent by Clients and Resource Servers to learn about their Access Tokens being revoked. 

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH , 2024. Vol. 23, no 5, p. 3109-
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-74636DOI: 10.1007/s10207-024-00877-1Scopus ID: 2-s2.0-85197676884OAI: oai:DiVA.org:ri-74636DiVA, id: diva2:1887175
Note

This work has been partially supported by: the Sweden’sInnovation Agency VINNOVA within the EUREKA CELTIC-NEXTproject CYPRESS; the H2020 project SIFIS-Home (grant agreement952652); and the SSF project SEC4Factory (grant RIT17-0032).

Available from: 2024-08-07 Created: 2024-08-07 Last updated: 2025-09-23Bibliographically approved

Open Access in DiVA

fulltext(3112 kB)88 downloads
File information
File name FULLTEXT01.pdfFile size 3112 kBChecksum SHA-512
57a69c94c204ccea3a7db934b7702615a6522b9898b2dee8e55a900c5dfe935695e3a95ae5c998a0a460a0eef6d4ea67e293f071eb9bc1663119f2b79da3b487
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Tiloca, Marco

Search in DiVA

By author/editor
Tiloca, Marco
By organisation
Data Science
In the same journal
International Journal of Information Security
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 88 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 171 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf