SSOCircle

  • Home
    • Service Status
  • Portfolio
    • Public IDP
      • Meta Data
      • X.509 PKI
      • AuthContext Tour
    • White Label IDP
      • Quick Tour IDPee
    • SAML Test
      • SSOCheck Tool
      • SSOCheck API
      • SAML SP Certification
      • SAML Monitor Light
    • OpenAM OS Support
    • IDP-Proxy
    • MyIdentityGraph
    • Authz as a Service
    • Support
    • Consulting/Research
    • Donation
    • Pricing
  • Knowledge Center
    • IDP Tips & Tricks
      • Public IDP How-To
      • Public IDP Data
      • Metadata Editor
      • Debugging IDP
      • SAML with cURL
        • Tutorial: Part I
        • Tutorial: Part II
    • PKI for X.509 Auth
    • SSOCheck Tool
      • Tool Quickstart
      • Sample Script 1
      • Sample Script 2
    • SSOCheck API
      • Test AuthZ API
      • Test Config API
      • Test Execution API
      • Test Rules
      • SAML with cURL
        • Tutorial Part I
        • Tutorial: Part II
    • MyIDGraph Ontology
    • MyIDGraph Manual
      • Quick Start
      • General Usage Options
      • Exploring a Vertex
      • Requesting Permissions
      • Approving and Declining Permission Requests
      • Removing Access Permissions
      • Delegate Permissions to another Person
    • AzaaS ReBAC Manual
      • ReBAC
      • AzaaS Quick Start
    • Debugging Toolbox
      • Session Cookie Decoder
      • Password Encryption
      • Password Decryption
      • SAML Decoder
      • SAML Encoder
    • Service Provider
    • Federation
      • SAML 2.0
      • Glossary
  • Blog
  • About Us
    • Contact
    • Ticket
    • Imprint
  • Sign In / Register
    • Login
    • Logout
    • Global Logout
    • Register

You are here: SSOCircle » Tag: IoT

Relationship Based Access Control in IoT and User Managed Access

English on April 25th, 2017 No Comments

Relationship Based Access Control (ReBAC) models originate from access control considerations made for Online Social Networks (OSN). In original ReBAC studies User-to-User (U2U) relations determine the access control decision made whenever a user (accessor) tries to access a resource. Policies typically evaluate the type, depth and strength of the U2U relation between the accessor and […]

Tags: IoT, MyIdentityGraph, ReBAC

RSS Kuppinger & Cole

  • VeridiumID
  • If You Cannot Trace Your AI’s Decisions, Can You Really Trust Them?
  • Identity at the Speed of Business - From Architecture to Organizational Value
  • Apple’s Digital ID Move: Helpful Progress, but Not Yet the Breakthrough
  • Brand Protection

RSS Gartner Blog

RSS Computer Week Security

  • Streisand effect: Businesses that pay ransomware gangs are more likely to hit the headlines
  • Trump plans bonfire of US state-level AI regulation
  • Quantum risk to quantum readiness: A PQC roadmap
  • What lies in store for cyber security skills in 2026?
  • Microsoft expands bug bounty scheme to include third-party software
Copyright © SSOCircle | site notice | terms | privacy policy