Question

Consider a Smart Home Environment. Smart home consists of various devices that are providing diff...

Consider a Smart Home Environment. Smart home consists of various devices that are providing different types of functionalities. Some devices are monitoring the environment of the smart home (temperature, air quality) etc. Some are monitoring health conditions of individuals. Some devices are focusing on operations of a smart home (dishwasher, washing machine, etc.). Some can be entertainment devices. You can include other devices and functionalities as well. Information generated in a smart home is sensitive in nature. Suppose you were using an attribute-based access control model for protecting your smart home. Provide your own smart home configuration – the more devices and functionalities, the better. What are the different access control policies that are present in a smart home, such as the one that is described above? What are the attributes of the users, resources, and environments that are critical for this environment? How will you manage these attributes, keeping in mind that attributes are subject to change? How will you manage the access policies of the smart home? Provide a detailed analysis on which attribute-based access control model (XACML or NIST NGAC) is suitable. Your answers should not be general – it should reference this particular application and what you could or were unable to do for this smart home environment with each of the models. Use as many pages as you like for this question. 20 points.Consider a Smart Home Environment. Smart home consists of various devices that are providing different types of functionalities. Some devices are monitoring the environment of the smart home (temperature, air quality) etc. Some are monitoring health conditions of individuals. Some devices are focusing on operations of a smart home (dishwasher, washing machine, etc.). Some can be entertainment devices. You can include other devices and functionalities as well. Information generated in a smart home is sensitive in nature. Suppose you were using an attribute-based access control model for protecting your smart home. Provide your own smart home configuration – the more devices and functionalities, the better. What are the different access control policies that are present in a smart home, such as the one that is described above? What are the attributes of the users, resources, and environments that are critical for this environment? How will you manage these attributes, keeping in mind that attributes are subject to change? How will you manage the access policies of the smart home? Provide a detailed analysis on which attribute-based access control model (XACML or NIST NGAC) is suitable. Your answers should not be general – it should reference this particular application and what you could or were unable to do for this smart home environment with each of the models. Use as many pages as you like for this question.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Production and operations management is a field of study in which we try to learn and understand how effectively and efficien

Add a comment
Know the answer?
Add Answer to:
Consider a Smart Home Environment. Smart home consists of various devices that are providing diff...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • STEP 1: In your own words define problem employees and the categories they may fall into....

    STEP 1: In your own words define problem employees and the categories they may fall into. For the second or last paragraph provide your opinion on which employee type is the most difficult. DEFINITION : I think that "problem employees" are employees that either directly or indirectly hinder the organization's mission or vision, and break down into roughly four categories. In general, problem employees can be classified into two broad categories - employees creating problems for the organization and employees...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • What an Executive Summary Is An executive summary is a specific type of document that does...

    What an Executive Summary Is An executive summary is a specific type of document that does two things: it summarizes a research article, and it offers recommendations as to how information from the article can be used. Some long reports can contain an executive summary section, as indicated in the Pearson handbook. Write a 2 pahe Executive Summary In business contexts, an executive summary is always written for a specific purpose: to explain the information in the article to a...

  • please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun...

    please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun 28, 2019 at 11:59 PM Please read the article titled Evolution of Operations Planning and Control: from production to supply chains In at least three paragraphs, describe how and why the focus of operations planning and control has changed over time. While one might argue that answers consisting of sentences quoted from articles do not represent plagiarism, I do not consider them acceptable, and...

  • please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun...

    please read instructions on the first picture and follow it Discussion Board: Chapter 1 Due: Jun 28, 2019 at 11:59 PM Please read the article titled Evolution of Operations Planning and Control: from production to supply chains In at least three paragraphs, describe how and why the focus of operations planning and control has changed over time. While one might argue that answers consisting of sentences quoted from articles do not represent plagiarism, I do not consider them acceptable, and...

  • We conducted a comprehensive literature search on drones in conservation up to October 2nd 2018, in...

    We conducted a comprehensive literature search on drones in conservation up to October 2nd 2018, in line with related studies [10,11,35]. All searches were done by the same person in English, mainly using Google Scholar. This was further complemented through reference harvesting, citation tracking, abstracts in conference programs, and author search, using Research Gate and Mendeley (see PRISMA Flowchart in Supplementary Figure S1 Checklist and list of studies reviewed in Table S1). We then removed duplicate and unrelated results. Finally,...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • please Identify the key points and main thesis of the article 2. Describe the skills you...

    please Identify the key points and main thesis of the article 2. Describe the skills you will need to develop to manage the hospital of the future. use critical analysis doing these questions Suggestion for writing assignmemnt make believe the reader has never read the article -what are the key points you would want the reader to know in order to understand the hospital of the future. In addition, managers, executives do not have time to read--so again what key...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT