Demystifying the Security Implications in IoT Device Rental Services.
Yi HeYunchao GuanRuoyu LunShangru SongZhihao GuoJianwei ZhugeJianjun ChenQiang WeiZehui WuMiao YuHetian ShiQi LiPublished in: USENIX Security Symposium (2024)
Keyphrases
- virtual private network
- security problems
- security services
- location information
- enterprise network
- inter domain
- key management
- communication protocols
- service management
- network services
- service oriented
- service providers
- security issues
- ubiquitous computing
- web services
- information security
- set top box
- public key infrastructure
- intrusion detection
- mobile payment
- cloud computing
- mobile commerce
- rfid systems
- pricing model
- sensor web
- personal data
- security requirements
- rfid tags
- smart objects
- service composition
- context aware
- mobile terminals
- smart spaces
- service oriented architecture
- identity management
- business continuity
- computing infrastructure
- service offerings
- trust relationships
- security risks
- cyber security
- government services
- security policies
- service discovery
- computing environments
- big data
- privacy preserving
- access control