Identity-based access control for pro-active message's DTN.
Adrián Sánchez-CarmonaSergi RoblesCarlos BorregoPublished in: Secur. Commun. Networks (2016)
Keyphrases
- access control
- dynamic access control
- fine grained
- data security
- routing protocol
- security policies
- access control models
- security model
- security mechanisms
- rbac model
- signature scheme
- role based access control
- key management
- security requirements
- security architecture
- access control mechanism
- access control policies
- encryption scheme
- identity management
- signcryption scheme
- role assignment
- database