Login / Signup
Use Cases for Authentication and Authorization in Constrained Environments.
Ludwig Seitz
Stefanie Gerdes
Göran Selander
Mehdi Mani
Sandeep S. Kumar
Published in:
RFC (2016)
Keyphrases
</>
security requirements
access control
fine grained
trust negotiation
database
real world
real time
digital images
dynamic environments
test cases
case base
security analysis