• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Use Cases for Authentication and Authorization in Constrained Environments.

Ludwig SeitzStefanie GerdesGöran SelanderMehdi ManiSandeep S. Kumar
Published in: RFC (2016)
Keyphrases
  • security requirements
  • access control
  • fine grained
  • trust negotiation
  • database
  • real world
  • real time
  • digital images
  • dynamic environments
  • test cases
  • case base
  • security analysis