C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Use Cases for Authentication and Authorization in Constrained Environments.
Ludwig Seitz
Stefanie Gerdes
Göran Selander
Mehdi Mani
Sandeep S. Kumar
Published in:
RFC (2016)
Keyphrases
</>
security requirements
access control
fine grained
trust negotiation
database
real world
real time
digital images
dynamic environments
test cases
case base
security analysis