Login / Signup

Use Cases for Authentication and Authorization in Constrained Environments.

Ludwig SeitzStefanie GerdesGöran SelanderMehdi ManiSandeep S. Kumar
Published in: RFC (2016)
Keyphrases
  • security requirements
  • access control
  • fine grained
  • trust negotiation
  • database
  • real world
  • real time
  • digital images
  • dynamic environments
  • test cases
  • case base
  • security analysis