Secure and Reliable Biometric Access Control for Resource-Constrained Systems and IoT.
Nima KarimianZimu GuoFatemeh TehranipoorDamon L. WoodardMark M. TehranipoorDomenic FortePublished in: CoRR (2018)
Keyphrases
- resource constrained
- access control
- security mechanisms
- access control mechanism
- key management
- data security
- identity management
- security requirements
- security model
- security policies
- wireless sensor networks
- sensor networks
- security architecture
- resource constraints
- management system
- unauthorized access
- dynamic access control
- access control policies
- embedded systems
- data management
- cloud computing
- access control systems
- rbac model
- xml access control
- distributed systems
- low cost
- digital rights management