Zero-Knowledge and Identity-Based Authentication, Authorization, Access Control, and Key Exchange for Publish/Subscribe in Internet of Things.
Irfan SimsekPublished in: CIoT (2023)
Keyphrases
- access control
- security mechanisms
- security requirements
- security analysis
- dynamic access control
- key exchange
- security policies
- access control policies
- key distribution
- access control models
- role based access control
- access control mechanism
- security model
- digital signature
- mobile devices
- rbac model
- data mining techniques
- key management
- encryption scheme
- security properties
- diffie hellman
- distributed databases
- quality of service
- intrusion detection
- database