Edge-centric delegation of authorization for constrained devices in the Internet of Things.
Elías GrandeMarta BeltránPublished in: Comput. Commun. (2020)
Keyphrases
- access control
- mobile devices
- role based access control
- conflict resolution
- security policies
- physical world
- access control systems
- fine grained
- trust management
- access control policies
- data security
- smart objects
- edge information
- security requirements
- key technologies
- edge detection
- access rights
- embedded systems
- low cost
- mobile computing
- weighted graph
- ubiquitous computing
- edge detector
- context aware
- image segmentation
- smart phones
- undirected graph
- network security
- rfid technology