Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
Qikun ZhangYongjiao LiZhigang LiJunling YuanYong GanXiangyang LuoPublished in: Sensors (2019)
Keyphrases
- access control
- ciphertext
- security mechanisms
- identity management
- private key
- standard model
- encryption scheme
- security requirements
- secret key
- dynamic access control
- security analysis
- public key
- authentication scheme
- data security
- trust relationships
- security policies
- access structure
- role based access control
- encryption algorithm
- security model
- rights management
- digital signature
- access control policies
- smart card
- signature scheme
- power consumption
- data warehouse
- databases