Securing IoT Services Based on Security Requirement Categories.
Karlo SlovenecMarin VukovicDenis SalopekMiljenko MikucPublished in: SoftCOM (2022)
Keyphrases
- identity management
- information security
- cloud computing
- security problems
- security services
- enterprise network
- network services
- key management
- location information
- access control
- inter domain
- management system
- security issues
- ubiquitous computing
- service providers
- communication protocols
- security risks
- intrusion detection
- context aware
- security policies
- web services
- mobile payment
- service oriented
- personal data
- public key infrastructure
- service management
- mobile commerce
- user privacy
- service composition
- electronic payment
- security mechanisms
- user centric
- network security
- rfid systems
- security requirements
- high assurance
- trust relationships
- service discovery
- virtual private network
- mobile services
- smart objects
- information services
- internet service providers
- personal information
- service quality
- service oriented architecture
- statistical databases
- directory service