Login / Signup

P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.

Ze JinLuyi XingYiwei FangYan JiaBin YuanQixu Liu
Published in: CCS (2022)
Keyphrases
  • security risks
  • cloud computing
  • big data
  • optimal policy
  • role based access control
  • management system
  • access control
  • security threats
  • end to end
  • privacy policies