Login / Signup
P-Verifier: Understanding and Mitigating Security Risks in Cloud-based IoT Access Policies.
Ze Jin
Luyi Xing
Yiwei Fang
Yan Jia
Bin Yuan
Qixu Liu
Published in:
CCS (2022)
Keyphrases
</>
security risks
cloud computing
big data
optimal policy
role based access control
management system
access control
security threats
end to end
privacy policies