Delegation-based authentication and authorization for the IP-based Internet of Things.
René HummenHossein ShafaghShahid RazaThiemo VoigtKlaus WehrlePublished in: SECON (2014)
Keyphrases
- access control
- security mechanisms
- trust relationships
- identity management
- security policies
- role based access control
- security requirements
- conflict resolution
- access control policies
- access control systems
- virtual private network
- trust negotiation
- trust management
- data security
- security analysis
- fine grained
- key technologies
- network management
- mobile devices
- access control mechanism
- biometric authentication
- mobile computing
- access rights
- access control models
- ip address
- fragile watermarking
- user authentication
- trust model
- authentication scheme
- internet protocol
- ip networks
- physical world
- network security
- big data
- ad hoc networks
- factor authentication
- end to end
- management system