Login / Signup
Introducing Secure Provenance in IoT: Requirements and Challenges.
Sabah Suhail
Choong Seong Hong
Zuhaib Uddin Ahmad
Faheem Zafar
Abid Khan
Published in:
SIoT (2016)
Keyphrases
</>
lessons learned
key management
management system
metadata
design principles
user requirements
key issues
open issues
real world
fine grained
big data
security issues
technical challenges
functional requirements
security analysis
workflow systems