A large scale access-control list for IoT security comprising embedded IP-core and DDR DRAM.
Kazunari InoueYuji YanoPublished in: ISOCC (2016)
Keyphrases
- access control
- security policies
- data security
- fine grained
- dynamic access control
- security requirements
- security mechanisms
- role based access control
- security enforcement
- access control policies
- management system
- policy enforcement
- security model
- access control mechanism
- cloud computing
- unauthorized access
- main memory
- identity management
- access control models
- rbac model
- database security
- role assignment
- high assurance
- embedded systems
- access control systems
- data protection
- usage control
- intrusion detection
- role based access control model
- network security