Login / Signup
Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT Access Delegation.
Bin Yuan
Yan Jia
Luyi Xing
Dongfang Zhao
XiaoFeng Wang
Deqing Zou
Hai Jin
Yuqing Zhang
Published in:
USENIX Security Symposium (2020)
Keyphrases
</>
security risks
access control
cloud computing
access control systems
trust management
trust relationships
management system
access rights
role based access control
trust model
security threats
big data
access control models
conflict resolution
access control policies
security policies
information security