An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE).
Victoria BeltranAntonio F. SkarmetaPublished in: WF-IoT (2016)
Keyphrases
- access control
- security requirements
- trust negotiation
- fine grained
- security mechanisms
- security policies
- identity management
- conflict resolution
- role assignment
- trust management
- computing environments
- access control policies
- trust relationships
- usage control
- access requests
- neural network
- dynamic access control
- data security
- security analysis
- distributed environment
- dynamic environments
- objective function
- information systems