Enforcing high-level security policies for Internet of Things.
Chang Jin KooJeongYeon KimPublished in: J. Supercomput. (2018)
Keyphrases
- security policies
- high level
- access control
- low level
- security requirements
- network security
- security management
- distributed systems
- security concerns
- access control systems
- cyber attacks
- mobile devices
- physical world
- access control policies
- object oriented
- home network
- unauthorized access
- fine grained
- ubiquitous computing
- key technologies
- database
- multilevel secure