Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices.
Jeffrey L. HiebJacob SchreiverJames H. GrahamPublished in: Critical Infrastructure Protection (2012)
Keyphrases
- access control
- bloom filter
- security mechanisms
- identity management
- fine grained
- security requirements
- data security
- dynamic access control
- security policies
- security model
- trust relationships
- role based access control
- access control policies
- access control models
- record linkage
- security analysis
- access control mechanism
- access control systems
- machine learning
- database security
- mobile devices
- resource constrained
- peer to peer
- wireless sensor networks
- data structure