Using SGX-Based Virtual Clones for IoT Security.
Rashid TahirAli RazaFareed ZaffarFaizan Ul GhaniMubeen ZulfiqarPublished in: NCA (2018)
Keyphrases
- security problems
- key management
- information security
- security mechanisms
- security issues
- virtual environment
- management system
- information assurance
- statistical databases
- software systems
- virtual reality
- security systems
- data security
- augmented reality
- security requirements
- access control
- network security
- rfid tags
- functional requirements
- source code
- security properties
- social media
- virtual world
- smart objects
- security management
- rfid systems
- security level
- big data
- security model
- authentication protocol
- security protocols
- smart home
- cloud computing
- sensitive data