Login / Signup
Delegated Authenticated Authorization for Constrained Environments.
Stefanie Gerdes
Olaf Bergmann
Carsten Bormann
Published in:
ICNP (2014)
Keyphrases
</>
access control
distributed environment
security policies
real time
neural network
data mining
fine grained
machine learning
dynamic environments
robotic systems
security requirements
highly dynamic
access control policies
key exchange protocol