Limitations and Approaches in Access Control and Identity Management for Constrained IoT Resources.
Shantanu PalPublished in: PerCom Workshops (2019)
Keyphrases
- access control
- identity management
- cloud computing
- access control models
- fine grained
- data security
- personal information
- dynamic access control
- security policies
- resource allocation
- user centric
- security mechanisms
- role based access control
- management system
- access control policies
- design choices
- security requirements
- access control mechanism
- rbac model
- databases
- database security
- computing environments
- trust relationships
- data mining