5G Multi-access Edge Computing: Security, Dependability, and Performance.
Gianfranco NencioniRosario Giuseppe GarroppoRuxandra F. OlimidPublished in: CoRR (2021)
Keyphrases
- access control
- access requests
- ambient intelligence
- information security
- sys tems
- intrusion detection
- security policies
- statistical databases
- data security
- computer security
- security mechanisms
- functional requirements
- factor authentication
- role based access control
- random access
- security requirements
- security issues
- software systems
- information systems
- security systems
- edge information
- security problems
- security threats
- mobile internet
- privacy enhancing
- distributed systems
- edge detection