Trust but Verify: Auditing the Secure Internet of Things.
Judson WilsonRiad S. WahbyHenry Corrigan-GibbsDan BonehPhilip Alexander LevisKeith WinsteinPublished in: MobiSys (2017)
Keyphrases
- trust model
- security services
- trusted computing
- trust relationships
- access control
- public key infrastructure
- security requirements
- trust management
- key management
- identity management
- security protocols
- physical world
- key technologies
- security issues
- mobile computing
- big data
- trust evaluation
- electronic transactions
- security mechanisms
- data management
- security analysis
- sensitive data
- standard model
- open systems
- wireless networks