End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies.
Stefano BerlatoUmberto MorelliRoberto CarboneSilvio RanisePublished in: DBSec (2022)
Keyphrases
- end to end
- access control policies
- access control
- conflict resolution
- key management
- ad hoc networks
- distributed environment
- security policies
- smart card
- information security
- security mechanisms
- access control systems
- management system
- fine grained
- multipath
- congestion control
- communication systems
- security issues
- communication networks
- sensitive data
- cloud computing
- information flow
- data security
- trust negotiation
- resource constrained
- loosely coupled
- security requirements
- network management
- network security
- distributed systems
- application layer
- role based access control