An Access Control Implementation Targeting Resource-constrained Environments.
Fan ZhangBernard ButlerBrendan JenningsPublished in: CNSM (2019)
Keyphrases
- access control
- resource constrained
- security mechanisms
- data security
- resource constraints
- fine grained
- wireless sensor networks
- sensor networks
- dynamic access control
- security policies
- role based access control
- access control policies
- security model
- security requirements
- access control models
- database security
- multipath
- low cost
- embedded systems
- database
- access control mechanism
- rbac model
- peer to peer
- usage control