Login / Signup
Resilient Authentication and Authorization for the Internet of Things (IoT) Using Edge Computing.
Hokeun Kim
Eunsuk Kang
David Broman
Edward A. Lee
Published in:
ACM Trans. Internet Things (2020)
Keyphrases
</>
big data
management system
access control
location information
security requirements
edge detection
mobile computing
ubiquitous computing
weighted graph
fine grained
smart objects
mobile devices
edge information
security policies
edge map
trust relationships
integrity verification