Authorization Transparency for Accountable Access to IoT Services.
Luca FerrettiFrancesco LongoMichele ColajanniGiovanni MerlinoNachiket TapasPublished in: ICIOT (2019)
Keyphrases
- access control
- access control mechanism
- location information
- networking technologies
- access requests
- mobile environments
- fine grained
- role based access control
- context aware
- service providers
- management system
- directory service
- ubiquitous computing
- physical location
- internet services
- mobile computing
- cloud computing
- personalized information
- wireless broadcast
- remote access
- service offerings
- wireless technologies
- end users
- service oriented
- security policies
- web services
- service composition
- uniform access
- access points
- user requests
- data security
- digital resources
- trust management
- trust relationships
- mobile services
- access control systems
- transparent access
- information providers
- information services