C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
OAuth 2.0 meets Blockchain for Authorization in Constrained IoT Environments.
Vasilios A. Siris
Dimitrios Dimopoulos
Nikos Fotiou
Spyros Voulgaris
George C. Polyzos
Published in:
CoRR (2019)
Keyphrases
</>
access control
management system
dynamic environments
real world
cloud computing
fine grained
big data
data mining
conflict resolution
artificial intelligence
security policies
security requirements
role based access control
trust management
constrained problems