Login / Signup
OAuth 2.0 meets Blockchain for Authorization in Constrained IoT Environments.
Vasilios A. Siris
Dimitrios Dimopoulos
Nikos Fotiou
Spyros Voulgaris
George C. Polyzos
Published in:
CoRR (2019)
Keyphrases
</>
access control
management system
dynamic environments
real world
cloud computing
fine grained
big data
data mining
conflict resolution
artificial intelligence
security policies
security requirements
role based access control
trust management
constrained problems