5G Multi-Access Edge Computing: A Survey on Security, Dependability, and Performance.
Gianfranco NencioniRosario Giuseppe GarroppoRuxandra F. OlimidPublished in: IEEE Access (2023)
Keyphrases
- access control
- factor authentication
- information security
- edge detection
- security requirements
- intrusion detection
- security issues
- security policies
- role based access control
- access requests
- data security
- statistical databases
- edge information
- security problems
- access control systems
- security systems
- security threats
- edge map
- network access
- key exchange protocol
- access control mechanism
- database
- sys tems
- security level
- situational awareness
- security analysis
- functional requirements
- smart card
- ambient intelligence
- context aware