Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem.
Tahir AhmadUmberto MorelliSilvio RanisePublished in: SACMAT (2020)
Keyphrases
- access control
- cloud computing
- fine grained
- dynamic access control
- data security
- management system
- policy enforcement
- access control policies
- role based access control
- security policies
- security mechanisms
- rbac model
- access control models
- security requirements
- security model
- access control mechanism
- role based access control model
- identity management
- xml access control
- database security
- security architecture
- access control systems
- service providers