Implementing Security and Trust in IoT/M2M using Middleware.
Sergio Duque CastilhoEduardo P. GodoyFadir SalmenPublished in: ICOIN (2020)
Keyphrases
- security problems
- trust management
- security services
- management system
- trusted computing
- key management
- information security
- trust relationships
- access control
- cloud computing
- security issues
- privacy concerns
- trust negotiation
- public key infrastructure
- distributed systems
- intrusion detection
- security requirements
- policy enforcement
- statistical databases
- data security
- security mechanisms
- big data
- security protocols
- ubiquitous computing environments
- security policies
- electronic transactions
- smart objects
- trust evaluation
- network security
- personal information
- mobile agents
- enterprise network
- internet banking
- ubiquitous computing
- trust model
- security management
- virtual organization