Security, Trust and Privacy for Cloud, Fog and Internet of Things.
Chien-Ming ChenShehzad Ashraf ChaudhryKuo-Hui YehMuhammad Naveed AmanPublished in: Secur. Commun. Networks (2022)
Keyphrases
- security issues
- privacy concerns
- security services
- cloud computing
- policy enforcement
- security concerns
- access control
- statistical databases
- trust relationships
- security mechanisms
- access control models
- electronic transactions
- privacy preserving
- data privacy
- personal information
- security threats
- security and privacy issues
- information security
- preserving privacy
- trust model
- trusted computing
- enterprise network
- data security
- security properties
- personal data
- privacy issues
- security protocols
- sensitive data
- electronic commerce
- security management
- secure multiparty computation
- privacy requirements
- rfid systems
- security requirements
- identity management
- confidential information
- trust management
- public key infrastructure
- biometric template
- security measures
- private information
- security risks
- trust negotiation
- data center
- protection mechanisms
- ubiquitous computing
- privacy policies
- key management
- electronic payment
- data management
- privacy enhancing
- user privacy
- role based access control
- privacy preserving data mining
- mobile devices
- authentication protocol
- physical world
- privacy protection
- key technologies
- intrusion detection
- cryptographic protocols
- weather conditions
- network security
- single image
- outsourced databases