Identification of trusted IoT devices for secure delegation.
Ushna KhalilAdnan AhmadAbdel-Haleem Abdel-AtyMohamed ElhosenyMohamed W. Abo El-SoudFurkh ZeshanPublished in: Comput. Electr. Eng. (2021)
Keyphrases
- trust relationships
- trusted computing
- secure multi party
- management system
- key management
- cloud computing
- multi party
- mobile applications
- security issues
- remote attestation
- smart phones
- location information
- lightweight
- mobile agent system
- mobile devices
- operating system
- security policies
- security requirements
- access control