Login / Signup
Using Blockchain for IOT Access Control and Authentication Management.
Abdallah Zoubir Ourad
Boutheyna Belgacem
Khaled Salah
Published in:
ICIOT (2018)
Keyphrases
</>
access control
identity management
security mechanisms
management system
rbac model
role based access control
fine grained
security requirements
policy enforcement
dynamic access control
trust relationships
data security
cloud computing
security model
access control policies
security policies
high assurance
access control mechanism
directory service
security analysis
access control systems
information systems
database security
database
storage and retrieval
personal information
database management systems
role assignment
data management
relational databases