Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review.
Abdullah Al-Noman PatwaryAnmin FuRanesh Kumar NahaSudheer Kumar BattulaSaurabh Kumar GargMd Anwarul Kaium PatwaryErfan AghasianPublished in: CoRR (2020)
Keyphrases
- trust management
- computing environments
- identity management
- access control
- security mechanisms
- security issues
- data security
- fine grained
- information security
- mobile agents
- security policies
- role based access control
- access control policies
- security requirements
- access control models
- personal information
- trust relationships
- user centric
- cloud computing
- database
- data protection