Sign in

Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems.

Sara N. Matheu-GarcíaAlberto Robles EncisoAlejandro Molina ZarcaDan García CarrilloJosé Luis Hernández RamosJorge Bernal BernabéAntonio F. Skarmeta
Published in: Sensors (2020)
Keyphrases
  • security architecture
  • access control
  • management system
  • security policies
  • security model
  • distributed systems
  • security mechanisms
  • database
  • computer systems
  • security requirements
  • data integrity