Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
Carlo BlundoStelvio CimatoSabrina De Capitani di VimercatiAlfredo De SantisSara ForestiStefano ParaboschiPierangela SamaratiPublished in: SEC (2009)
Keyphrases
- access control
- key management
- dynamic access control
- data security
- role based access control
- security policies
- wireless sensor networks
- security mechanisms
- security model
- access control policies
- resource constrained
- lightweight
- security requirements
- ad hoc networks
- data protection
- access control models
- database systems
- third party
- key management scheme
- relational databases