How Does Blockchain Enhance Zero Trust Security in IoMT?
Maher BoughdiriTakoua AbdellatifChirine Ghedira GueganPublished in: MEDI Workshops (2023)
Keyphrases
- trust management
- security services
- trusted computing
- trust relationships
- access control
- public key infrastructure
- security issues
- security requirements
- statistical databases
- security mechanisms
- computer security
- information security
- privacy concerns
- security protocols
- trust negotiation
- intrusion detection
- security policies
- trust evaluation
- access control models
- security problems
- security threats
- cyber security
- policy enforcement
- security level
- data integrity
- network security
- data security
- internet banking
- malicious nodes
- trust model
- virtual communities
- cloud computing