Authentication and Authorization for the Internet of Things.
Hokeun KimEdward A. LeePublished in: IT Prof. (2017)
Keyphrases
- security requirements
- access control
- trust negotiation
- security mechanisms
- identity management
- user authentication
- security analysis
- fine grained
- mobile devices
- physical world
- key technologies
- identity authentication
- biometric authentication
- conflict resolution
- security policies
- ubiquitous computing
- trust relationships
- image authentication
- neural network
- authentication protocol
- multimodal biometrics
- information security
- big data
- smart card
- authentication scheme
- trust management
- access control policies
- security issues