Multi-tier authentication schemes for fog computing: Architecture, security perspective, and challenges.
Awais ManzoorMunam Ali ShahHasan Ali KhattakIkram Ud DinMuhammad Khurram KhanPublished in: Int. J. Commun. Syst. (2022)
Keyphrases
- multi tier
- key agreement
- service management
- database management
- security mechanisms
- security requirements
- graphical password
- user authentication
- security analysis
- security issues
- access control
- authentication protocol
- information security
- secret key
- nested transactions
- security policies
- security level
- intrusion detection
- smart card
- software architecture
- service delivery
- network security