Sign in

A security policy enforcement framework for controlling IoT tenant applications in the edge.

Phu Hong NguyenPhu H. PhungHong Linh Truong
Published in: IOT (2018)
Keyphrases
  • policy enforcement
  • access control
  • security management
  • enterprise network
  • database
  • web services
  • databases
  • neural network
  • data mining
  • information security
  • network security
  • database server
  • key management