Security architecture for authorized anonymous communication in 5G MEC.
Wojciech NiewolskiTomasz Wojciech NowakMariusz SepczukZbigniew KotulskiPublished in: J. Netw. Comput. Appl. (2023)
Keyphrases
- security architecture
- anonymous communication
- access control
- security policies
- access control policies
- security model
- incentive mechanism
- data integrity
- simulation platform
- sensitive information
- security mechanisms
- sensitive data
- intrusion detection system
- security requirements
- multi agent systems
- database
- data protection
- free riding
- web services
- information systems