2023
DOI: 10.1002/tee.23880
|View full text |Cite
|
Sign up to set email alerts
|

Access Control Management System for Edge Computing Environment Using Tag‐Based Matching and Cache Injection

Abstract: With increasing attention to the secondary use of data, privacy protection laws such as the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) have come into force to protect residents from unauthorized exploitation of personal data. Flow management is an effective method to track the distribution of user data in a multi-domain network environment. Transparency in the relationship between data and service providers is essential to track the status of data provision. Vendor and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…A microcontroller for processing the system and a communication system for communication between the control and node sensors are the two basic parts of a wireless sensor network (WSN). Remote monitoring and Internet of Things (IoT) technology can be used to access real-time data [16].…”
Section: Introductionmentioning
confidence: 99%
“…A microcontroller for processing the system and a communication system for communication between the control and node sensors are the two basic parts of a wireless sensor network (WSN). Remote monitoring and Internet of Things (IoT) technology can be used to access real-time data [16].…”
Section: Introductionmentioning
confidence: 99%