The Cloud Security Ecosystem 2015
DOI: 10.1016/b978-0-12-801595-7.00011-2
|View full text |Cite
|
Sign up to set email alerts
|

Keeping users empowered in a cloudy Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Gerdes et al [20] tackle the problem of authorization and authentication for devices with constrained computational power. The authors divide IoT devices into the categories "constrained" and "less-constrained" based on resource availability and allow less-constrained devices to perform some authorization functions on behalf of the constrained devices.…”
Section: Authorizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Gerdes et al [20] tackle the problem of authorization and authentication for devices with constrained computational power. The authors divide IoT devices into the categories "constrained" and "less-constrained" based on resource availability and allow less-constrained devices to perform some authorization functions on behalf of the constrained devices.…”
Section: Authorizationmentioning
confidence: 99%
“…At the other end of the spectrum, the technologies used in some proposals specifically preclude centralization. For instance, methods which rely on the creators of data to specify security rules, or which grant access selectively, do not operate with a central server [20,35,37,39,48,55]. Blockchain-based access rule verification [33,40] also can not be centralized, and the same applies to extensions of the ABAC system which rely on peer devices to confirm an entity's attributes over the network [50].…”
Section: Distribution Versus Centralizationmentioning
confidence: 99%
See 1 more Smart Citation