2017
DOI: 10.1016/j.is.2017.07.006
|View full text |Cite
|
Sign up to set email alerts
|

Security towards the edge: Sticky policy enforcement for networked smart objects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
39
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 21 publications
(39 citation statements)
references
References 12 publications
0
39
0
Order By: Relevance
“…Moreover, they state the access control rules, the scope, and other relevant aspects related to the associated data. As a consequence, an enforcement system to manage sticky policies, coupled with a security and privacy‐aware IoT middleware, has been defined and applied in this paper to a real smart home scenario.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Moreover, they state the access control rules, the scope, and other relevant aspects related to the associated data. As a consequence, an enforcement system to manage sticky policies, coupled with a security and privacy‐aware IoT middleware, has been defined and applied in this paper to a real smart home scenario.…”
Section: Introductionmentioning
confidence: 99%
“…The system presented in Reference is called NetwOrked Smart object (NOS) . Each NOS has been conceived following the IoT general‐purpose approach.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations