Dougherty et al., 2021 - Google Patents
APECS: A distributed access control framework for pervasive edge computing servicesDougherty et al., 2021
View PDF- Document ID
- 6102535636509651944
- Author
- Dougherty S
- Tourani R
- Panwar G
- Vishwanathan R
- Misra S
- Srikanteswara S
- Publication year
- Publication venue
- Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
External Links
Snippet
Edge Computing is a new computing paradigm where applications operate at the network edge, providing low-latency services with augmented user and data privacy. A desirable goal for edge computing is pervasiveness, that is, enabling any capable and authorized …
- 238000001088 Auger-photoelectron coincidence spectroscopy 0 title abstract description 129
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Feng et al. | Blockchain-empowered decentralized horizontal federated learning for 5G-enabled UAVs | |
Wazid et al. | AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment | |
CN111355745B (en) | Cross-domain identity authentication method based on edge computing network architecture | |
Xue et al. | RAAC: Robust and auditable access control with multiple attribute authorities for public cloud storage | |
JP7573104B2 (en) | Authentication method and system | |
Dougherty et al. | APECS: A distributed access control framework for pervasive edge computing services | |
Wazid et al. | Fortifying smart transportation security through public blockchain | |
Akram et al. | A secure and lightweight drones-access protocol for smart city surveillance | |
US11134069B2 (en) | Method for authorizing access and apparatus using the method | |
AlMarshoud et al. | Security, privacy, and decentralized trust management in VANETs: A review of current research and future directions | |
Sciancalepore et al. | On the design of a decentralized and multiauthority access control scheme in federated and cloud-assisted cyber-physical systems | |
Sur et al. | An efficient and secure navigation protocol based on vehicular cloud | |
Ramani et al. | Ndn-abs: Attribute-based signature scheme for named data networking | |
He et al. | An accountable, privacy-preserving, and efficient authentication framework for wireless access networks | |
Lin et al. | A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles | |
Wang et al. | An Efficient Data Sharing Scheme for Privacy Protection Based on Blockchain and Edge Intelligence in 6G‐VANET | |
Cahyadi et al. | An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs | |
Zeng et al. | Deniable-based privacy-preserving authentication against location leakage in edge computing | |
Chen et al. | ToAM: a task-oriented authentication model for UAVs based on blockchain | |
Kumar et al. | Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET | |
Sun et al. | Anonymous authentication and key agreement scheme combining the group key for vehicular ad hoc networks | |
Duan et al. | Design of anonymous authentication scheme for vehicle fog services using blockchain | |
Tan et al. | An Atomic Cross‐Chain Swap‐Based Management System in Vehicular Ad Hoc Networks | |
Yang et al. | A blockchain-based cross-domain authentication for conditional privacy preserving in vehicular ad-hoc network | |
Kumar et al. | An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy |