[go: up one dir, main page]

Dougherty et al., 2021 - Google Patents

APECS: A distributed access control framework for pervasive edge computing services

Dougherty et al., 2021

View PDF
Document ID
6102535636509651944
Author
Dougherty S
Tourani R
Panwar G
Vishwanathan R
Misra S
Srikanteswara S
Publication year
Publication venue
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security

External Links

Snippet

Edge Computing is a new computing paradigm where applications operate at the network edge, providing low-latency services with augmented user and data privacy. A desirable goal for edge computing is pervasiveness, that is, enabling any capable and authorized …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption

Similar Documents

Publication Publication Date Title
Feng et al. Blockchain-empowered decentralized horizontal federated learning for 5G-enabled UAVs
Wazid et al. AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment
CN111355745B (en) Cross-domain identity authentication method based on edge computing network architecture
Xue et al. RAAC: Robust and auditable access control with multiple attribute authorities for public cloud storage
JP7573104B2 (en) Authentication method and system
Dougherty et al. APECS: A distributed access control framework for pervasive edge computing services
Wazid et al. Fortifying smart transportation security through public blockchain
Akram et al. A secure and lightweight drones-access protocol for smart city surveillance
US11134069B2 (en) Method for authorizing access and apparatus using the method
AlMarshoud et al. Security, privacy, and decentralized trust management in VANETs: A review of current research and future directions
Sciancalepore et al. On the design of a decentralized and multiauthority access control scheme in federated and cloud-assisted cyber-physical systems
Sur et al. An efficient and secure navigation protocol based on vehicular cloud
Ramani et al. Ndn-abs: Attribute-based signature scheme for named data networking
He et al. An accountable, privacy-preserving, and efficient authentication framework for wireless access networks
Lin et al. A dynamic key management and secure data transfer based on m-tree structure with multi-level security framework for Internet of vehicles
Wang et al. An Efficient Data Sharing Scheme for Privacy Protection Based on Blockchain and Edge Intelligence in 6G‐VANET
Cahyadi et al. An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs
Zeng et al. Deniable-based privacy-preserving authentication against location leakage in edge computing
Chen et al. ToAM: a task-oriented authentication model for UAVs based on blockchain
Kumar et al. Multi-TA model-based conditional privacy-preserving authentication protocol for fog-enabled VANET
Sun et al. Anonymous authentication and key agreement scheme combining the group key for vehicular ad hoc networks
Duan et al. Design of anonymous authentication scheme for vehicle fog services using blockchain
Tan et al. An Atomic Cross‐Chain Swap‐Based Management System in Vehicular Ad Hoc Networks
Yang et al. A blockchain-based cross-domain authentication for conditional privacy preserving in vehicular ad-hoc network
Kumar et al. An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy