Every day more and more devices are getting connected to the Internet, a phenomenon commonly referred to as the Internet of Things. Since security and privacy are more important than ever before this presents an interesting problem. Suddenly devices with not even near as much computing power as a desktop computer are tasked with performing heavy security computations designed to be used in powerful systems with little resource and power limitations. This thesis presents a solution for performing authorization for a resource limited system using a trusted third party, thus transferring the usually quite heavy authorization computations from a resource constrained device to another device where no such restrictions exists. When a client wishe...
Modern industrial systems are enriched by cyber–physical devices and interconnections with business ...
Access control is a critical functionality in Internet of Things (IoT), and it is particularly promi...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Every day more and more devices are getting connected to the Internet, a phenomenon commonly referre...
Every day more and more devices are getting connected to the Internet, a phenomenon commonly referre...
This paper describes a framework that allows fine-grained and flexible access control to connected d...
This paper describes a framework that allows fine-grained and flexible access control to connected d...
Authentication, authorization, and digital identity management are core features required by secure ...
This paper describes a framework that allows fine-grained and flexible access control to connected ...
International audienceThe Internet of Things (IoT) is here, more than 10 billion units are already c...
International audienceThe Internet of Things (IoT) is here, more than 10 billion units are already c...
Internet of Things (IoT) and Cyber-physical Systems (CPS) are two very hot research topics today, an...
Abstract—IP technology for resource-constrained devices en-ables transparent end-to-end connections ...
Internet of Things (IoT) and Cyber-physical Systems (CPS) are two very hot research topics today, an...
Modern industrial systems are enriched by cyber–physical devices and interconnections with business ...
Modern industrial systems are enriched by cyber–physical devices and interconnections with business ...
Access control is a critical functionality in Internet of Things (IoT), and it is particularly promi...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Every day more and more devices are getting connected to the Internet, a phenomenon commonly referre...
Every day more and more devices are getting connected to the Internet, a phenomenon commonly referre...
This paper describes a framework that allows fine-grained and flexible access control to connected d...
This paper describes a framework that allows fine-grained and flexible access control to connected d...
Authentication, authorization, and digital identity management are core features required by secure ...
This paper describes a framework that allows fine-grained and flexible access control to connected ...
International audienceThe Internet of Things (IoT) is here, more than 10 billion units are already c...
International audienceThe Internet of Things (IoT) is here, more than 10 billion units are already c...
Internet of Things (IoT) and Cyber-physical Systems (CPS) are two very hot research topics today, an...
Abstract—IP technology for resource-constrained devices en-ables transparent end-to-end connections ...
Internet of Things (IoT) and Cyber-physical Systems (CPS) are two very hot research topics today, an...
Modern industrial systems are enriched by cyber–physical devices and interconnections with business ...
Modern industrial systems are enriched by cyber–physical devices and interconnections with business ...
Access control is a critical functionality in Internet of Things (IoT), and it is particularly promi...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...