C Ke, J Wu, F Xiao, Z Huang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In the fog computing, it is difficult to satisfy the security and privacy requirement for traditional
access control system, such as attribute-based access control system. Risk-based access …