[PDF][PDF] Identity and access management for the internet of things

PR Carnley, H Kettani - International Journal of Future Computer and …, 2019 - ijfcc.org
Organizations today gather unprecedented quantities of data from their operations. This data
is coming from transactions made by a person or from a connected gadget. From personal …

A public infrastructure for a trusted wireless world

R Carnley, S Bagui - Future Internet, 2022 - mdpi.com
The novelty of this work lies in examining how 5G, blockchain-based public key
infrastructure (PKI), near field communication (NFC), and zero trust architecture securely …

Mobile Identity, Credential, and Access Management Framework

PR Carnley - 2020 - scholar.dsu.edu
Organizations today gather unprecedented quantities of data from their operations. This data
is coming from transactions made by a person or from a connected system/application. From …

Identity and Access Management for the Internet of Things

I Azhar - Ishaq Azhar Mohammed," Identity and Access …, 2018 - papers.ssrn.com
The main aim of this paper is to investigate the idea of identity and access control for Internet
of Things applications. Organizations collect enormous amounts of data from their activities …

Uppgradering av LAN-miljö

R Edholm, H Wieslander - 2017 - diva-portal.org
Rapporten behandlar ett examensarbete med fokus på att utvärdera den interna
nätverksinfrastrukturen på företaget Office IT-Partner. Företaget levererar olika molntjänster …