Authorisation inconsistency in IoT third‐party integration
Abstract Today's IoT platforms provide rich functionalities by integrating with popular third‐party services. Due to the complexity, it is critical to understand whether the IoT platforms have properly managed the authorisation in the cross‐cloud IoT environments. In this study, the authors rep...
Saved in:
| Main Authors: | Jiongyi Chen, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2022-03-01
|
| Series: | IET Information Security |
| Subjects: | |
| Online Access: | https://doi.org/10.1049/ise2.12043 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
SoK: Delegated Security in the Internet of Things
by: Emiliia Geloczi, et al.
Published: (2025-04-01) -
Lattice‐based revocable attribute‐based encryption with decryption key exposure resistance
by: Xingting Dong, et al.
Published: (2021-11-01) -
IoT and Cloud Computing Issues, Challenges and Opportunities: A Review
by: Mohammed Mohammed Sadeeq, et al.
Published: (2021-03-01) -
A lightweight and trusted communication protocol for IoT
by: Junfeng MA, et al.
Published: (2021-11-01) -
Internet of Things (IoT) applications security trends and challenges
by: Asif Ali Laghari, et al.
Published: (2024-12-01)