Author:
Watanabe Ryu,Kubota Ayumu,Kurihara Jun
Publisher
Springer International Publishing
Reference14 articles.
1. Echeverría, S., Lewis, G.A., Klinedinst, D., Seitz, L.: Authentication and authorization for IoT devices in disadvantaged environments. In: Proceedings IEEE WF-IoT 2019, pp. 368–373 (2019)
2. ETSI: Multi-access edge computing (MEC): MEC 5G integration. ETSI GR MEC 031 V2.1.1: https://www.etsi.org/deliver/etsi_gr/MEC/001_099/031/02.01.01_60/gr_MEC031v020101p.pdf (2020)
3. Grande, E., Beltrán, M.: Edge-centric delegation of authorization for constrained devices in the Internet of Things. Comput. Commun. 160, 464–474 (2020)
4. GSMA: Operator platform concept, phase 1: Edge cloud computing (2020). https://www.gsma.com/futurenetworks/resources/operator-platform-concept-whitepaper/
5. Hardt, D.: The OAuth 2.0 authorization framework. RFC6749 (2012): https://datatracker.ietf.org/doc/html/rfc6749
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Extension of Resource Authorization Method with SSI in Edge Computing;Lecture Notes on Data Engineering and Communications Technologies;2024