Business strategies are increasingly driven by the integrated analysis of huge volumes of hetero-geneous data, coming from different sources such for example social media or Internet of Thingsdevices. The so called Big Data are considered…
The enforcement of fine-grained access control policies in constrained dynamic networks can become a challenging task. The inherit constraints present in those networks, which result from the limitations of the edge devices in terms of…