11ACCESS CONTROL AND MANAGEMENT
In IT systems, the management of users and permissions has a long tradition because humans have played a central role from the beginning. By contrast, embedded systems were not meant for interaction in the past and often come with only a few users or even just a single system user.
Today, with the increasing complexity of IoT business models and application scenarios, many players are involved in the life-cycle processes of IoT devices—from developers to maintenance personnel to third-party service providers to the end users themselves. Devices must be able to handle all these roles and to separate them from one ...
Get Engineering Secure Devices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.