作者: Ado Adamou Abba Ari , Olga Kengni Ngangmo , Chafiq Titouna , Ousmane Thiare , Kolyang
DOI: 10.1016/J.ACI.2019.11.005
关键词: Security privacy 、 Internet of Things 、 Information privacy 、 Cloud computing 、 Ubiquitous computing 、 Architecture 、 Work (electrical) 、 Computer security 、 Cloud of things 、 Computer science
摘要: … Insecure or compromising interfaces and API. It is counted among the top threats in the cloud, because the cloud provider always distributes a set of API that helps consumers to retrieve …