Next Article in Journal
Access Control with Delegated Authorization Policy Evaluation for Data-Driven Microservice Workflows
Next Article in Special Issue
IAACaaS: IoT Application-Scoped Access Control as a Service
Previous Article in Journal
TSKT-ORAM: A Two-Server k-ary Tree Oblivious RAM without Homomorphic Encryption
Previous Article in Special Issue
A Security Framework for the Internet of Things in the Future Internet Architecture
 
 
Article

Article Versions Notes

Future Internet 2017, 9(4), 59; https://doi.org/10.3390/fi9040059
Action Date Notes Link
article pdf uploaded. 30 September 2017 13:40 CEST Version of Record https://www.mdpi.com/1999-5903/9/4/59/pdf
article xml uploaded. 30 September 2017 13:40 CEST Original file https://www.mdpi.com/1999-5903/9/4/59/xml
article html file updated 30 September 2017 16:04 CEST Original file -
article html file updated 2 January 2018 11:16 CET Update -
article html file updated 2 May 2019 23:06 CEST Update -
article html file updated 27 September 2019 12:00 CEST Update -
article html file updated 8 February 2020 17:37 CET Update https://www.mdpi.com/1999-5903/9/4/59/html
Back to TopTop