ABAC |
attribute-based access control |
ACL |
access control list |
API |
application programming interface |
CA |
certificate authority |
CBAC |
capability-based access control |
CIA |
confidentiality, integrity, and availability |
CRL |
certificate revocation list |
DDoS |
distributed denial-of-service |
H2M |
human-to-machine |
ICS |
industrial control system |
IdM |
identity management |
IoT |
Internet of Things |
IPFS |
InterPlanetary File System |
JSON |
JavaScript object notation |
M2M |
machine-to-machine |
MSP |
membership service provider |
PBFT |
practical byzantine fault tolerance |
PM |
particulate matter |
RBAC |
role-based access control |
RPS |
read per second |
RTT |
round-trip time |
SDK |
software development kit |
SPOF |
single point of failure |
SUT |
system under test |
TLS |
transport layer security |
TPS |
transaction per second |
URI |
UNIFORM RESOURCE IDENTIFIER |
UUID |
universally unique identifier |