Fig. 2From: Realizing IoT service’s policy privacy over publish/subscribe-based middlewareThe relation between event names and access control policiesBack to article page