: Enforcing security policies in outsourced environments.
Muhammad Rizwan AsgharMihaela IonGiovanni RusselloBruno CrispoPublished in: Comput. Secur. (2013)
Keyphrases
- security policies
- ubiquitous computing environments
- access control
- network security
- distributed systems
- security management
- access control policies
- security requirements
- security concerns
- access control systems
- home network
- real world
- third party
- multilevel secure
- unauthorized access
- conflict resolution
- machine learning