Keyphrases
- security policies
- access control
- distributed systems
- security management
- network security
- security concerns
- security requirements
- security architecture
- access control systems
- home network
- network management
- access control policies
- fine grained
- case study
- security measures
- ubiquitous computing environments
- access control mechanism
- event logs
- data sharing
- data mining
- real world