Keyphrases
- security policies
- access control
- network security
- security management
- security concerns
- network management
- security requirements
- distributed systems
- access control systems
- security architecture
- home network
- ubiquitous computing environments
- unauthorized access
- databases
- access control policies
- fine grained
- data mining