Keyphrases
- security requirements
- access control
- trust negotiation
- identity management
- trust relationships
- fine grained
- security mechanisms
- authentication scheme
- security policies
- biometric authentication
- authentication mechanism
- identity authentication
- conflict resolution
- fragile watermarking
- multimodal biometrics
- security analysis
- key distribution
- smart card
- integrity verification
- role assignment
- data encryption
- semi fragile watermarking
- keystroke dynamics
- image authentication
- trust management
- authentication protocol
- data security
- access control policies