Login / Signup
Security middleware approaches and issues for ubiquitous applications.
Jameela Al-Jaroodi
Imad Jawhar
Alyaziyah Al-Dhaheri
Fatmah Al-Abdouli
Nader Mohamed
Published in:
Comput. Math. Appl. (2010)
Keyphrases
</>
security issues
distributed systems
security level
social networks
information systems
access control
context aware
intrusion detection
information security
context awareness
security threats
data mining
security policies
network security
key issues
ambient intelligence
web services