Security in Pervasive Applications: A Survey.
Chiara BodeiPierpaolo DeganoLetterio GallettaGianluca MezzettiGianLuigi FerrariPublished in: Eur. J. Law Technol. (2013)
Keyphrases
- security issues
- network security
- information security
- security requirements
- access control
- context aware
- intrusion detection
- security policies
- information assurance
- real time
- security protocols
- computer security
- security mechanisms
- risk assessment
- artificial intelligence
- biometric systems
- network management
- key management
- data integrity
- data security
- user authentication
- security properties
- security problems
- high security
- key agreement protocol
- neural network